home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2005 September
/
PCWorld_2005-09_cd.bin
/
software
/
temacd
/
spysweeper
/
SpySweeperSetup3398_EN.exe
/
{app}
/
readme.txt
< prev
next >
Wrap
Text File
|
2005-05-04
|
4KB
|
60 lines
-------------------------------------------
Spy Sweeper v4
(c) 2002-2005 Webroot Software, Inc.
http://www.webroot.com/
http://www.webroot.com/support/
-------------------------------------------
Works with Windows 98SE, ME, 2000, XP Pro and XP Home.
Note: Before scanning, to ensure proper removal of spyware, be sure to close any other
applications that are running on your system.
Description:
Spy SweeperÖ lets you protect your privacy and your computer from a variety of spyware programs,
from those that monitor all of your computer's activities (system monitors) to those that can steal
or destroy data (Trojan horses). It also detects programs that pop up ads on your computer when the
program is running (adware) and cookies that may contain and may transmit personal information (tracking cookies).
Spy SweeperÖ "sweeps" your computer looking for evidence of these programs, reports its findings, and
lets you decide whether to quarantine and remove the program or keep it running on your system.
Quarantining and removing programs will disable it until you decide to delete the program completely or restore it.
Software detected by Webroot Spy Sweeper
Adware:
Adware is advertising-supported software that displays pop-up advertisements whenever the program is
running. The software is usually available via free download from the Internet, and it is the
advertisements that create revenue for the company. Although seemingly harmless (aside from intrusiveness
and annoyance of pop-up ads), adware can install components onto your computer that track personal
information (including your age, gender, location, buying preferences, surfing habits, etc.). Most
advertising supported software doesn't inform you that it installs adware on your system, other than via
buried reference in a license agreement. In many cases the software will not function without the adware
component. Some Adware can install itself on your computer even if you decline the offer.
System Monitors Software:
System monitors are applications designed to monitor computer activity to various degrees. These programs
can capture virtually everything you do on your computer including recording all keystrokes, emails, chat
room dialogue, web sites visited, and programs run. System monitors usually run in the background so that
you do not know that you are being monitored. The information gathered by the system monitor is stored on
your computer in an encrypted log file for later retrieval. Some programs are capable of emailing the log
files to another location. Traditionally, system monitors had to be installed by someone with administrative
access to your computer, such as a system administrator or someone that shares your computer. However, there
has been a recent wave of system monitoring tools disguised as email attachments or "freeware" software products.
Trojan Horses:
Trojan Horses or Trojans are malicious programs that appear as harmless or desirable applications. Trojans are
designed to cause loss or theft of computer data, and to destroy your system. Some Trojans, called RATs
(Remote Administration Tools), allow an attacker to gain unrestricted access of your computer whenever you are
online. The attacker can perform activities such as file transfers, adding/deleting files or programs, and
controlling the mouse and keyboard. Trojans are generally distributed as email attachments or bundled with
another software program.
Other:
There are many other suspicious and/or annoying programs that can find their way onto your computer without
your express knowledge. These programs often come bundled with third-party programs or can be installed as
ôdrive-by downloads.ö Some of these programs have spyware capabilities, while others may serve as an annoyance
or negatively affect your system resources. There are many terms for these types of programs including scumware,
annoyanceware, parasites, malware, etc.