Sunday, July 02, 2006

Prerequisite 2: Anti-Spyware

Even if you're comfortably (safely) traversing the internet with Firefox, you are still at risk for spyware and adware and worse. Should you still be using Internet Explorer, then...well you're asking for it.

Let me put it this way: if you haven't ever used an anti-spyware program of some sort, then you have spyware on your computer. Period.

While Windows XP Service Pack 2 is much more comprehensive about its approach to keeping you from being vulnerable, it is still ill-equipped to fight the ubiquitous malware epidemic. Your Windows firewall is not protecting you from every attack.

I've spent the last 2 years fighting a very frustrating and ever-changing battle with spyware. Both at work and with the people who come to me for help with their own computers, it's been a constant plague.

That said, it's not a battle you have to lose. And it's not a battle you have to pay money to win. Although there are a number of very good, very reliable anti-spyware utilities you can purchase, there are an equal number of extremely reliable free programs.

Prerequisite 2: Anti-Spyware

I've narrowed my personal list down to 3 indispensible tools (and 1 other). They are:

Ad-Aware
Adaware has been around for quite some time. It's from Lavasoft, a German company with headquarters in Sweden. Adaware is a robust spyware identification and removal tool. Keep it updated, run it weekly (at least), and it will be your champion in the fight against spyware.

Spybot Search & Destroy
With a name as silly as that, you'd think the thing was a 1970's espionage film. It is, in fact, not. What it is is something very similar to Ad-Aware. Spybot seeks out and removes spyware that has already infected your system. It does this very well.

"But," you ask. "Why do I need two programs to get rid of spyware? Aren't either of these programs good enough to do the job alone?"

The answer is that no program alone will do as well as two (or even three) programs together. The virus/trojan/malware databases for these programs are different per developer. So, you benefit from having two programs working on the same problems from different approaches.

Spyware Blaster
Holy crap. The sequel to the blockbuster Spybot Search & Destroy is Spyware Blaster! My apologies for using both bold and italic tags there. The exclamation point is also shameful.

Despite the self-aggrandizing name, the product underneath is incredibly useful. Spyware Blaster works in a differnet way than Ad-Aware and Spybot: it actually prevents malware from being installed in the first place.

That's right. Spyware Blaster doesn't remove anything from your computer. What it does is close up known vulnerabilities in both your operating system and your browser, be it IE, Firefox or Opera.

So use this tool after you're all cleaned up, and keep it updated. It is your first line of defense.

*HiJackThis
I Put this program here only for those with steely nerves or a little more education about their Windows registry. If you aren't steely-nerved, or if you couldn't tell your Windows registry from a wedding registry, then this is not for you.

HJT is a registry monitoring and editing tool. Basically, it scans your registry, shows you what's been added to it outside the kernel, and gives you the option of removing lines completely.

This kind of straightforward access is extremely useful. It can also be pretty dangerous to your operating system. If you don't know what you're doing, make sure to save a copy of your reg file before screwing with anything.

Although HJT has the most risks associated with its use, it is easily the most beneficial tool for those hard-to-remove trojans.


That's it. That's the list. If you've ever asked me to help get rid of spyware from your computer and you can't remember what I used or installed...these were what I used. If you haven't ever used an anti-spyware program, then these are the ones to use.

2 Comments:

At 7:39 PM, Anonymous Anonymous said...

Chris, your thousands of readers should know two things. One, Hijack This is a must-have. Two, there are plenty of message boards out there (such as Computer Cops--eh, do a Yahoo search) where people with know-how will tell you how to navigate a Hijack This log. After having to submit a few of them myself, I learned how to identify okay files and not-so-okay files. I would be completely lost without Hijack This.

You are right, though. If one has no idea what one is doing, HT might as well be labeled INSTANT DEATH.

--DW

 
At 12:48 AM, Blogger cechols said...

DW:

I know my thousands of readers will appreciate your genuinely good advice. Browsing forums is an invaluable way to identify what you're looking at in HJT logs.

And as an aside, although you probably didn't know to claim it, you officially get the title: first.

 

Post a Comment

<< Home