| Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
| World Community Grid Forums
|
| No member browsing this thread |
|
Thread Status: Active Total posts in this thread: 5
|
|
| Author |
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Spycatcher Deadly to Spyware - But Watch Out
----------------------------------------By Jack M. Germain -TechNewsWorld - 03/05/05 1:30 AM PT When you visit the same Internet havens for secret spyware infections, the spyware you previously removed from your computer easily reinfests your computer. This makes spyware chasing an ever-present maintenance task. Not so with SpyCatcher 3.5. It goes one big step further. It prevents spyware from re-installing. The recent release of Tenebril's SpyCatcher 3.5 packs several high-powered features. Its sophisticated detection engine requires less memory to scan a computer and its components, resulting in scans up to 300 percent faster than earlier versions and most competitive products. SpyCatcher brings more intrusion-fighting features to consumers and enterprise customers than are found in other anti-spyware products. It eliminates spyware, adware, trojans and other malicious software. While most, if not all, other anti-spyware software finds and removes intrusive programs while they are active, when you reboot the computer, the newest pesky critter codes resurrect themselves from deep within the Windows Registry, hidden folders, and already-deleted files Spyware Reinstallation Prevented. Also, when you visit the same Internet havens for secret spyware infections, the removed spyware easily reinfests your computer. This makes spyware chasing an ever-present maintenance task. Not so with SpyCatcher 3.5. It goes one big step further. It prevents spyware from re-installing. SpyCatcher also adds other new features that provide further protection. These include Anti-Phishing Capability, Parachute recovery Feature, and Host File Analyzer. But use it carefully, because it packs a big punch against some files it deems suspicious. SpyCatcher's Protector feature warns users when an illegitimate Web page is phishing, or posing as a bank or other official source in order to steal information. This patent-pending method compares the content of a Web page visited to the content of the real Web page. Identity theft works largely because consumers are duped through phishing into clicking an innocent-looking link to a friendly Web site. The real URL, however, is cleverly concealed so the computer user ends up at a fake Web site that captures innocently entered personal data. Spycatcher provides an instant warning if the contents of the Web page match even approximately, yet the proper domain name is not indicated. This makes consumers practically fool-proof safe from being tricked into giving up bank account numbers and passwords. Parachute Safety One of the most notorious tricks built into some spyware is the ability to activate itself from the moment that the Windows operating system starts up. The Parachute Feature defeats this stealth attack. SpyCatcher runs ahead of the computer's boot routine. If it detects spyware loading at startup, the Parachute component boots the computer in Safe Mode, deletes the spyware, then restarts the computer. What makes this feature even more innovative is the notification system. SpyCatcher immediately issues an alert so the user can tell which sites are generating the illicit activity. To ensure changes can be undone if desired, the software tracks changes in a work history log. SpyCatcher 3.5 monitors every part of the user's PC, including memory, registry, network drives, hard disks and removable or optical drives, ensuring complete protection. Hijackers Nixed Another area of concern is that computers maintain a host file to tell Internet Explorer and other browsers where to look when instructed to visit a Web site. Spyware writers can cleverly redirect the computer's attention while rogue programs rewrite the entries. SpyCatcher compares the host file with what the Internet says the Web site URL should be. Thus, SpyCatcher can block re-writing of the file and redirecting of users to unwanted sites. "If spyware never changed, it would be easy to stop. Unfortunately it continually evolves, escaping detection," Joshua Blanchfield, chief executive officer of Tenebril, told TechNewsWorld. "Just as spyware, adware and phishing scams have become more insidious and sophisticated, SpyCatcher has adapted as well." Bridging the Gap Tenebril's CEO Blanchfield is quick to admit that SpyCatcher won't wipe out the spyware threat. "This isn't a silver bullet," he told TechNewsWorld. "Companies pushing spyware are money driven, so they will be back with newer and better tactics." Blanchfield noted that spyware authors are very creative and adapt their strategies quickly. "It's hard to say if we've caught up with them. But today we are ahead," he said. Use Caution On a personal note, in testing this latest release of SpyCatcher, I was both helped and hindered slightly. So take my advice and use this program very carefully -- but use it. I'm not criticizing the program's performance. I found that it measures up to Tenebril's claims very well. However, unlike any other anti-spyware product I have tested or use regularly, SpyCatcher needs your undivided attention when removing spyware traces. I failed to follow an old program reviewer's golden rule. I installed it late at night and was caught off guard when the search engine finished scouring the hard drive all-too-soon. SpyCatcher found more than one dozen incidents of spyware components on a system that I had earlier in the day checked with three other products and gotten an all clear. These anti-spyware packages where all up-to-date. It was late. I got careless. SpyCatcher removed the majority of spyware fast and clean. However, I wanted more. So I told it "yes" when quizzed about removing some dozen suspicious files. Yes, I was sure! Overzealous Removal However, I should not have been so anxious. If I had taken the time to actually study the list of targeted file names in the suspicious list, I would have recognized some "don't go there" file names. Sure, there were suspicious files in that list. However, there also were a few rather significant legitimate files. One was a configuration control for the video driver. Another was the software for my flat screen's pivot feature. A third was the OCX file from the Windows Registry associated with another intrusion protection service that I use regularly. What happened next should be all too obvious. When I rebooted the computer, the monitor was decorated with numerous messages about configuration errors and missing program components. All were from legitimate programs that lived on the hard drive before spyware was invented. Oh yes, the screen resolution was locked into the lowest possible resolution setting. It took me hours to reinstall and reconfigure the damage I had done by my carelessness. SpyCatcher is so thorough that I could not undo my mistakes easily. Windows had no record of any system changes, so I could not simply go back to an earlier checkpoint. The Moral SpyCatcher is a powerful, innovative anti-spyware package. It does what Tenebril says it will do. It found spyware and related trace elements that other "innovative" anti-spyware programs on my hard drive never saw or could not see. Those culprits have not reinstalled themselves. Nothing new has slipped past SpyCatcher, either. And I haven't admitted to the program that I am sure about removing all suspicious files since my initial disastrous encounter. Pricing and Availability SpyCatcher 3.5 is available for a one-time fee of US$29.95 including free auto-updates. It is offered as a free upgrade to current users of SpyCatcher 3.0. The product may be purchased via Tenebril's Web Site as well as through all major computer electronics stores in the U.S. and the UK, both online and retail. I cant recommend it enough, it's as good as it gets Regards [Edit 2 times, last edit by Former Member at Mar 5, 2005 10:21:13 PM] |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Hi Graham,
I have to agree it's a good program, I use the full package Ghostsurf, I'd like to ask if anybody knows if this package would interfere with a router/modem with firewall, I've a second computer to use for work units. The router would be netgear dg834. Thanks koko |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Hi KoKo
I do not have an answer but one of the Community Admins may read this thread and have an answer for you |
||
|
|
David Autumns
Ace Cruncher UK Joined: Nov 16, 2004 Post Count: 11062 Status: Offline Project Badges:
|
I know it's a crazy idea that Microsoft should release Antispyware given that hey you know where I'm going with this.
----------------------------------------But I'm a convert it works and it has found Spyware that the other 2 stalwarts Lavasofts Adaware and Spybot - Search and Destroy didn't find. I'm running it with the the very same Netgear Router without any issues. I would recommend Microsoft AntiSpyware as your first line of defense (It won't allow them on board) and a weekly treatment with Lavasoft Adaware and Spybot to tidy up your cookies. The advantage of using these 3 is that they are all FREE Links below http://www.microsoft.com/athome/security/spyware/software/default.mspx http://www.safer-networking.org/en/download/ http://www.lavasoft.de/ Here's a link to an equally great free Antivirus program http://www.free-av.com/ and if you don't think your Microsoft Firewall is up to the job here's another free firewall program http://smb.sygate.com/products/spf_standard.htm With these programs installed you won't go far wrong. I'm using them all with no ill effects and they are all Free. "Crunching on the Cheap" will be in all good bookstores (are there really any bad ones?) by Christmas. Regards Dave ![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Next time you install late at night and your system goes south,
restore you latest (or second to latest) restore point before attempting a re-install. Recover from a corrupted registry (corrupt SYSTEM, corrupt SOFTWARE, etc.), preventing XP from starting 1. Insert the Windows XP startup disk into the floppy disk drive, or insert the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer. 2. When the "Welcome to Setup" screen appears, press R to start the Recovery Console. 3. Select the installation that you want to access from the Recovery Console. NOTE: if you don’t select an installation, i.e. #1, clicking Enter will reboot the PC. 4. When you are prompted to do so, type the Administrator password. If the administrator password is blank, just press ENTER. 5. At the Recovery Console command prompt, type: cd \windows\system32\config ENTER ren system system.bad ENTER ren software software.bad ENTER ren sam sam.bad ENTER ren security security.bad ENTER ren default default.bad ENTER 6. Change directory to the _restore subfolder. The following path is an example of a the _restore folder: C:\System Volume Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8} i.e. cd “c:\ System Volume Information” dir (Note the _restore directory subfolder) cd _restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8} Change to the second-to-last Snapshot folder. i.e. dir (Note the date/time of the RPn folders and number of the second to latest). Taking the second-to-latest will almost guarantee a successful recovery. If you take the latest Snapshot folder, you may be restoring the system to a bad state. You can try the latest directory if you want to chance repeating steps 1-6 if rebooting fails. cd RPn (where n is the number of the Snapshot folder you want to use for recovery). The following path is an example of a folder path to the Snapshot folder: C:\System Volume Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}\RP1\Snapshot 7. From the Snapshot folder, copy the following files to the \windows\system32\config directory _REGISTRY_USER_.DEFAULT _REGISTRY_MACHINE_SECURITY _REGISTRY_MACHINE_SOFTWARE _REGISTRY_MACHINE_SYSTEM _REGISTRY_MACHINE_SAM i.e.: copy _REGISTRY_USER_.DEFAULT \windows\system32\config ENTER copy _REGISTRY_MACHINE_SECURITY \windows\system32\config ENTER copy _REGISTRY_MACHINE_SOFTWARE \windows\system32\config ENTER copy _REGISTRY_MACHINE_SYSTEM \windows\system32\config ENTER copy _REGISTRY_MACHINE_SAM \windows\system32\config ENTER 8. Type “exit” to reboot and cross your fingers. Once you have successfully restarted your PC, you can delete the \windows\system32\*.bad files. |
||
|
|
|