SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
Win the War with Spyware!
By Mike Burstein
Distributed by Dominion Repair Service Inc
http://www.dominionrepair.com/
Copyright 2005 DRSI
All Rights Reserved
Duplication or Reproduction Permitted
in Original & Complete Format Only
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
Win the War with Spyware!
How to Repair & Protect Your Computer – for Little or NO Cost!
By Mike Burstein
1. What is spyware?
As you surf the World Wide Web, many times you encounter offers that seem
to be harmless. Programs, screensavers, backgrounds and a multitude of other
computer related items are available to download from the Internet for “Free”.
Are they really free? Maybe free of cost but if people took the time to read the
licensing agreement (EULA), they would find that the offer is not free of
strings. Of course, not all authors of spyware include the information in their
EULA that even warns the user of the additional programs that come with the
“free” download.
These strings can include tracking programs to determine the sites you visit on
the web, trojans and worms that can be used to call “home” and run
continually on your PC, programs that will provide unscrupulous marketers
with all of the email address in your address book so they can be spammed,
annoying pop-up ads, dialers, browser hijackers that will redirect your
browser to a new home page or search engine, and many other nefarious
malware programs that bog down or crash your computer.
Another side effect of spyware is that much of the code is poorly written and
is the most prevalent reason for computing problems on PC’s today. System
lockups, unexpected reboot, the blue screen of death, the inability to
shutdown, extremely slow processing speeds, the inability to connect to the
Internet and a host of other problems can be directly traced to spyware.
What can you do to protect yourself and your PC? Are there tools available to
help repair and protect your computer and your personal information from
these spyware pirates?
Fortunately, these are numerous ways to protect your computer, most of
which are truly free! No strings attached! The trick is knowing what they are
and how to use them.
This eBook was written for precisely that purpose – to allow you to protect
yourself and your computer from spyware. If you will take the time to read
this eBook completely and implement the strategies offered, your time on the
web won’t be spoiled by spyware.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
The majority of these free tools require an Internet connection to use them
effectively.
If you prefer to have the information and programs referenced in this eBook
on CD (or you are not able to connect your computer to the Internet), you will
find the CD available at http://RepairCD.DominionRepair.com .
This self-running CD contains all of the tools discussed in this eBook in
addition to other critical preventative resources and recommendations to make
your time on the Internet safer from intrusion.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
2. Microsoft AntiSpyware
Microsoft finally joined the fray against spyware when they purchased a leading anti-
spyware tool developed by Giant Software.
Currently, this extremely effective tool is being offered for free by Microsoft.
The tool offers real time protection in addition to being the most effective program
available to remove existing spyware from your computer.
Updates can be configured to download and install daily and a scan can also be scheduled
to run daily, all with no user intervention.
Download the tool at (copy and paste the URL into your browser):
http://www.microsoft.com/downloads/details.aspx?FamilyID=321cd7a2-6a57-4c57-
a8bd-dbf62eda9671&displaylang=en&Hash=P4RGFD8
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
3. The Ad-aware Weapon
One of the easiest to use spyware removal tools is Ad-aware by Lavasoft Software. This
program can be downloaded from the author’s website at no charge.
The URL is: http://www.lavasoftusa.com/software/adaware/
Find the link to download the free edition or you can purchase the Professional version.
After you download and install Ad-aware, be sure to use the Check for Updates Now
utility before you scan for problems; this will download the most current definition file.
After running Ad-aware and removing all spyware entries that were identified, verify that
you are able to connect to the Internet.
If you are unable to connect, go to chapter 4 and use the recommended TCP/IP repair
tool.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
4. The SpyBot Search and Destroy Weapon
After running Ad-aware, the next step to clean up your PC and protect it in the future is
to download SpyBot Search and Destroy.
Patrick M. Kolla offers an outstanding free tool at: http://www.safer-
networking.org/en/index.html
Once again, after you download and install SpyBot Search and Destroy, use the update
utility to get the latest definition file.
After running SpyBot Search and Destroy and removing all spyware entries that were
identified, verify that you are able to connect to the Internet.
Another nice feature is the immunize program that will block a large database of know
spyware sites. It is recommended that you immunize your computer after each definition
file update.
If you are unable to connect, go to chapter 4 and use the recommended TCP/IP repair
tool.
Many of the authors of the free tools recommended in this eBook accept and appreciate
donations for their tools.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
5. TCP/IP Stack Repair Tool
Many of the poorly written spyware programs end up corrupting the TCP/IP stack on
your PC – this is the networking protocol that allows your PC to connect to the Internet.
This handy tool can get you back online quickly after you have removed spyware from
your PC.
WinSockFix by Explicit Software Solutions can be downloaded from the following sites:
http://www.tacktech.com/display.cfm?ttid=257
http://www.itc.virginia.edu/desktop/central/display/versions.php3?softwareID=67&nav=t
itle
After downloading the program, click and then click the button.
After the program finishes running, reboot your computer and you should be able to
connect to the Internet.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
6. On Patrol with WinPatrol
WinPatrol is another layer in the defense systems you need to use on your PC. This neat
little program will alert you to any changes that occur to critical system resources on your
computer without your knowledge.
Download this free tool at: http://www.winpatrol.com/
Scotty is the tool in this program that will alert you to a nefarious program’s attempt to
install itself on your PC. Scotty’s bark is an invaluable defender of your computer.
WinPatrol’s author also offers an enhanced version for a nominal cost.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
7. Preventative Measures
After you finish cleaning the spyware off of your computer, it becomes an easy task to
keep it that way.
Begin a weekly preventative maintenance schedule to run Ad-aware and SpyBot Search
and Destroy (run them immediately if you stumble into a hornets nest of spyware) in
addition to the daily scan run by Microsoft AntiSpyware. Always download the most
current definition files before scanning.
Pay attention to any alerts that Scotty (WinPatrol) brings to your attention – unless you
are installing a program, you should always answer no to Scotty’s question, “Is it OK to
install __________”.
Using these tools, in conjunction with an updated Anti-Virus program, will allow you to
enjoy your Internet experiences with few or no problems.
If you prefer to have the information and programs referenced in this eBook on CD, you
will find it available at http://RepairCD.DominionRepair.com .
This self-running CD contains all of the tools discussed in this eBook in addition to other
critical preventative resources and recommendations to make your time on the Internet
safe from intrusion.
Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com
8. Reprint Information
You are invited to use this eBook, in it’s entirety, in your publication or website. The
only requirement is the inclusion of the following at the end of this article:
Dominion Repair Service Inc has been helping the SOHO and Small/Medium Business
community grow & prosper for over 20 years by selling and servicing computers and
networks, solving start up problems, automating their offices, and is now proudly serving
the booming wireless network market.
Visit http://www.DominionRepair.com for the latest FREE tips & tricks.
Email: Info@DominionRepair.com

Contenu connexe

Similaire à Win the War with Spyware.pdf

Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Jose Lopez
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Dosearches virus removal
Dosearches virus removalDosearches virus removal
Dosearches virus removalsakthiprime2
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crashShae
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 

Similaire à Win the War with Spyware.pdf (20)

Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Spyware
SpywareSpyware
Spyware
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Spyware
SpywareSpyware
Spyware
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Dosearches virus removal
Dosearches virus removalDosearches virus removal
Dosearches virus removal
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
App locker
App lockerApp locker
App locker
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Web design premium
Web design premiumWeb design premium
Web design premium
 

Plus de PiyushPriyadarshi27

Cecelia Ahern - PS I Love You.pdf
Cecelia Ahern  -  PS I Love You.pdfCecelia Ahern  -  PS I Love You.pdf
Cecelia Ahern - PS I Love You.pdfPiyushPriyadarshi27
 
Cecelia Ahern - If You Could See Me Now.pdf
Cecelia Ahern  -  If You Could See Me Now.pdfCecelia Ahern  -  If You Could See Me Now.pdf
Cecelia Ahern - If You Could See Me Now.pdfPiyushPriyadarshi27
 
Cecelia Ahern - Thanks for the Memories.pdf
Cecelia Ahern - Thanks for the Memories.pdfCecelia Ahern - Thanks for the Memories.pdf
Cecelia Ahern - Thanks for the Memories.pdfPiyushPriyadarshi27
 
The Burden By Agatha Christie.pdf
The Burden By Agatha Christie.pdfThe Burden By Agatha Christie.pdf
The Burden By Agatha Christie.pdfPiyushPriyadarshi27
 
The Oxford Dictionary Of Quotations.pdf
The Oxford Dictionary Of Quotations.pdfThe Oxford Dictionary Of Quotations.pdf
The Oxford Dictionary Of Quotations.pdfPiyushPriyadarshi27
 
The King Of The Dark Chamber.pdf
The King Of The Dark Chamber.pdfThe King Of The Dark Chamber.pdf
The King Of The Dark Chamber.pdfPiyushPriyadarshi27
 
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdf
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdfThe_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdf
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdfPiyushPriyadarshi27
 
Visual Basic 6 Tutorial(amazing book...!!!).pdf
Visual Basic 6 Tutorial(amazing book...!!!).pdfVisual Basic 6 Tutorial(amazing book...!!!).pdf
Visual Basic 6 Tutorial(amazing book...!!!).pdfPiyushPriyadarshi27
 
The Adventures of Huckleberry Finn.pdf
The Adventures of Huckleberry Finn.pdfThe Adventures of Huckleberry Finn.pdf
The Adventures of Huckleberry Finn.pdfPiyushPriyadarshi27
 

Plus de PiyushPriyadarshi27 (20)

Cecelia Ahern - PS I Love You.pdf
Cecelia Ahern  -  PS I Love You.pdfCecelia Ahern  -  PS I Love You.pdf
Cecelia Ahern - PS I Love You.pdf
 
Cecelia Ahern - If You Could See Me Now.pdf
Cecelia Ahern  -  If You Could See Me Now.pdfCecelia Ahern  -  If You Could See Me Now.pdf
Cecelia Ahern - If You Could See Me Now.pdf
 
Cecelia Ahern - Thanks for the Memories.pdf
Cecelia Ahern - Thanks for the Memories.pdfCecelia Ahern - Thanks for the Memories.pdf
Cecelia Ahern - Thanks for the Memories.pdf
 
Cecilia _Ahern_The_Gift.pdf
Cecilia _Ahern_The_Gift.pdfCecilia _Ahern_The_Gift.pdf
Cecilia _Ahern_The_Gift.pdf
 
The Burden By Agatha Christie.pdf
The Burden By Agatha Christie.pdfThe Burden By Agatha Christie.pdf
The Burden By Agatha Christie.pdf
 
windows vista bible.pdf
windows vista bible.pdfwindows vista bible.pdf
windows vista bible.pdf
 
The Oxford Dictionary Of Quotations.pdf
The Oxford Dictionary Of Quotations.pdfThe Oxford Dictionary Of Quotations.pdf
The Oxford Dictionary Of Quotations.pdf
 
The King Of The Dark Chamber.pdf
The King Of The Dark Chamber.pdfThe King Of The Dark Chamber.pdf
The King Of The Dark Chamber.pdf
 
Treasure Island.pdf
Treasure Island.pdfTreasure Island.pdf
Treasure Island.pdf
 
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdf
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdfThe_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdf
The_Complete_Idiots_Guide_to_Learning_German_on_Your_Own.pdf
 
Visual Basic 6 Tutorial(amazing book...!!!).pdf
Visual Basic 6 Tutorial(amazing book...!!!).pdfVisual Basic 6 Tutorial(amazing book...!!!).pdf
Visual Basic 6 Tutorial(amazing book...!!!).pdf
 
Zodiac Detail.pdf
Zodiac Detail.pdfZodiac Detail.pdf
Zodiac Detail.pdf
 
War and Peace - Tolstoy.pdf
War and Peace - Tolstoy.pdfWar and Peace - Tolstoy.pdf
War and Peace - Tolstoy.pdf
 
Vedic Mathematics.pdf
Vedic Mathematics.pdfVedic Mathematics.pdf
Vedic Mathematics.pdf
 
The Three Musketeers.pdf
The Three Musketeers.pdfThe Three Musketeers.pdf
The Three Musketeers.pdf
 
The-Science-of-Getting-Rich.pdf
The-Science-of-Getting-Rich.pdfThe-Science-of-Getting-Rich.pdf
The-Science-of-Getting-Rich.pdf
 
Success_in_grammar_exambook.pdf
Success_in_grammar_exambook.pdfSuccess_in_grammar_exambook.pdf
Success_in_grammar_exambook.pdf
 
The Adventures of Huckleberry Finn.pdf
The Adventures of Huckleberry Finn.pdfThe Adventures of Huckleberry Finn.pdf
The Adventures of Huckleberry Finn.pdf
 
THE LOST WORLD.pdf
THE LOST WORLD.pdfTHE LOST WORLD.pdf
THE LOST WORLD.pdf
 
Shiv Khera - You can Win.pdf
Shiv Khera - You can Win.pdfShiv Khera - You can Win.pdf
Shiv Khera - You can Win.pdf
 

Dernier

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Dernier (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Win the War with Spyware.pdf

  • 1. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com Win the War with Spyware! By Mike Burstein Distributed by Dominion Repair Service Inc http://www.dominionrepair.com/ Copyright 2005 DRSI All Rights Reserved Duplication or Reproduction Permitted in Original & Complete Format Only
  • 2. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com Win the War with Spyware! How to Repair & Protect Your Computer – for Little or NO Cost! By Mike Burstein 1. What is spyware? As you surf the World Wide Web, many times you encounter offers that seem to be harmless. Programs, screensavers, backgrounds and a multitude of other computer related items are available to download from the Internet for “Free”. Are they really free? Maybe free of cost but if people took the time to read the licensing agreement (EULA), they would find that the offer is not free of strings. Of course, not all authors of spyware include the information in their EULA that even warns the user of the additional programs that come with the “free” download. These strings can include tracking programs to determine the sites you visit on the web, trojans and worms that can be used to call “home” and run continually on your PC, programs that will provide unscrupulous marketers with all of the email address in your address book so they can be spammed, annoying pop-up ads, dialers, browser hijackers that will redirect your browser to a new home page or search engine, and many other nefarious malware programs that bog down or crash your computer. Another side effect of spyware is that much of the code is poorly written and is the most prevalent reason for computing problems on PC’s today. System lockups, unexpected reboot, the blue screen of death, the inability to shutdown, extremely slow processing speeds, the inability to connect to the Internet and a host of other problems can be directly traced to spyware. What can you do to protect yourself and your PC? Are there tools available to help repair and protect your computer and your personal information from these spyware pirates? Fortunately, these are numerous ways to protect your computer, most of which are truly free! No strings attached! The trick is knowing what they are and how to use them. This eBook was written for precisely that purpose – to allow you to protect yourself and your computer from spyware. If you will take the time to read this eBook completely and implement the strategies offered, your time on the web won’t be spoiled by spyware.
  • 3. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com The majority of these free tools require an Internet connection to use them effectively. If you prefer to have the information and programs referenced in this eBook on CD (or you are not able to connect your computer to the Internet), you will find the CD available at http://RepairCD.DominionRepair.com . This self-running CD contains all of the tools discussed in this eBook in addition to other critical preventative resources and recommendations to make your time on the Internet safer from intrusion.
  • 4. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 2. Microsoft AntiSpyware Microsoft finally joined the fray against spyware when they purchased a leading anti- spyware tool developed by Giant Software. Currently, this extremely effective tool is being offered for free by Microsoft. The tool offers real time protection in addition to being the most effective program available to remove existing spyware from your computer. Updates can be configured to download and install daily and a scan can also be scheduled to run daily, all with no user intervention. Download the tool at (copy and paste the URL into your browser): http://www.microsoft.com/downloads/details.aspx?FamilyID=321cd7a2-6a57-4c57- a8bd-dbf62eda9671&displaylang=en&Hash=P4RGFD8
  • 5. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 3. The Ad-aware Weapon One of the easiest to use spyware removal tools is Ad-aware by Lavasoft Software. This program can be downloaded from the author’s website at no charge. The URL is: http://www.lavasoftusa.com/software/adaware/ Find the link to download the free edition or you can purchase the Professional version. After you download and install Ad-aware, be sure to use the Check for Updates Now utility before you scan for problems; this will download the most current definition file. After running Ad-aware and removing all spyware entries that were identified, verify that you are able to connect to the Internet. If you are unable to connect, go to chapter 4 and use the recommended TCP/IP repair tool.
  • 6. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 4. The SpyBot Search and Destroy Weapon After running Ad-aware, the next step to clean up your PC and protect it in the future is to download SpyBot Search and Destroy. Patrick M. Kolla offers an outstanding free tool at: http://www.safer- networking.org/en/index.html Once again, after you download and install SpyBot Search and Destroy, use the update utility to get the latest definition file. After running SpyBot Search and Destroy and removing all spyware entries that were identified, verify that you are able to connect to the Internet. Another nice feature is the immunize program that will block a large database of know spyware sites. It is recommended that you immunize your computer after each definition file update. If you are unable to connect, go to chapter 4 and use the recommended TCP/IP repair tool. Many of the authors of the free tools recommended in this eBook accept and appreciate donations for their tools.
  • 7. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 5. TCP/IP Stack Repair Tool Many of the poorly written spyware programs end up corrupting the TCP/IP stack on your PC – this is the networking protocol that allows your PC to connect to the Internet. This handy tool can get you back online quickly after you have removed spyware from your PC. WinSockFix by Explicit Software Solutions can be downloaded from the following sites: http://www.tacktech.com/display.cfm?ttid=257 http://www.itc.virginia.edu/desktop/central/display/versions.php3?softwareID=67&nav=t itle After downloading the program, click and then click the button. After the program finishes running, reboot your computer and you should be able to connect to the Internet.
  • 8. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 6. On Patrol with WinPatrol WinPatrol is another layer in the defense systems you need to use on your PC. This neat little program will alert you to any changes that occur to critical system resources on your computer without your knowledge. Download this free tool at: http://www.winpatrol.com/ Scotty is the tool in this program that will alert you to a nefarious program’s attempt to install itself on your PC. Scotty’s bark is an invaluable defender of your computer. WinPatrol’s author also offers an enhanced version for a nominal cost.
  • 9. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 7. Preventative Measures After you finish cleaning the spyware off of your computer, it becomes an easy task to keep it that way. Begin a weekly preventative maintenance schedule to run Ad-aware and SpyBot Search and Destroy (run them immediately if you stumble into a hornets nest of spyware) in addition to the daily scan run by Microsoft AntiSpyware. Always download the most current definition files before scanning. Pay attention to any alerts that Scotty (WinPatrol) brings to your attention – unless you are installing a program, you should always answer no to Scotty’s question, “Is it OK to install __________”. Using these tools, in conjunction with an updated Anti-Virus program, will allow you to enjoy your Internet experiences with few or no problems. If you prefer to have the information and programs referenced in this eBook on CD, you will find it available at http://RepairCD.DominionRepair.com . This self-running CD contains all of the tools discussed in this eBook in addition to other critical preventative resources and recommendations to make your time on the Internet safe from intrusion.
  • 10. Copyright 2005 DRSI - All Rights Reserved www.DominionRepair.com 8. Reprint Information You are invited to use this eBook, in it’s entirety, in your publication or website. The only requirement is the inclusion of the following at the end of this article: Dominion Repair Service Inc has been helping the SOHO and Small/Medium Business community grow & prosper for over 20 years by selling and servicing computers and networks, solving start up problems, automating their offices, and is now proudly serving the booming wireless network market. Visit http://www.DominionRepair.com for the latest FREE tips & tricks. Email: Info@DominionRepair.com