Windows Knowledgebase |
ß Back www.TryWare.Dk
There are thousands of SpyWare-programs out there, but your computer is now
searched
automatically for about 240 of them ...
You should use at least one of each of
the following 7 issues:
Protect
against: |
|
What is it ???
|
1.
Virus 2.
SpyWare 5.
Firewall 7.
Spam |
1.
3.
4.
5.
6.
7.
|
This document was granted points on
www.experts-exchange.com
Virus: Malicious programs that harms your computer |
You should purchase a good antivirus solution
with many updates a week. An old antivirus program without automatic/manual
updates doesn't protect you at all. |
|
AVG Specialized Utilities for Virus
Removal and Handbooks for Manual Virus Removal Use
this free online Trend Housecall scanner to find and
clean every known virus/rootkits/backdoors: |
SpyWare: Malicious programs that collects your internet browsing for
advertising purposes, and installs lots of garbage programs. |
|
Pest Patrol … because: 1.
The program is not installed on the
computers. Scanning is run or scheduled by a central management console on
server. Nothing is visible for the users, and they don't have to start a
program to scan their hard disc. A log is saved in the management console,
and an email to administrator if nessessary. 2.
Ad-Aware og Spybot are currently the most
welknown anti-spyware-programs known on technical communities, but PestPatrol
found 4 spyware-programs on my company-computer, after I "cleaned"
it with Ad-Aware. You can use the FREE online pestscan from
PestPatrol Free 30 days Trial
License from Pestpatrol |
If
no result with your first choice, you should try more than one of these
programs
|
Trojans/backdoors: Unwanted
access to your computer |
|
|
Internet connection - check security |
|
PestPatrol free port checker: Find out which ports are used for malware. http://research.pestpatrol.com/Downloads/PortChecker/PortChecker.exe
|
|
Firewall: Protect yourself from unwanted use of your internet connection. |
|
|
|
Patches/hotfixes from Microsoft: Lots of security holes fixed each week. |
|
|
|
|
Spam: Emails that you don't want to receive |
|
|
This
document was granted points on www.experts-exchange.com |
|||
025: |
Comment from trywaredk |
Accepted Answer from trywaredk |
|
024: |
|
Accepted Answer from trywaredk |
|
023: |
|
Assisted Answer from trywaredk |
|
022: |
|
Assisted Answer from trywaredk |
|
021: |
|
Assisted Answer from trywaredk |
|
020: |
How
do I put a condom on a student's unsafe PC now on *my* LAN? |
|
Accepted Answer from trywaredk |
019: |
Comment from trywaredk |
Accepted Answer from trywaredk |
|
018: |
Harmless
Intruder or Sleeping Giant Sitting on PC in Restricted Zone |
|
Accepted Answer from trywaredk |
017: |
|
Accepted Answer from trywaredk |
|
016: |
Comment from trywaredk |
Accepted Answer from trywaredk |
|
015: |
|
Assisted Answer from trywaredk |
|
014: |
|
Assisted Answer from trywaredk |
|
013: |
Please
help, I have backdoor.winshell on a windows NT back office small business
server system. |
Comment from trywaredk |
Assisted Answer from trywaredk |
012: |
|
Assisted Answer from trywaredk |
|
011: |
|
Assisted Answer from trywaredk |
|
010: |
|
Accepted Answer from trywaredk |
|
009: |
|
Assisted Answer from trywaredk |
|
008: |
|
Assisted Answer from trywaredk |
|
007: |
|
Accepted Answer from trywaredk |
|
006: |
|
Accepted Answer from trywaredk |
|
005: |
|
Assisted Answer from trywaredk |
|
004: |
|
Accepted Answer from trywaredk |
|
003: |
|
Accepted Answer from trywaredk |
|
002: |
|
Accepted Answer from trywaredk |
|
001: |
|
Accepted Answer from trywaredk |
:o) Your
brain is like a parachute. It works best when it's open
w2k local admin group windows
2000 permissions
local admin group W2k: Your
colleague's got total power of Your pc from his own computer on Your corporate
Network: Read TryWareDk's Website - Microsoft Windows 2000 HTML Securityhole
Member Local Administrators Group Hotfix Admin Admins Administrator Groups
Members Security Office program programs software freeware shareware Outlook
Distributionsliste Email Adressbook Adressebog Mandatberegning
event eventlog intranet event-id event-source
applications system security error
warning information