TeMerc Internet Countermeasures
Adware, malware, spyware and hijacker information
|Home||About Our Forums||Enter Forums||About My Site||Newbie Reading||How'd I Get Infected?||Rules Of Protection||Infection Symptoms||Infection Help|
|Security Musts||AV-Firewall Protection||Countermeasures Apps||XP Acct. Protection||Security Scans||Browser Scans||Email & Ecurity||OE 6 Security||Vendor Forums|
|Forums I Visit||Excellent Websites||Win XP Links||Hero's In The Fight||Zero's||Tips\Misc. Info||Techionary||Tutorial Links||Email Us|
Must Have Security Programs
On this page I will provide to you
the most popular anti-spyware applications currently recommended by most
all security forums and member forums of
Most are free and can keep you fully
protected along with firewall and av apps. I encourage all to have at
least two different scanner\removers on board. See my own security testing
Ad-Aware 2007 June 19
This app is probably one of the most popular anti-spyware programs on the net. It offers excellent detection of all forms of adware and many other forms of spyware and malware as well.
Spybot Search & Destroy v1.5 Sept. 3
Another one of the best anti-spyware applications available. It detects many of the same types of malwares as Adaware does, and has some other nice features. Such as Tea Timer. This is a registry monitoring device, extremely helpful in these days of malwares dropping all sorts of nasties into the registry.
SpywareGuard v2.2 & SpywareBlaster v3.5.1
These two applications are the two often most
recommended security programs after AdAware & Spybot.
SpywareGuard, protects your homepage from being changed, using its heuristic scanning engine. Thusly, it is rarely updated.
SpywareBlaster prevents known ActiveX installs by setting kill bits into the registry. And many of the nastiest malwares get installed in this manner.
To manage your Internet Explorer security zones I strongly recommend using ZonedOut v3.5.
MVPS Hosts File
The Hosts file contains the mappings of IP
addresses to host names. This file is loaded into memory at startup,
then Windows checks the Hosts file before it queries any DNS servers,
which enables it to override addresses in the DNS. This prevents access
to the listed sites by redirecting any connection attempts back to the
local machine. Another feature of the HOSTS file is it's ability to
block other applications from connecting to the Internet, as long the
You can use a HOSTS file to block ads, banners, cookies, web bugs, and even most hijackers. This is accomplished by blocking the Server that supplies these little gems. Example - the following entry 127.0.0.1 ad.doubleclick.net blocks all files supplied by the DoubleClick Server to the web page you are viewing. This also prevents the server from tracking your movements.
To help manage host file updates, editing and create back ups, use HostsXpert v4.1
WinPatrol 2007 v12.2.2007 Oct 30
Scotty the Windows Watch Dog sniffs out malicious "mysteryware" and parasites that may assault your computer. WinPatrol puts you back in control of your computer so you'll know what programs are and should be running at all times.
Real-Time Anti-Spyware Comparison Chart
Clicking the link above will bring you to a page created by the good folks at Calendar of Updates. It gives you some detailed info as to what each of the major anti-spyware apps cover with their 'real time' protection. It also breaks down each app as it pertains to your specific OS. Very nicely done, good work to the guys there who spent the time to set it up.
Real-Time Protection Demonstration
Once again, from COU, Donna, noted MS MVP, has set up a nice little demonstration as to how the real time apps work when changes are made. Nice screenshots and descriptions of the actions happening.