Privacy=From the license agreement shown upon install: You are not allowed to use any third party program (e.g Ad-aware) to uninstall application bundled with RadLight. Such programs will be removed. If you want to uninstall them, you may do so via Add/Remove in Windows' Control Panel.
Description=This application tries to remove Ad-Aware files upon install (a newer release warns clearly about that). Removal of these files is only recommended and necessary if you no longer comply to their license agreement.
Privacy=Author unknown (referrer ID: AAL611 at www.ignifuge.com)
Description=This application promises to be the alround solution to scan for viruses, clean the harddisk and more, but really is just a small window labeled 'MONEY' and a bigger banner, and by clicking on one of them the user gets redirected to a website where the unknown author gets money for every person he refers.
Description=Upon installation, sends mails to all people on your email contact list. See also http://vil.nai.com/vil/content/v_99760.htm
SalisburyID=23
[TotemShared Updater]
Threat=Malware
Description=Updater sending out statistics. Is kept even when host application is uninstalled. The startup entry is named as Uninstall0001 to fool the user into thinking this would be a one-time entry and not a permanent updater.
Description=Spends your bandwidth by downloading content that you 'may' want to see in the future, and allowing other users of the same client to download from your computer.
Privacy=When you are on-line, therefore, the Software may share Published Content that resides on your computer system with other Red Swoosh Clients that have requested such Published Content.%0D%0AFinally, from time to time the Red Swoosh Client may download to your computer system a particular item of Published Content or other information that may be of interest to you, as determined by the Published Content you have downloaded in the past.%0D%0AWe do need to monitor and retain the version of your Web browser, your computer's operating system, your connection speed, your Internet protocol address, the identifier associated with your Red Swoosh Client, and the Published Content that is available on your computer for download through the Red Swoosh network, and we also monitor and retain information regarding the transmission of Published Content as described below.%0D%0ATo attempt to make your downloads more efficient, Red Swoosh needs to know when you are online. Accordingly, each time a computer on which a Red Swoosh Client is installed logs on to the Internet, our server notes the time that it logged on and collects the information described in Section 3(b).
SalisburyID=25
[DyFuCA]
EditDate=20030120
Threat=Malware
Description=Drive-by download connecting to sextracker.com and trying to download Internet Optimizer by Avenue A Media
[ComLoad]
EditDate=20030130
Threat=Malware/Security risk
Description=ActiveX control that will allow websites to load and run any executable program. Used for example by Coulomb ( http://www.coulomb.co.uk/ ). More information: http://www.doxdesk.com/parasite/Comload.html
[Haczyk]
EditDate=20030130
Threat=Malware
Description=Installs unwanted, function unknown, but has a lot of tasks running at system startup.
[BPS Spyware Remover]
Company=BulletProofSoft
Threat=Malware
Description=Uses a stolen Spybot-S&D database and is therefore a copyright infringement.
[SpywareNuker]
Threat=Adware/Possible spyware/Malware
EditDate=20021208
CompanyURL=http://www.trekblue.com/
CompanyProductURL=http://www.spywarenuker.com/
company=TrekBlue
Functionality=Supposed spyware removal utility.
Privacy=4. ACKNOWLEDGEMENT OF VALUE-ADDED APPLICATIONS%0D%0AYou acknowledge that the "Trek Blue" Program(s) include technology which allows "Trek Blue" to provide updates to the software directly to your computer. Additionally, you acknowledge that you wish to receive software and technology as updates at the discretion of "Trek Blue" for the purposes of complimenting or enhancing the "Trek Blue" Program(s). By installing, downloading, copying, updating or otherwise using the "Trek Blue" Program(s), you specifically agree to include and/or accept the noted software and technology through which "Trek Blue", its subsidiaries, affiliates, partners, divisions, and clients provide value-added upgrades and applications to your computer. You acknowledge that you desire to receive value added applications, if any, from "Trek Blue", its subsidiaries, affiliates, partners, divisions, and clients. You acknowledge that you desire to receive value-added content and applications as a condition to using the "Trek Blue" Program(s).
Description=Heavily advertisement by spam (unsolisicited email advertisement); phoning home on program start; silently installing updates and content (meaning advertisement) into your system. Those applications may even come from third parties. No limitation is made about this 'value-added' content, meaning the license allows them to install any spyware into your system without your knowledge. In addition, using the program isn't safe - LSP hijackers get removed, but the Winsock not fixed so you would loose your internet connections. Uses a stolen Spybot-S&D database and is therefore a copyright infringement.