419 Unable to create a System Restore Point. Do you want to continue with spyware cleaning?
420 According to the previous setting, ActiveX Control Installation has been allowed
421 According to the previous setting, ActiveX Control Installation has been blocked
422 SpyEraser has detected a new ActiveX Control being installed. ActiveX Control is a program that can be re-used by many application programs within a computer or among computers in a network. Because it has the ability to download automatically and execute in a Web browser it is highly used by spyware authors to create computer viruses, Trojans and worms infections.
423 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
424 Report to the community
425 Allow
426 Block
427 ActiveX installations
428 to do.......
429 Monitors for additions of downloaded ActiveX controls through Internet Explorer.
430 Monitors for additions of downloaded ActiveX controls through Internet Explorer.<br>ActiveX controls are programs that are downloaded from web sites and are stored on your computer.<br><br>These applications are typically stored in <b>C:\windows\Downloaded Program Files</b>.<br><br>They are also referenced in the registry by their CLSID which is the long string of numbers between the curly braces.<br><br>There are many ActiveX controls that Internet Explorer regularly uses.<br><br>If you are uncertain of the function of an ActiveX application, you can typically delete it without harm to your computer.<br><br>If you later find you need this application Windows will automatically re-download it for you when you visit a web site that needs the ActiveX control.<br>
431 allow
432 block
433 Adding Application Restrictions to the Installed Components List has been allowed, as per the previous setting.
434 Adding Application Restrictions to the Installed Components List has been allowed, as it is free of spyware.
435 Adding Application Restrictions to the Installed Components List has been blocked, as per the previous settings.
436 SpyEraser can forbid user from running certain Windows programs by setting RestrictRun option.
437 <br><br>Workaround: You should block it as these modification are not normally not needed.
438 An Application Restriction has been Allowed
439 An Application Restriction has been Blocked
440 Approval needed for an Application Restriction setting
441 Application Restrictions
442 Application Restrictions
443 It restricts illegal intrusions and alterations to the applications restriction policies.
444 This option forbids the user from running certain Windows programs by setting RestrictRun option.
445 According to the earlier settings, Browser Helper Object(BHO) has been allowed.
446 As Browser Helper Object(BHO)is not recognized as a spyware it has been allowed.
447 According to the earlier settings, Browser Helper Object(BHO) has been blocked.
448 SpyEraser has detected a Browser Helper Object that is trying to install itself within your Web browser. A Browser Helper Object (BHO) module is designed as a plug-in for Internet Explorer Web browser to provide added functionality. This type of plug-in are commonly used by utilities like search toolbars. However, the malicious software like spyware, adware or browser hijackers often use BHOs to pop-up advertisements or study your browsing pattern, because a BHO has access to each URL you visit and can redirect you or display other pages than you requested (ads, for example).
449 An Internet Explorer Explorer Bar has been Allowed.
450 An Internet Explorer Browser Helper Object(BHO) has been Blocked
451 A Browser Helper Object(BHO) has been Allowed
452 Approval needed for an unknown Browser Helper Object(BHO)
453 Browser Helper Objects
454 It keeps a check on the additions made to your Internet Explorer Browser Helper Objects (BHO).
455 A Browser Helper Object (BHO) module is designed as a plug-in for Internet Explorer Web browser to provide added functionality. This type of plug-in are commonly used by utilities like search toolbars. However, the malicious softwares like spywares, adwares or browser hijackers often use BHOs to pop-up advertisements or study your browsing pattern, because a BHO has access to each URL you visit and can redirect you or display other pages than you requested (ads, for example).
456 According to the earlier settings, Disable Regedit Policy has been allowed.
457 According to the earlier settings, Disable Regedit Policy has been blocked.
458 SpyEraser has detected that Regedit policy has been modified. Spyware programs use this policy to prevent disabling of spyware in registry.
459 <br><br>Workaround: Block the change if it is not done by System Administrator
460 Remember this action
461 Disable Regedit Policy
462 Disable Regedit Policy
463 It forbids spyware to disable Regedit function.
464 Windows Registry Editor (regedit.exe) can change an entry in the system registry, but Disable Regedit Policy prevents execution of this utility. Spyware programs use this policy to prevent disabling of spyware in registry.
465 According to the earlier settings, Third Party Cookies has been allowed.
466 According to the earlier settings, Third Party Cookies has been blocked .
467 SpyEraser has detected a Third Party Cookie being added to the list. Third Party Cookies are those that are not from the Web site you are currently visiting (i.e. you are visiting Ebay and you receive cookies from Yahoo).
468 <br><br>Workaround: The Third Party Cookies should be blocked if they are not necessary.
469 Internet Explorer Third Party Cookies
470 Third Party Cookies
471 It restricts illegitimate cookies to be added to the Third Party Cookies list.
472 Third Party Cookies are those that are not from the Web site you are currently visiting (i.e. you are visiting Ebay and you receive cookies from Yahoo).
473 According to the earlier settings, Internet Explorer Menu Extention has been allowed.
474 As Internet Explorer Menu Extention is not recognized as a spyware it has been allowed.
475 According to the earlier settings, Internet Explorer Menu Extention has been blocked.
476 A new add-up in the Internet Explorer Menu Extention list has been detected by the SpyEraser. Internet Explorer Menu Extensions are menu options found in the Context Menu of Internet Explorer.
477 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
478 An unknown Internet Explorer Menu Extention has been detected.
479 Internet Explorer Menu Extension
480 Internet Explorer Menu Extension
481 It restricts unauthorized changes that can be made to Menu Extensions in Internet Explorer.
482 The Context Menu of Internet Explorer is called to be Internet Explorer Menu Extensions. These are the menu items available at right-clicking a Web page of a browser.
483 According to the earlier settings, changes to Internet Explorer Reset Web Settings file has been allowed.
484 According to the earlier settings, changes to Internet Explorer Reset Web Settings file has been blocked.
485 Changes in the Internet Explorer Reset Web Settings file have been detected by SpyEraser. Internet Explorer contains a file iereset.inf stored in %windir%\inf\ directory that restores the appearance of the user interface to default values, i.e. to the same appearance as at the initial start-up of the program. The spyware can infect this file, which consequently affects your system.
486 <br><br>Workaround: Block the change if it is not done by System Administrator.
487 Internet Explorer Reset Web Settings
488 Internet Explorer Reset Web Settings
489 It restricts changes that can be made to Internet Explorer 'Reset Web Settings' by spyware.
490 Internet Explorer contains a file iereset.inf stored in %windir%\inf\ directory that restores the appearance of the user interface to default values, i.e. to the same appearance as at the initial start-up of the program. The spyware can infect this file, which consequently affects your system.
491 According to the earlier settings, Internet Explorer Restrictions has been allowed.
492 According to the earlier settings, Internet Explorer Restrictions has been blocked.
493 Changes in the Internet Explorer Reset Web Settings file have been detected by SpyEraser. Some features and behaviors of Internet Explorer can be controlled by the user. Internet Explorer Restrictions is a policy that allows system administrators to selectively control a range of features available in Microsoft Internet Explorer.
494 <br><br>Workaround: Block the change if it is not done by System Administrator.
495 Remove
496 Internet Explorer Restrictions
497 Internet Explorer Restrictions
498 It restricts illegitimate changes that can be made to the Internet Explorer Restrictions policy setting.
499 Using Internet Explorer Restrictions policy the administrators can prohibit the users from changing certain settings in Internet Explorer, say setting new homepage. Though, spywares can also use this policy restriction and prohibit user from making changes to their own computer.
500 According to the earlier settings, changes to Internet Explorer Security Zones has been allowed.
501 According to the earlier settings, changes to Internet Explorer Security Zones has been blocked.
502 Changes to the Internet Explorer Security Zones have been detected by SpyEraser. The Internet Explorer Security zone is used to set and change options that can help protect your computer from potentially harmful or malicious online content.
503 <br><br>Workaround: Block the change if it is not done by System Administrator.
504 Internet Explorer Security Zones
505 Internet Explorer Security Zones
506 It restricts illegitimate changes that can be made to Internet Explorer Security Zones.
507 The more you download contents from Internet the higher are your chances to get infected by spyware. The Internet Explorer Security zone is used to set and change options that can help protect your computer from potentially harmful or malicious online content. Internet Explorer divides Websites into four security zones: Internet, Local intranet, Trusted sites, or Restricted sites. The zone to which a Website is assigned specifies the security settings that are used for that site. Enhanced security coupled with your browsing habit is a balance act. However, higher security settings may at times conversely act by preventing access to legitimate Web sites.
508 The <B>%s</B> Web site, trying to add itself to the Internet Explorer Trusted Sites list has been detected by SpyEraser. Contents of Web sites located in Trusted Sites zone are considered more reputable or trustworthy than other sites on the Internet. Users can assign a higher trust level to these sites to minimize the number of authentication requests.
509 <br><br>Workaround: Block the change if it is not done by System Administrator.
510 Internet Explorer Trusted Sites
511 Internet Explorer Trusted Sites
512 It restricts unwanted sites from being added to your list of Trusted Sites.
513 Contents of Web sites located in Trusted Sites zone are considered more reputable or trustworthy than other sites on the Internet. Users can assign a higher trust level to these sites to minimize the number of authentication requests.
514 Adding ActiveX Component to the Installed Components List has been allowed, as per the previous setting.
515 Adding ActiveX Component to the Installed Components List has been allowed, as it is free of spyware.
516 Adding ActiveX Component to the Installed Components List has been blocked, as per the previous settings.
517 SpyEraser has detected a new component being added. Installed Components are programs that are installed on a machine. A program is installed using an installer, which creates its sub-directory and places other utility files in this directory.
518 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
519 An Installed Component has been Allowed.
520 An Installed Component has been Blocked.
521 Approval needed for an unknown Installed Component.
522 Installed Components
523 Installed Components
524 It keeps a check if additions are made to the Installed Components list.
525 The registered programs or applications installed on your computer.
526 Internet Explorer Explorer Bar has been allowed as per earlier settings.
527 Internet Explorer Explorer Bar has been allowed as it is not recognized as a spyware.
528 Internet Explorer Explorer Bar has been blocked as per earlier settings.
529 SpyEraser has detected an Explorer Bar being added. Explorer Bar is a pane displayed adjacent to the browser edges inside the Internet Explorer window and is used to display additional information to the user.
530 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
531 <br><br>ClSID:
532 <br>Filename:
533 An Internet Explorer Explore Bar has been blocked
534 Approval needed for an unknown Internet Explorer Explorer Bar
535 Internet Explorer Explorer Bar
536 Internet Explorer Explorer Bar
537 It restricts unauthorized changes made to Explorer Bars in Internet Explorer.
538 Explorer Bar is a pane displayed adjacent to the browser edges inside the Internet Explorer window and is used to display additional information to the user. The panels like Favorites, History or Search are categorized under Explorer Bars. With the help of Explorer Bar Maker, users can create their own Explorer Bar from any HTML page, picture or Macromedia Flash file. It can be used by companies to advertise their products and services, which could hamper your browsing experience.
539 According to the earlier settings, Internet Explorer Extension has been allowed.
540 According to the earlier settings, Internet Explorer Extension has been allowed as it is not recognized as a spyware.
541 According to the earlier settings, Internet Explorer Extension has been blocked.
542 An Internet Explorer Extension trying to be added itself has been added by SpyEraser. Internet Explorer toolbar buttons or the items placed in the Tools menu of Internet Explorer, which are not include in the default installation, are controlled by Internet Explorer Extensions. The toolbar button can run an application, a script, or open an Explorer Bar.
543 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
544 An Internet Explorer Explorer Bar has been Allowed
545 An Internet Explorer Explorer Bar has been Blocked
546 Internet Explorer Extensions
547 Internet Explorer Extensions
548 It keeps a check on changes that can be made to Internet Explorer toolbar buttons.
549 Internet Explorer toolbar buttons or the items placed in the Tools menu of Internet Explorer, which are not include in the default installation, are controlled by Internet Explorer Extensions. The toolbar button can run an application, a script, or open an Explorer Bar.
550 According to the earlier setting, Internet Explorer Plug-in has been allowed.
551 According to the earlier setting, Internet Explorer Plug-in has been blocked.
552 An Internet Explorer Plug-in is trying to be add itself to the list has been detected by SpyEraser. Internet Explorer Plug-ins is a program that can interact with another program to provide a certain, usually very specific function. Such programs start with the launch of Internet Explorer. This is an extended source for third-party companies to incorporate their utilities in Internet Explorer. However, it is also one of the channels for spyware or other malicious programs to find place in your computer.
553 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
554 Internet Explorer Plug-ins
555 Internet Explorer Plug-ins
556 It controls utilities that installs as plug-ins in Internet Explorer.
557 Internet Explorer Plug-ins is a program that can interact with another program to provide a certain, usually very specific function. Such programs start with the launch of Internet Explorer. This is an extended source for third-party companies to incorporate their utilities in Internet Explorer. However, it is also one of the channels for spyware or other malicious programs to find place in your computer.
558 According to the earlier setting, changes to Internet Explorer Security Settings has been allowed.
559 According to the earlier setting, changes to Internet Explorer Security Settings has been blocked.
560 Changes on your Internet Security Settings has been detected by SpyEraser.
561 <br><br>Workaround: Block the change if it is not done by System Administrator.
562 Internet Explorer Security Settings
563 Internet Explorer Security Settings
564 It restricts illegitimate changes that can be made to Internet Security Settings.
565 It restricts illegitimate changes that can be made to Internet Security Settings.
566 Adding Internet Explorer ShellBrowser to the system has been allowed, as per the previous setting.
567 Adding Internet Explorer ShellBrowser to the system has been allowed, as it is not recognized as a spyware.
568 Adding Internet Explorer ShellBrowser to the system has been blocked, as per the previous settings.
569 SpyEraser has detected a change to the Internet Explorer ShellBrowser. Settings of Internet Explorer instances are stored in Internet Explorer ShellBrowser. ShellBrowser can take full control over Internet and its components like toolbars, menus, etc when any modification or add-ups are made to the list.
570 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
571 An Internet Explorer ShellBrowser has been Allowed.
572 An Internet Explorer ShellBrowser has been Blocked.
573 Approval needed for an unknown Internet Explorer ShellBrowser
574 Internet Explorer ShellBrowser
575 It restricts changes that can be made to the Internet Explorer Shell.
576 Settings of Internet Explorer instances are stored in Internet Explorer ShellBrowser. ShellBrowser can take full control over Internet and its components like toolbars, menus, etc when any modification or add-ups are made to the list.
577 Internet Explorer ShellBrowser
578 Adding of Toolbar to the Internet Explorer has been allowed, as it is free of spyware.
579 Adding of Toolbar to the Internet Explorer has been allowed, as per the previous settings.
580 Adding of Toolbar to the Internet Explorer has been blocked, as per the previous settings.
581 An Internet Explorer Toolbar trying to add itself has been detected by SpyEraser. Internet Explorer Toolbar is a horizontal strip of buttons ducked under the Menu Bar and provides shortcut for commonly used commands.
582 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
583 Approval need for an unknown Internet Explorer Toolbar.
584 Internet Explorer Toolbars
585 Internet Explorer Toolbars
586 It keeps a check on the changes made to Internet Explorer Toolbar.
587 Internet Explorer Toolbar is a horizontal strip of buttons ducked under the Menu Bar and provides shortcut for commonly used commands.
588 Changes made on your Internet Explorer preset URLs has been detected by SpyEraser. Most spyware change Internet Explorer URLs to redirect browser homepage to porn or malicious Web sites, shows ads or installs other malicious plug-ins in Internet Explorer.
589 <br><br>Workaround: Block the change if it is not done by System Administrator or by a trusted software.
590 <BR><BR>URL Type:
591 <BR>URL :
592 Changes made to Internet Explorer URL has been Allowed
593 Changes made to Internet Explorer URL has been Blocked
594 Approval needed for Internet Explorer URL
595 Internet Explorer URLs
596 It keeps a check on the predefined URLs in Internet Explorer.
597 Most spyware change Internet Explorer URLs to redirect browser homepage to porn or malicious Web sites, shows ads or installs other malicious plug-ins in Internet Explorer.
598 An addition in the Internet Explorer's WebBrowser has been detected by SpyEraser. Settings of Internet Explorer instances are stored in Internet Explorer WebBrowser.<br>WebBrowser can take full control over Internet and its components like toolbars, menus, etc when any modification or add-ups are made to the list.
599 <br><br>Workaround: Block the change if it is not done by System Administrator or by a trusted software.
600 An Internet Explorer WebBrowser has been Allowed
601 An Internet Explorer WebBrowser has been Blocked
602 Approval needed for an unknown Internet Explorer WebBrowser
603 Internet Explorer Web
604 Internet Explorer WebBrowser
605 It prevents changes made to Internet Explorer Web browser.
606 Settings of Internet Explorer instances are stored in Internet Explorer WebBrowser. WebBrowser can take full control over Internet and its components like toolbars, menus, etc when any modification or add-ups are made to the list.
607 According to the earlier setting, adding new process execution to the Internet Explorer has been allowed.
608 According to the earlier setting, adding new process execution to the Internet Explorer has been blocked.
609 SpyEraser has detected a spyware program that is trying to run itself.
610 <br><br>Workaround: Unless the user needs and trusts the software, it should be removed from the system.
611 Process Execution
612 A Script has been Allowed to run.
613 A Script has been Blocked to run.
614 A Script is trying to run itself.\nDo you want it to run?.
615 Process Execution
616 It prevents the downloaded spyware programs to execute automatically.
617 The Security Guards running on your computer will prompt a message to allow or block the execution of unknown program when it runs for the first time. Thus, if a spyware or a malicious program is installed, you can enhance security by removing such programs on receiving any warning.
618 According to the earlier settings, addition of a new running process to the Internet Explorer has been allowed.
619 According to the earlier settings, addition of a new running process to the Internet Explorer has been blocked.
620 SpyEraser has detected a spyware program that is trying to run itself.
621 <br><br>Workaround: Unless the user needs and trusts the software, it should be removed from the system.
622 A running process has been blocked.
623 Running process
624 Running Process
625 It keeps a check on the running processes and memory utilized by such processes.
626 The Security Guards running on your computer will prompt a message to allow or block the execution of unknown program when it runs for the first time. Thus, if a spyware or a malicious program is installed, you can enhance security by removing such programs on receiving any warning.
627 According to the earlier settings, new script has been allowed.
628 According to the earlier settings, new script has been blocked.
629 SpyEraser has detected a new script trying to run itself. Scripts can execute without user intervention and <br>are used to perform very useful functions but spyware authors use it to perform a various malicious activities on user's system.
630 <br><br>Workaround: Though this spyware threat is not known as of now, you can analyze this program before by either allowing or blocking it.
631 Script blocking
632 Script Blocking
633 It restricts unauthorized script programs to execute on your computer.
634 Script Blocking is there to protect users in case they do something silly or face malfunctioning on running an unknown script. A script program is a useful program that functions either on client end or server end and is written in a VBScript, JScript or JavaScript languages. Malicious program can also be written using scripting languages that can lock your computer; change your homepage, redirect to a malicious website or can act worse.
635 A script is trying to run itself. \nDo you want to run?.
636 According to the earlier settings, adding a new program to the System Startup Files has been allowed.
637 Adding a new program to the System Startup Files has been allowed, as it is free of spyware.
638 According to the earlier settings, adding a new program to the System Startup Files has been blocked.
639 A program trying to add itself to the system Startup List has been detected by the SpyEraser. Each user account has a kStartup folder in Windows that contains information of all the programs which starts automatically when the user logs in.
640 <br><br>Workaround: Unintended additions should be blocked immediately.
641 A Startup File has been Allowed.
642 An unknown Startup File item requires Approval
643 Startup Files
644 Startup Files
645 It keeps a check on the new items added or removed from the startup list.
646 Working on computers has direct relation to installation of various programs and applications. During this installation process the program or application may make an entry in the startup list. Startup List contains the name and path of all the programs that load with Windows. The programs that usually execute at the start of Windows are utility software, musicware, chat software and so on. Startup items can be categorized to the current users logging on to the system or to any user who logs on to the system. If the item starts with Windows for any specific user the folder that stores the path is C:\documents and settings\{USERNAME}\start menu\programs\startup and if it starts with any user logging into the system then the entry would be made on the path in C:\documents and settings\All Users\start menu\programs\startup.
647 New Startup Registry Files have been allowed to be added as per the previous settings.
648 New Startup Registry Files have been blocked from being added as per the previous settings.
649 SpyEraser has detected a program added to System Startup List. Different Startup Registry keys store paths to different programs, which can execute these programs when Windows starts.
650 <br><br>Workaround: Unintended additions should be blocked immediately.
651 Startup Registry Files
652 Startup Registry Files
653 It keeps a check on the new items added or removed from the startup list that has a reference on the registry.
654 Programs can be made to execute at Windows startup using the system registry. These programs can be executed with specific user login or with all the users having accounts on the system. Registry uses various categories as Run, Run Once, Run Once Ex and so on which functions accordingly to execute the program at startup. Programs that are added in any of these categories will run at startup when the user logs on. These categories are support on majority of windows operating system.
655 New URL Search Hook has been allowed to be added to URL Search Hooks List as per the previous settings.
656 New URL Search Hook has been allowed to be added to URL Search Hooks List as it is recognized as non spyware.
657 New URL Search Hook has been blocked from being added to URL Search Hooks List as per the previous settings.
658 SpyEraser has detected a URL Search Hook trying to add itself. URL Search Hooks are used by Internet Explorer to translate the address of an unknown URL Protocol.
659 <br><br>Workaround: While this is not a known spyware threat, you might want to analyze this program before either allowing or blocking it.
660 A URL Search Hook has been Allowed.
661 An unknown URL Search Hook requires Approval
662 URL Search Hooks
663 It restricts illegitimate changes that can be made to Internet Explorer URL Search Hooks.
664 URL Search Hooks are used by Internet Explorer to translate the address of an unknown URL Protocol.
665 URL Search Hooks
666 New Dialup connection has been allowed to be added to Internet Explorer as per the previous settings.
667 New Dialup connection has been blocked to be added to Internet Explorer as per the previous settings.
668 SpyEraser has detected a Browser Helper Object trying to be added. A Browser Helper Object (BHO) module is designed as a plug-in for Internet Explorer Web browser to provide added functionality. This type of plug-in are commonly used by utilities like search toolbars. However, the malicious softwares like spywares, adwares or browser hijackers often use BHOs to pop-up advertisements or study your browsing pattern, because a BHO has access to each URL you visit and can redirect you or display other pages than you requested (ads, for example).
669 <br><br>Workaround: While this is not a known spyware threat, you might want to analyze this program before either allowing or blocking it.
670 Dialup Connection
671 Dialup Connection
672 It checks for illegitimate Dailup activities from the computer's modem(s).<br>
673 New Internet Proxy Server has been allowed to be added to Internet Explorer as per the previous settings.
674 New Internet Proxy Server has been blocked to be added to Internet Explorer as per the previous settings.
675 SpyEraser has detected a Browser Helper Object trying to be added. A Browser Helper Object (BHO) module is designed as a plug-in for Internet Explorer Web browser to provide added functionality. This type of plug-in are commonly used by utilities like search toolbars. However, the malicious softwares like spywares, adwares or browser hijackers often use BHOs to pop-up advertisements or study your browsing pattern, because a BHO has access to each URL you visit and can redirect you or display other pages than you requested (ads, for example).
676 <br><br>Workaround: While this is not a known spyware threat, you might want to analyze this program before either allowing or blocking it.
677 Internet Proxy Server
678 Internet Proxy Server
679 It helps to prevent unauthorized modifications or additions to the Internet Explorer Proxy Server.<br>
680 It helps to prevent unauthorized modifications or additions to the Internet Explorer Proxy Server.<br>The Internet Explore Proxy Server is a server that is located between the Internet Explorer Web browser, and a Real server.<br><br>This Proxy Server captures all requests that are sent to the Real server in order to see if it can fulfill the requests by itself.<br><br>If not, it forwards the request to the real server.<br><br> Improve performance and Filter requests are the two main purposes of Proxy servers.<br>
681 SpyEraser has allowed the Internet Safe site,
682 to be added to Internet Explorer Safe sites list.
683 <BR><BR>Safe Site:
684 <BR>Site access:
685 <br><br>This Safe site has been allowed based on your previous action
686 SpyEraser has blocked the Internet Safe site,
687 from being added to Internet Explorer Safe sites list.
688 <br><br>This Safe site has been blocked based on your previous action
689 SpyEraser has detected an attempt to add an Internet Reliable Site,
690 . Internet Explorer allows running Reliable Sites as genuine and can be trusted on; not to exploit the data stored on your computer.
691 <br><br>Workaround: You should block this change if the attempt is not from you or from any program run by you.
692 Internet Reliable Sites
693 Internet Reliable Sites
694 Stay safe and protected by prohibiting unauthorized Websites, which could potentially damage your computer or data, to include itself to the list of reliable Websites.
695 Reliable Websites are genuine and can be trusted on; not to exploit the data stored on your computer.
696 Your previous settings has allowed new server protection files to be added to Internet Explorer.
697 Your previous settings has blocked addition of new server protection files to Internet Explorer.
698 Adding of Browser Helper Object has been detected by SpyEraser. A Browser Helper Object (BHO) module is designed as a plug-in for Internet Explorer Web browser to provide added functionality. This type of plug-in are commonly used by utilities like search toolbars. However, the malicious software like spyware, adware or browser hijackers often use BHOs to pop-up advertisements or study your browsing pattern, because a BHO has access to each URL you visit and can redirect you or display other pages than you requested (ads, for example).
699 <br><br>Workaround: While this is an unknown spyware threat, you might want to analyze this program before allowing or blocking it.
700 Name Server Protection
701 Name Server Protection
702 Helps in preventing unauthorized DNS Server modifications.\n
703 Helps in preventing unauthorized DNS Server modifications.\nThis helps you to monitor and avoid any unauthorized changes made to your Domain Name Server settings.\nDNS is used on the Internet to translate friendly names such as www.microsoft.com into the numeric IP addresses used by the Internet to locate machines.\nSome spyware and other potentially unwanted software tries to make changes to the DNS name translation service without the user's permission, or understanding.\nBy changing the DNS servers, this software could redirect you to a web site other than the one you intended when you enter the web site's name into your browser.\nFor example, with software installed that tampers with, or otherwise modifies the DNS responses, you might type www.microsoft.com into your browser, but end up at a site that might not actually be related to www.microsoft.com.<br>
704 Your previous settings has allowed adding of a new Spam Zombie to Internet Explorer.
705 Your previous settings has blocked adding of a new Spam Zombie to Internet Explorer.
706 <br><br>Workaround: While this is an unknown spyware threat, you might want to analyze this program before allowing or blocking it.
707 Spam Zombie Prevention
708 Spam Zombie Prevention
709 Helps in preventing spyware from sending spam from your computer.<br>
710 Helps in preventing spyware from sending spam from your computer.\nSpam Zombie Prevention inhibits your computer from becoming a source of spam.\nMany spammers take advantage of security exploits and spywares to install Spam 'Zombies' on personal computers with the intention of sending out spam emails from that computer without the user's knowledge.<br>
711 Your previous settings has allowed adding of new TCP/IP parameters to Internet Explorer.
712 Your previous settings has blocked adding of new TCP/IP parameters to Internet Explorer.
713 <br><br>Workaround: While this is a unknown spyware threat, you might want to analyze this program before allowing or blocking it.
714 TCP/IP Parameters
715 TCP/IP Parameters
716 Prevents Infections from modifying TCP/IP parameters which are used by Windows to send and receive data on network.<br>
717 Prevents Infections from modifying TCP/IP parameters which are used by Windows to send and receive data on network.\nTCP/IP configuration parameters are registry parameters that are used to configure the protocol driver, Tcpip.sys.\nTcpip.sys implements the standard TCP/IP network protocols.<br>
718 Your previous settings has allowed adding of new WiFi connection to Internet Explorer.
719 Your previous settings has blocked adding of new WiFi connection to Internet Explorer.
720 <br><br>Workaround: While this is a unknown spyware threat, you might want to analyze this program before allowing or blocking it.
721 WiFi Connection
722 WiFi Connection
723 Keeps an eye on other users accessing your wireless network.<br>
724 Your previous settings has allowed adding new windows messenger service to Internet Explorer.
725 Your previous settings has blocked adding of new windows messenger service to Internet Explorer.
726 <br><br>Workaround: While this is an unknown spyware threat, you might want to analyze this program before allowing or blocking it.
727 Windows Messenger Service
728 Windows Messenger Service
729 Helps in restricting any unauthorized changes to the Windows NetBIOS Messenger Service.<br>
730 Helps in restricting any unauthorized changes to the Windows NetBIOS Messenger Service.\nThe Windows NetBIOS Messenger service is a component on Windows that primarily provides backward compatibility with previous versions of Windows, especially in enterprise networks.\nAlthough the names are similar, this service should not be confused with the peer-to-peer Windows Messenger service, or MSN Messenger service, which are used for online chat.\nMost users who are not on a corporate network turn off and disable Windows NetBIOS Messenger service.\nIt can be re-enabled in your control panel services if needed.<br>
731 Your previous settings has allowed adding of new WinSock Layered service provider to Internet Explorer.
732 Your previous settings has blocked adding of new WinSock Layered service provider to Internet Explorer.
733 WinSock Layered Service Providers
734 WinSock Layered Service Providers
735 Keeps an eye on any additions or modifications to your Windows Winsock Layered service providers.<br>
736 LSP (Layered Service Provider) are sometime manipulated by spyware applications known as Winsock Hijackers.<br><br>LSP's are a way to chain a piece of software to your Winsock 2 implementation on your computer.<br><br>Since the LSP's are chained together, when Winsock is used, the data is also transported through each of the LSPs in the chain.<br><br>Spyware can use LSPs to see all traffic being transported over your Internet connection.<br><br>You should use extreme caution when deleting these objects.<br><br>If it is removed without properly fixing the gap in the chain, you can have loss of Internet access.<br>
737 Your previous settings has allowed adding of new AppInit files to the System.
738 Been recognized as non spyware new System init files has been allowed to be added to the System.
739 Your previous settings has blocked adding of new AppInit files to System.
740 Some additions to the Windows AppInit_DLLs has been detected by SpyEraser. Any file loaded in the AppInit_DLLs registry value will load during the Windows startup process and protect itself before any normal user can gain access to the computer.
741 <br><br>Workaround: Unless the software program is trusted or is been added by System Administrator, these DLL's should be blocked.
742 An AppInit_DLL has been Allowed
743 An AppInit_DLL has been Blocked
744 Approval is required for an unknown AppInit_DLL
745 Application Init DLLs
746 AppInit_DLL
747 It restricts illegitimate changes or additions that can be made in Windows AppInit DLLs.
748 All the Dlls present in AppInit_DLLs registry value are loaded with user32.dll. Microsoft based applications usually call user32.dll that loads all the DLLs listed in AppInit_DLLs. In case, executables do not link with user32.dll, they do not load AppInit_DLLs. Thus, any file loaded in the AppInit_DLLs registry value will load during the Windows startup process and protect itself before any normal user can gain access to the computer. Because of early loading of Dll s, only API functions exported from Kernel32.dll are safe to use in the initialization of the AppInit_DLL.
749 Your previous settings has allowed adding System Shell Extensions.
750 Been recognized as non spyware, system shell extensions has been allowed.
751 Your previous settings has blocked adding of System Shell Extensions.
752 Some changes to the Windows Shell Extensions has been detected by SpyEraser. Shell Extensions integrates itself into Windows and extends the abilities of operating system. Through shell extensions one can add-up functionalities to the existing Windows Shell list.
753 <br><br>Workaround: You might want to analyze before allowing or blocking this program as this is a unknown spyware threat.
754 An approved Shell Extention has been Allowed
755 An approved Shell Extention has been Blocked
756 An approval is required for an unknow Approved Shell Extention
757 Approved Shell Extensions
758 to do.
759 Approved Shell Extensions
760 It restricts illegitimate changes that can be made in Windows Shell Extensions.
761 Shell Extensions integrates itself into Windows and extends the abilities of operating system. Most shell extensions are automatically installed by the operating system, but there are also many other applications that install additional shell extension components. Through shell extensions one can add-up functionalities to the existing Windows Shell list. Shell extensions are of types Context Menu, Search Handler, IE Toolbar, Drag & Drop Handler and many more. For example, when you install WinZip, you'll notice a special WinZip menu when you right-click on a Zip file. This menu is created by adding a shell extension to the system.
762 Your previous settings has allowed adding new System Context Menu Handler.
763 Been recognized as non spyware a new System Context Menu Handler has been allowed.
764 Your previous settings has blocked new System Context Menu Handler.
765 An attempt of addition to Windows Context menu has been detected by SpyEraser. Context menu provides the ability to add new items to the right-click menu of particular file type.
766 <br><br>Workaround: You might want to analyze this program as this is an unknown spyware threat before allowing or blocking it.
767 A Context Menu Handler has been Allowed
768 A Context Menu Handler has been Blocked
769 Approval is required for an unknown Context Menu Handler
770 Context Menu Handler
771 Context Menu Handler
772 It restricts illegitimate changes that can be made in Windows Context Menus.
773 The Context Menu Handler list shows all the context menu handlers associated with the current file type. Context menu provides the ability to add new items to the right-click menu of particular file type. It can change depending on what object has focus when you right-click. Context menus are associated with a particular class file and are called at time when the right-click menu for a member of that class is displayed. By registering context menu handlers, one can dynamically add an object s context menu, customized for the particular object.
774 Your previous settings has allowed adding new System Control INI Policy.
775 Your previous settings has blocked adding new System Control INI Policy.
776 SpyEraser has detected that a spyware is trying to add an entry in Control.ini file. Display of a system icon in Control Panel can be disabled making an entry in the file called Control.ini stored at location %windir%\Control.ini</b>
777 <br><br>Workaround: This change needs to be blocked unless done manually or by Computer Administrator.
778 Control INI Policy
779 Control INI Policy
780 Prevents Internet Explorer control show in the Control Panel.<br>
781 Helps prevent Internet Explorer control show in the Control Panel.<br>It is possible to disable a control in the Control Panel by adding an entry into the file called control.ini which is stored in <b>%windir%\control.ini</b>.<br><br>From within that file you can specify which specific control panels should not be visible.<br>If inetcpl.cpl is set to no (inetcpl.cpl=no), that may be a sign that a piece of software is trying to make it difficult for you to change your settings.<br>Unless it is there for a specific known reason, like the administrator set that policy, it should be removed.<br>
782 Report to the Comunity
783 Your previous settings has allowed adding of new System Explorer Trojan.
784 Your previous settings has blocked adding of new System Explorer Trojan.
785 Explorer.exe, usually found in Windows directory, is loaded during the boot up process. If you have a file with the same name on C:\ drive, C:\explorer.exe will be executed rather than %windir%\explorer.exe. But, if the file is a Trojan, disguised under the name of explorer.exe on C:\ drive, it executes to perform malicious activities on the system.<BR><BR>Workaround: Unless you have added this program specifically, you should remove it immediately.
786 It is strongly recommended that you restart your system as a Windows Explorer Trojan has been removed
787 Explorer Trojan
788 Explorer Trojan
789 It keeps a check on the known Explorer Trojans.
790 Explorer.exe, usually found in Windows directory, is loaded during the boot up process. If you have a file with the same name on C:\ drive, C:\explorer.exe will be executed rather than %windir%\explorer.exe. In case C:\explorer.exe appears to be a corrupt file, the user is locked out of the system. But, if the file is a Trojan, disguised under the name of explorer.exe on C:\ drive, it executes to perform malicious activities on the system. An infected system is automatically rebooted from infection and will load the first copy of explorer.exe it comes across. Although, it appears to boot normally but in reality the attacker has remote access to the infected machine. Under such circumstance, simply rename the file instead of making changes to files or registries.
791 Your previous settings has allowed adding of new INI File Mapping to the System.
792 Your previous settings has blocked adding of new INI File Mapping to the System.
793 Some changes to .ini File Mappings is detected by SpyEraser. System.ini and win.ini files are not generally used in the newer versions of Windows, such as Windows 2000 and Windows XP.
794 <br><br>Workaround: These changes should be blocked unless done manually.
795 INI File Mapping
796 INI File Mapping
797 Helps in preventing any unauthorized changes made to the .ini File Mappings.<br>
798 Helps prevent unauthorized changes to .ini File Mappings.\nNewer versions of Windows, such as Windows 2000 and Windows XP, do not generally use the system.ini and win.ini files.\nInstead of backward compatibility, they use a function called IniFileMapping.\nIniFileMapping, puts all the contents of an .ini file in the registry, with keys for each line found in the .ini key stored there.\nThen, when you run a program that normally reads their settings from an .ini file, it will first check the registry key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping, for an .ini mapping, and if found, will read the settings from there instead.<br>
799 Your previous settings has allowed adding of new Keyboard Filter Driver to System.
800 Has been recognized as non spyware. A new Keyboard Filter Driver has been allowed to be added to System.
801 Your previous settings has blocked adding of new Keyboard Filter Driver to System.
802 SpyEraser has detected some application is keeping an eye on each key stroke on your keyboard. It records every key typed on a users machine including passwords and login information, and transfers all important and confidential data that you type, to a remote location or hacker. The information is sent to a predefined email address along with screenshots.
803 A KeyBoard Driver Hook has been Allowed
804 A KeyBoard Driver Hook has been Blocked
805 Approval is required for an unknown KeyBoard Driver Hook
806 Keyboard Filter Driver
807 KeyBoard Filter Driver
808 It prevents downloading and installation of unsafe applications to .ini File Mappings.
809 Windows versions NT 4.0, 2000, XP, or later no longer have a win.ini or system.ini files. The settings are instead stored in the System Registry. Thus, if a program is functioned to access .ini file, the operating system can have backwards compatibility by checking the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping, for an .ini mapping, and when found will access the settings at this location.
810 Your previous settings has allowed adding of new Shared Task Scheduler to System.
811 Your previous settings has blocked adding of new Shared Task Scheduler to System.
812 An addition to the Scheduled Tasks has been detected by SpyEraser. The files listed in Shared Task Scheduler run automatically when you start Windows if scheduled for that time.
813 Shared Task Scheduler
814 Prevents any unauthorized addition of programs that have added themselves to the auto start values when Windows loads.<br>
815 Helps preventing any unauthorized addition of programs that have added themselves to the auto start values when Windows loads.<br>The files listed in SharedTaskScheduler run automatically when you start Windows.<br>
816 Your previous settings has allowed adding of new ShellServiceObjectDelayLoad to System.
817 New System ShellServiceObjectDelayLoad has been allowed to be added to System as it is recognised as non spyware.
818 Your previous settings has blocked adding of new ShellServiceObjectDelayLoad to System.
819 An addition to ShellServiceObjectDelayLoad list has been detected by SpyEraser. Files listed under ShellServiceObjectDelayLoad key are automatically loaded at startup.
820 <br><br>Workaround: You might want to analyze this program before allowing or blocking it as this is a unknown spyware threat.
821 A ShellServiceObjectDelayLoad DLL has been Allowed
822 A ShellServiceObjectDelayLoad DLL has been Blocked
823 Approval is required for an unknown ShellServiceObjectDelayLoad DLL
824 Shell Service Object Delay Load
825 Shell Service Object Delay Load
826 It restricts illegitimate programs from adding into the Windows startup programs list.
827 ShellServiceObjectDelayLoad is a registry key that refers to InProcServer32 key under CLSID, which stores information about the Dll used by the process. All the files listed under this key load with shell and because of early loading of explorer.exe in the startup process, the files listed in ShellServiceObjectDelayLoad are automatically loaded at startup.
828 Your previous settings has allowed addition of new User Shell Folders to System.
829 New System User Shell Folders has been allowed to be added to System as it is recognised as non spyware.
830 Your previous settings has blocked addition of new User Shell Folders to System.
831 SpyEraser has detected that a file is trying to make an entry in User Shell Folders. Windows access default location of many data folders and special folders from User Shell Folder key.
832 A Change to User Shell Folders has been Allowed.
833 A unknown Shell Execute Hook requires Approval
834 User Shell Folders
835 User Shell Folders
836 It restricts illegitimate changes that can be made to the User Shell Folder registry settings.
837 Windows access default location of many data folders and special folders from User Shell Folder key. The commonly known User Shell Folders are My Documents, My Music, Desktop, Application Data, Favorites, etc. Default location of the folders in the key User Shell Folders take precedence over the folder path given in the key Shell Folders.
838 SpyEraser has allowed a new host
839 pointing to IP address
840 to be added to your Windows Hosts file.
841 <br><br>Your previous input has allowed changes in this Hosts file.
842 SpyEraser has blocked a new host
843 from beeing added to your Windows Hosts file.
844 <br><br>Your previous input has blocked changes to this Hosts file.
845 A Hosts file is used to look up the Internet Protocol address of a device connected to a computer network. The Hosts file describes a many-to-one mapping of device names to IP addresses. When accessing a device by name, the networking system will attempt to locate the name within the host file if it exists. Typically, this is used as a first means of locating the address of a system, before accessing the Internet domain name system. Changes to the Hosts file should be blocked if not done by you or have run a program to do so.
846 <br><br>Host:
847 <br>IP Address:
848 Windows Hosts File has been Allowed.
849 Windows Hosts File has been Blocked.
850 Spyware Windows Hosts File is trying to modify Windows Hosts File.
851 Windows Hosts File
852 Windows Hosts File
853 It keeps a check on the changes made to the Hosts file.
854 A Hosts file, stored on the computer's file system, is used to look up the Internet Protocol address of a device connected to a computer network. The Hosts file describes a many-to-one mapping of device names to IP addresses. When accessing a device by name, the networking system will attempt to locate the name within the host file if it exists. Typically, this is used as a first means of locating the address of a system, before accessing the Internet domain name system.<br><br>To state by an example; suppose you have an entry in the hosts file: 192.168.0.10 www.google.com, which means whenever you access the Website www.google.com it will be resolved with the IP 192.168.0.10. But if a spyware application modifies the hosts file entry to: 192.168.0.15 www.google.com and trying to access www.google.com, the hosts file will resolve it with the modified IP 192.168.0.15, which is not the correct IP for Google s Website. So the browser with redirect you to the Website at the IP 192.168.0.15, even if you had put in the address of Google s Website.
855 SpyEraser has blocked a possible Windows Trojan
856 from being running.
857 <BR><BR>Name:
858 <BR>File path:
859 <BR><BR>This program was blocked based on your previous input.
860 SpyEraser has detected a possible Windows Directory Trojan.<BR><BR>
861 <BR><BR>Generally spywares and other malicious applications disguise themselves under a legitimate system file name to escape from various anti-spyware programs. These files use same names as used by the operating system files but stores it in a different folder.
862 Windows Directory Trojan has been Blocked.
863 A Possible Windows Directory Trojan is trying to run.
864 Windows Directory Trojans
865 Windows Directory Trojans
866 It warns when directory type Trojans tries to install files corresponding to legitimate system file names.
867 Generally spywares and other malicious applications disguise themselves under a legitimate system file name to escape from various anti-spyware programs. These files use same names as used by the operating system files but stores it in a different folder.
868 According to the previous settings, addition of New System Windows Extension to the System has been allowed.
869 According to the previous settings, addition of New System Windows Extension to the System has been blocked.
870 Changes to the System's list of Windows Extensions have been detected by SpyEraser.
871 <br><br>Workaround: These changes should be blocked if the program that is causing these changes is not trusted.
872 Windows Extensions
873 It restricts illegitimate changes that can be made in the system's list of Windows Extensions.
874 According to the previous settings, addition of New Windows Password Protection to the system has been allowed.
875 According to the previous settings, addition of New system Windows Logon Policies to the system has been allowed.
876 According to the previous setting, addition of New system Windows Logon Policies to the system has been blocked.
877 Changes to Windows Logon Policies have been detected by SpyEraser. Spyware can modify these settings to automatically login to the system.
878 <br><br>Workaround: These changes should be blocked if unintended.
879 Windows Logon Policies
880 Windows Logon Policies
881 It restricts illegitimate additions and modifications to the Windows Logon Policies.
882 Windows NT Logon Utility takes care of the logon and logoff activities of the user. It prompts you to enter password when you log on, though can just click to log off or shut down.
883 According to the previous settings, addition of New Windows Password Protection to the system has been blocked.
884 SpyEraser has detected that a Default Window Password has been set. Windows allows you to use automatic login instead of the default logon process. If you use auto logon process, you don t have to enter any information while logging into your account.
885 <br><br>Workaround: This setting should be blocked unless done intentionally.
886 Allowing this item will disable 'Windows Password Protection Guard'.\nDo u want to disable it?
887 Windows Password Protection
888 Windows Password Protection
889 It restricts setting up of default password to your system.
890 Windows allows you to use automatic login instead of the default logon process. If you use auto logon process, you don t have to enter any information while logging into your account; login username, password and the domain name is already stored in the registry. Although, automating the logon process cuts down the steps to enter password as and when the system starts, it may also cause security threat to your system. Anybody gaining access to your system can gain access to your important data and files, and secondly as the password stored on registry is in plain text, unauthorized people can comfortably get the knowledge of it.
891 According to the previous settings, addition of New Windows Protocols to the system has been allowed.
892 According to the previous settings, addition of New Windows Protocols to the system has been blocked.
893 A spyware threat has been detected by SpyEraser that has the capability to control the sending and receiving information by the computer in certain ways. This operation is accomplished through the Window's Protocols Filters and Handlers. Common offenders to this are CoolWebSearch, Related Links, and Lop.com.
894 <br><br>Workaround: These changes should be blocked to prevent spywares taking control of your Internet trafic, unless the software is trusted fully.
895 Windows Protocols
896 It restricts illegitimate changes to standard Protocol Drivers.
897 The exchange of information to and from your computer is accessed by some spywares. This is done using the Windows Protocols Filters and Handlers.
898 According to the previous settings, addition of New Windows Restrict Anonymous to the system has been allowed.
899 According to the previous settings, addition of New Windows Restrict Anonymous to the system has been blocked.
900 Modifications to Windows Restrict Anonymous settings have been detected by SpyEraser. Windows has a feature where Anonymous user can enumerate domain user names and shares in Windows, and view the associated security permissions.
901 <br><br>Workaround: These changes should be blocked if any spyware activity is suspected
902 Windows Restrict Anonymous
903 It restricts changes that can be made to RestrictAnonymous registry settings.
904 User accounts created on a Windows environment can be assigned with rights and privileges to define their scope of action i.e. what they can do and what not on the network. But in addition to standard users Windows create an Anonymous account that can gain access to network but has no username and password. The Anonymous user can enumerate domain user names and shares in Windows, and view the associated security permissions. However, users have an option to restrict this feature to increase security horizons.
905 According to the previous settings, New Shell Execute Hooks to the system has been allowed.
906 New Shell Execute Hooks have been recognized as non spyware and hence allowed to be added to the System.
907 According to the previous settings, New Shell Execute Hooks to the system has been blocked.
908 SpyEraser has detected a Shell Execute Hooks trying to be added. Shell Execute Hooks is a program that is loaded into Explorer.exe the Windows Shell, and receives all executable commands passed by the user on a computer.
909 <br><br>Workaround: This Shell Execute Hooks should be blocked if you do not trust the software which is adding it.
910 A Shell Execute Hooks has been Allowed
911 A Shell Execute Hooks has been Blocked
912 Windows Shell Execute Hooks
913 Windows Shell Execute Hooks
914 It prevents illegitimate changes to your system's Shell Execute Hooks.
915 Shell Execute Hooks is a program that is loaded into Explorer.exe the Windows Shell, and receives all executable commands passed by the user on a computer. The application can hook the execution of an object and change the default execution, or perform some other action before the object is executed i.e. it can detect an attempted launch of a spyware and prevent it from running.
916 According to the previous settings, a Windows Shell Open command has been allowed.
917 A Windows Shell Open command has been recognized as non spyware and hence allowed to the System.
918 According to the previous settings, a Windows Shell Open command has been blocked.
919 Changes to the Shell Open Commands have been detected by SpyEraser. Windows executes command from the registry to run an .EXE file. Some spyware can make changes on more than one Shell Open Commands key in the Windows registry.
920 <br><br>Workaround: These changes should be prevented unless they are beeing modified by trusted softwares.
921 A Windows Shell Open Command has been Allowed
922 A Windows Shell Open Command has been Blocked
923 Approval is required for an unknown Windows Shell Open Command.
924 Windows Shell Open Commands
925 Windows Shell Open Commands
926 It restricts illegitimate changes to your system s Shell Open Commands in Windows registry.
927 According to the previous settings, addition of New Windows System.ini File to the system has been allowed.
928 According to the previous settings, addition of New Windows System.ini File to the system has been blocked.
929 Other applications in the Startup list apart from Explorer.exe have been detected by SpyEraser.
930 <br><br>Workaround: While this may be a threat, you might want to analyze this program before either allowing or blocking it.
931 Windows System.ini File
932 Windows System.ini File
933 It keeps a check on the additions and modifications made to the Windows System.ini file.
934 Initialization files, also known as .INI files and startup files, are vital because they initialize system settings for the computer. The system.ini is found in Windows directory (%windir%\system.ini). The command line in the file, shell = explorer.exe defines the program that would act as Shell for the operating system. Shell acts as an interface between the user and the system. However, a spyware can make an entry as a replacement to explorer.exe or add in conjunction to it. For example the command line: shell = explorer.exe, trojan.exe will make both the programs to start with Windows. Though, defining of explorer.exe as shell in system.ini was practiced in earlier versions of Windows.
935 According to the previous settings, addition of New Windows Update Service to the system has been allowed.
936 According to the previous settings, addition of New Windows Update Service to the system has been blocked.
937 Modifications to the Windows Update Access Settings have been detected by SpyEraser. Administrators who want to prevent users from connecting to the Windows Update Web site may apply Windows Update Access restriction in registry.
938 <br><br>Workaround: This Restriction should be removed unless advised by System Administrator.
939 Windows Update Service
940 Windows Update Service
941 It restricts changes to Windows Update Access settings.
942 Administrators who want to prevent users from connecting to the Windows Update Web site may apply Windows Update Access restriction in registry.
943 According to the previous settings, addition of New Windows Win.ini File to the system has been allowed.
944 According to the previous settings, addition of New Windows Win.ini File to the system has been blocked.
945 Windows Win.ini File
946 Windows Win.ini File
947 It keeps a check on the additions and modifications that can be made to the Windows Win.ini file.
948 The Win.ini file is used to load various settings each time Windows boots. For example, the communications drivers; wallpaper, screen saver, languages, fonts, etc are loaded each time the win.ini is initialized. The program names given in the command line Load= defines startup programs, while the command Run= execute programs/applications whenever Windows starts. This feature was used with earlier versions of Windows but to support backward compatibility it still exists.
949 According to the previous settings, Winlogon Shell has been allowed.
950 Winlogon Shell has been recognized as non spyware and hence allowed to the System.
951 According to the previous settings, Winlogon Shell has been blocked.
952 Changes to the Winlogon Shell Setting has been detected by SpyEraser. The program mentioned in Winlogon Shell registry setting loads with Windows. Some spyware make use of this registry setting and modifies the Shell registry setting to call a malicious program each time the user logs in.
953 <br><br>Workaround: Spywares can use this to start themselves at system startup. This should be blocked unless done intentionally.
954 Winlogon Shell has been Allowed
955 Winlogon Shell has been Blocked
956 An unknown Winlogon Shell requires Approval
957 Winlogon Shell
958 Winlogon Shell
959 It restricts illegitimate changes that can be made to Winlogon Shell registry setting.
960 The program mentioned in Winlogon Shell registry setting loads with Windows. The Windows Shell or Explorer.exe is the main program that interacts between the user and the computer. However, Shell settings can be modified to make use of an alternative user interface. Some spyware make use of this registry setting and replaces the default shell program with one malicious, to call the new program each time the user logs in.
961 According to the previous settings, addition of Windows Userinit settings to the system has been allowed.
962 Windows Userinit settings have been recognized as non spyware and hence allowed to the System
963 According to the previous settings, addition of Windows Userinit settings to the system has been blocked.
964 SpyEraser has detected changes to your Winlogon Userinit setting. Userinit.exe is an application that is executed when the user logs on to Windows.
965 Winlogon Userinit
966 Winlogon Userinit
967 It restricts illegitimate changes to be made on your Winlogon Userinit setting.
968 Userinit.exe is an application that is executed when the user has logged on. Its purpose is to set up individual user s desktop environment, establishing profile settings, font styles, screen colors etc. Upon completing of those tasks, userinit.exe executes the Shell programs. If multiple programs are given in the shell key using comma separator, all the programs would be executed by userint.exe.
969 According to the previous settings, addition of New WOW Boot Shell to the system has been allowed.
970 New WOW Boot Shell has been recognized as non spyware and hence allowed to be added to the System.
971 According to the previous settings, addition of New WOW Boot Shell to the system has been blocked.
972 Additions of New WOW Boot Shell has been detected by SpyEraser. WOW\Boot\Shell is a Windows registry entry that will allow a particular program to be shelled (loaded) when Windows boots up.
973 <br><br>Workaround: Block these changes unless the software which does these changes is trusted or done by Administrator.
974 WOW Boot Shell has been Allowed
975 WOW Boot Shell has been Blocked
976 WOW Boot Shell requires Approval
977 WOW Boot Shell
978 It protects spyware programs from loading into your computer during Windows boot up.
979 Windows registry WOW\Boot\Shell authorizes a particular program to load at Windows start up process.
980 Ignored
981 Quarantined
982 Removed
983 No Action taken
984 Failed to Intailize COM Library
985 Required
986 To be retrieved from database
987 To be retrieved from database
988 Index out of Bounds
989 Description of the problem:
990 Description of the suspected spyware:
991 Email:
992 A list of softwares installed at System checkpoints is generated by the Suspected Spyware reporting tool. It can be helpful in detecting anonymous spywares that are installed at these checkpoints by analyzing this data.
993 Report a possible spyware problem to Uniblue.
994 A Spyware is suspected on this computer
995 Please wait...
996 Completed.
997 Unable to find the relevant Script
998 Failed to get HTML document COM object
999 Format message native error
1000 Scanning for startup files
1001 %s Alert - The User %s, has decided to
1002 %s %s.
1003 Spyware %s is trying to install an Application Restriction .
1004 <br><br>
1005 Spyware %s is trying to install a Browser Helper Object.
1006 Registry key HKLM\..\Browser Helper Object\%s has been blocked
1007 Spyware %s is trying to infect your computer by installing an Internet Explorer Menu Extention.
1008 According to the previous settings, addition of Website %s to the Internet Explorer Trusted Websites list has been allowed.
1009 According to the previous settings, addition of Website %s to the Internet Explorer Trusted Websites list has been blocked.
1010 Spyware %s is trying to infect your computer by installing an Installed Component.
1011 Spyware %s is trying to infect your computer by installing an Internet Explorer Explorer Bar.
1012 Spyware %s is trying to infect your computer by installing an Internet Explorer Toolbar.
1013 Internet Explorer %s URL %s has been allowed as per the previous settings.
1014 Internet Explorer %s URL %s has been blocked as per the previous settings.
1015 Internet Explorer Web Browser %s has been allowed as per the previous settings.
1016 Internet Explorer Web Browser %s has been allowed as it is recognised as non spyware.
1017 Internet Explorer Web Browser %s has been blocked as per the previous settings.
1018 Spyware %s is trying to infect your computer by installing an Internet Explorer WebBrowser.
1019 Spyware %s is trying to launch.
1020 Spyware %s is trying to infect your computer by installing a program to run on System startup.
1021 Spyware %s is trying to infect your computer by installing a URL Search Hook.
1022 Spyware %s is trying to infect your computer by installing an Internet Explorer Shell Browser.
1023 Spyware %s is trying to infect your computer by installing a Shell Execute Hook.
1024 Spyware %s is trying to infect your computer by installing an Approved Shell Extention.
1025 Spyware %s is trying to infect your computer by installing a Context Menu Handler
1026 Spyware %s is trying to Hook your Keyboard Driver.
1027 Spyware %s is trying to infect your computer by installing a ShellServiceObjectDelayLoad.dll.
1028 Spyware %s is trying to modify User Shell Folder settings.
1029 Spyware %s is trying to infect your computer by installing a Shell Open Command.
1030 Spyware %s is trying Windows Logon Shell.
1031 Spyware %s is trying to infect your computer by installing a WOW Boot Shell.
1061 Shutting down Uniblue SpyEraser will no more protect your computer from Spyware Attacks. Would you still like to shutdown the application?
1062 Error creating suspect report.
1063 Scanning stopped.
1064 No new updates available. Please try again after some time.
1065 Updates have been downloaded successfully.\nIt is recommended to please restart your application in order to take effects
1066 Are you sure you want to delete event log?
1067 Are you sure you want to clear the blocked event log.
1068 The Log has been successfully saved at :
1069 Loading Deleted Spywares...
1070 No Deleted List
1071 Low Security Level
1072 Medium Securtiy Level.
1073 High Security Level
1074 Your computer is free of Spyware
1075 No action has been taken on the results!
1076 Scanning System Memory
1077 Scanning known Spyware Files
1078 Scanning Registry Keys
1079 Scanning Registry Values
1080 DETECTED!
1081 Scanning Cookies
1082 Scanning completed.
1083 Scanning aborted.
1084 Scanning for Registry Startup Files
1085 Scanning for Winlogon Userinit Files
1086 Scanning for Windows INI Files
1087 Scanning for System INI Files
1088 Scanning for BHO's
1089 Scanning for Internet Explorer Toolbars...
1090 Scanning for Internet Explorer Extensions...
1091 Scanning for Internet Explorer Explorer Bars...
1092 Scanning for Internet Explorer Shell Browsers...
1093 Scanning for Internet Explorer Web Browsers...
1094 Scanning for Internet Explorer Menu bars...
1095 Scanning for Internet Explorer URL Search Hooks...
1096 Scanning for Internet Explorer URLs...
1097 Scanning for Shell Execute Hooks...
1098 Scanning for Shell Open Commands...
1099 Scanning for ActiveX Controls...
1100 Scanning for Protocol Filters...
1101 Scanning for Protocol Handlers...
1102 Scanning for Protocol Name Space Handlers...
1103 Scanning for TCP/IP Parameters...
1104 Scanning for Internet Settings...
1105 Scanning for Internet Explorer Settings...
1107 Scanning for Application Inits...
1109 Scanning for Shell Service Object Delay Loads...
1111 Scanning for Schedule Tasks...
1113 Scanning for Services...
1115 Scanning for Processes...
1116 Listing of domain user names and enumerating shared names is allowed for anonymous users.
1118 Listing of domain user names and enumerating shared names is blocked for anonymous users.
1119 Thank you for Registration. Uniblue SpyEraser will now restart.
1121 %sQuarantine\%s_%s.asq
1123 Downloaded %s of %s
1125 Downloaded %s (total size unknown)
1127 Registered Version
1129 <a href=%s target=_blank>Trial Version</a>
1132 Warning: This computer program is protected by Copyright Laws and International Treaties. Unauthorized reproduction or distribution may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under the law.
1134 Version 1.1
1136 Published by <a href=%s target=_blank>Uniblue.com</a>
1138 Database is not loaded.
1140 Internet Explorer Trusted Sites Changed
1142 Please select some items to be scanned
1143 Database Not Loaded
1144 Registry Backup file for %s is missing or corrupted !
1145 The Database Signatures File does not exist.\nProgram will now exit.
1147 No Spyware to remove or quarantine
1149 Please register to activate the Live Guards.
1150 Entry of a safe Internet Explorer toolbar has been allowed.
1153 Registered Version. Thank you for registering.
1154 Trial version. Please register to enable enhanced program features.
1155 Startup item <br></b><small> "%s" </small><br><b> has been allowed
1156 Startup item <br></b><small> "%s" </small><br><b> has been blocked
1505 Each file has a reference or extension that is registered to a particular program. Registry entries are created whenever a program is installed, which maintains reference of files to the installed program. So, whenever a file is opened the associated program is called from registry, say a file with .txt extension calls the Notepad program.
1506 Windows executes command from the registry to run an .EXE file. A spyware attack can modify the registry setting to run a spyware infected file, whenever the user launches an .EXE file. Some spyware can make changes on more than one Shell Open Commands key in the Windows registry.
2102 Startup File Monitor
2103 No new update is available
2104 There was an error downloading updates.\nPlease try later.
2105 New updates are available do you want to download now
2106 New updates are available do you want to download now
9024 Name
9025 Size
9026 Type
9027 Modified
9028 Automatic
9029 Customize...
9030 Select Directory:
9032 ...
9033 *.*
9034 All Files (*.*)|*.*||
9035 Directory name:
9036 Click push pin to keep open
9037 The operating system is out of memory or resources.
9038 The specified file was not found.
9039 The specified path was not found.
9040 The operating system denied access to the specified file.
9041 There was not enough memory to complete the operation.
9042 The .exe file is invalid (non-Win32« .exe or error in .exe image).
9043 A sharing violation occurred.
9044 The file name association is incomplete or invalid.
9045 The DDE transaction could not be completed because the request timed out.
9046 The DDE transaction failed.
9047 The DDE transaction could not be completed because other DDE transactions were being processed.
9048 There is no application associated with the given file name extension.
9049 The specified dynamic-link library was not found.
9050 An unknown error number %d occured.
9051 Black
9052 Brown
9053 Olive Green
9054 Dark Green
9055 Dark Teal
9056 Dark Blue
9057 Indigo
9058 Gray-80%
9059 Dark Red
9060 Orange
9061 Dark Yellow
9062 Green
9063 Teal
9064 Blue
9065 Blue-Gray
9066 Gray-50%
9067 Red
9068 Light Orange
9069 Lime
9070 Sea Green
9071 Aqua
9072 Light Blue
9073 Violet
9074 Gray-40%
9075 Pink
9076 Gold
9077 Yellow
9078 Bright Green
9079 Turquoise
9080 Sky Blue
9081 Plum
9082 Gray-25%
9083 Rose
9084 Tan
9085 Light Yellow
9086 Light Green
9087 Light Turquoise
9088 Pale Blue
9089 Lavender
9090 White
9091 Gray
9092 Maroon
9093 Olive
9094 Navy
9095 Purple
9096 Silver
9097 Fuchsia
9098 No Fill
9099 No Color
9100 Automatic
9101 Automatic Color
9102 More Colors...
9103 More Colors
9104 Standard Colors
9105 Tip text
9106 Did you know...
9107 The specified file does not exist.
9108 Error reading file.
9109 Colors
9110 New
9111 Current
9112 Directories:
9113 Files:
9120 New
9121 Delete
9122 Move Up
9123 Move Down
9158 Sort Ascending\nSort Ascending
9159 Sort Descending\nSort Descending
9160 Aligns the paragraph at the left margin\nAlign Left
9161 Centers the paragraph between the margins\nCenter
9162 Aligns the paragraph at the right margin\nAlign Right
9163 Show large icons\nLarge Icons
9164 Show small icons\nSmall Icons
9165 Remove from Outlook Bar
9166 Rename Shortcut
9167 Remove Group
9168 Rename Group
9171 Hex
9192 Show &More Buttons
9193 Show &Fewer Buttons
9195 Configure buttons
9200 Scroll Left
9201 Scroll Right
9202 Close
9300 \n&Add or Remove Buttons
9307 Close
9312 Customize
9314 New Menu
9315 \n&Reset Toolbar
9330 Custom %d
9331 The toolbar name cannot be blank. Type a name.
9332 Sorry you have reached your limit.
9333 A toolbar named '%s' already exists. Type another name.
9334 Rename Toolbar
9335 Are you sure you want to delete the '%s' toolbar?
9337 All Commands
9346 This will delete the record of the commands you've used in this application and restore the default set of visible commands to the menus and toolbars. It will not undo any explicit customizations. Are you sure you want to do this?
9347 This is not a valid number.
9348 The number must be between 1 and 1638.
9349 Are you sure you want to reset the changes made to the '%s' toolbar?
9350 Built-in Menus
9363 \nPencil
9364 \nFill Color
9365 \nPick Color
9366 \nLine
9367 \nRectangle
9368 \nEllipse
9369 \nCopy
9370 \nPaste
9371 \nClear
9372 \nUndo
9373 \nRedo
9374 \nImport from File
9392 Are you sure you want to reset the key assignments? This action will remove all custom key assignments at the text level.
9393 This shortcut is currently assigned.\nDo you want to re-assign this shortcut?
9394 Due to a software update the toolbar '%s' has changed. Would you like to reset your customized toolbar and load the new one?
9396 All Picture Files|*.bmp;*.wmf;*.emf;*.ico;*.dib;*.cur;*.gif;*.jpg|Bitmaps(*.Bmp;*.Dib)|*.bmp;*.dib|Metafiles(*.Wmf;*.Emf)|*.wmf;*.emf|Icons(*.Ico;*.Cur)|*.ico;*.cur|GIF(*.Gif)|*.gif|JPEG(*.Jpg)|*.jpg|All Files(*.*)|*.*||
9400 \nToolbar Options
9401 \nClose
9402 \nExpand
9403 \nClose Window
9404 \nRestore Window
9405 \nMinimize Window
9411 (System default)
9412 Random
9413 Unfold
9414 Slide
9415 Fade
9416 None
9420 \nMove to P&revious Tab Group
9421 \nMove to Ne&xt Tab Group
9422 \nNew Hori&zontal Tab Group
9423 \nNew &Vertical Tab Group
9424 C&ancel
9427 Active Files
9450 Black
9451 Brown
9452 Olive Green
9453 Dark Green
9454 Dark Teal
9455 Dark Blue
9456 Indigo
9457 Gray-80%
9458 Dark Red
9459 Orange
9460 Dark Yellow
9461 Green
9462 Teal
9463 Blue
9464 Blue-Gray
9465 Gray-50%
9466 Red
9467 Light Orange
9468 Lime
9469 Sea Green
9470 Aqua
9471 Light Blue
9472 Violet
9473 Gray-40%
9474 Pink
9475 Gold
9476 Yellow
9477 Bright Green
9478 Turquoise
9479 Sky Blue
9480 Plum
9481 Gray-25%
9482 Rose
9483 Tan
9484 Light Yellow
9485 Light Green
9486 Light Turquoise
9487 Pale Blue
9488 Lavender
9489 White
9490 Gray
9491 Maroon
9492 Olive
9493 Navy
9494 Purple
9495 Silver
9496 Fuchsia
9497 No Fill\nNo Fill
9498 Automatic Color\nAutomatic Color
9499 More Colors...
9503 Drag a column header here to group by that column.
9504 There are no items to show.
9505 (no fields available)
9506 Sort by:
9530 \nCustomize Quick Access Toolbar
9538 \nMore controls
9550 Today
9551 None
9615 Confirm Delete\nDelete this &occurrence.\nDelete the &series.\nDo you want to delete all occurrences of the recurring event "%s", or just this one?
9616 Open Recurring item\nOpen the &occurrence.\nOpen the &series.\n"%s" is a recurring event. \nDo you want to open only this occurrence or the series?
9628 From
9629 To
9900 Auto Hide
9901 Close
9907 Maximize
9908 Restore
9909 Menu
9950 Categorized
9951 Alphabetical
9953 True\nFalse
35001 Customize application appearance, toolbars, and menus\n&Customize...
57344 Uniblue SpyEraser
61440 Open
61441 Save As
61442 All Files (*.*)
61443 Untitled
61446 an unnamed file
61457 &Hide
61472 No error message is available.
61473 An unsupported operation was attempted.
61474 A required resource was unavailable.
61475 Out of memory.
61476 An unknown error has occurred.
61477 An invalid argument was encountered.
61696 Invalid filename.
61697 Failed to open document.
61698 Failed to save document.
61699 Save changes to %1?
61700 Failed to create empty document.
61701 The file is too large to open.
61702 Could not start print job.
61703 Failed to launch help.
61704 Internal application error.
61705 Command failed.
61706 Insufficient memory to perform operation.
61707 System registry entries have been removed and the INI file (if any) was deleted.
61708 Not all of the system registry entries (or INI file) were removed.
61709 This program requires the file %s, which was not found on this system.
61710 This program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.
61712 Please enter an integer.
61713 Please enter a number.
61714 Please enter an integer between %1 and %2.
61715 Please enter a number between %1 and %2.
61716 Please enter no more than %1 characters.
61717 Please select a button.
61718 Please enter an integer between 0 and 255.
61719 Please enter a positive integer.
61720 Please enter a date and/or time.
61721 Please enter a currency.
61722 Please enter a GUID.
61723 Please enter a time.
61724 Please enter a date.
61728 Unexpected file format.
61729 %1\nCannot find this file.\nPlease verify that the correct path and file name are given.
61730 Destination disk drive is full.
61731 Unable to read from %1, it is opened by someone else.
61732 Unable to write to %1, it is read-only or opened by someone else.
61733 An unexpected error occurred while reading %1.
61734 An unexpected error occurred while writing %1.
61744 %1: %2\nContinue running script?
61745 Dispatch exception: %1
61836 Unable to read write-only property.
61837 Unable to write read-only property.
61840 Unable to load mail system support.
61841 Mail system DLL is invalid.
61842 Send Mail failed to send message.
61856 No error occurred.
61857 An unknown error occurred while accessing %1.
61858 %1 was not found.
61859 %1 contains an invalid path.
61860 %1 could not be opened because there are too many open files.
61861 Access to %1 was denied.
61862 An invalid file handle was associated with %1.
61863 %1 could not be removed because it is the current directory.
61864 %1 could not be created because the directory is full.
61865 Seek failed on %1
61866 A hardware I/O error was reported while accessing %1.
61867 A sharing violation occurred while accessing %1.
61868 A locking violation occurred while accessing %1.
61869 Disk full while accessing %1.
61870 An attempt was made to access %1 past its end.
61872 No error occurred.
61873 An unknown error occurred while accessing %1.
61874 An attempt was made to write to the reading %1.
61875 An attempt was made to access %1 past its end.
61876 An attempt was made to read from the writing %1.