home *** CD-ROM | disk | FTP | other *** search
- -------------------------------------------
- Spy Sweeper v2
- (c) 1998-2003 Webroot Software, Inc.
- http://www.webroot.com/
- saleshelp@webroot.com
- -------------------------------------------
-
- Works with Windows 98, ME, 2000, XP Pro and XP Home.
-
- Note: Before scanning, to ensure proper removal of spyware, be sure to close any other
- applications that are running on your system.
-
- Description:
-
- Spy SweeperÖ lets you protect your privacy and your computer from a variety of spyware programs,
- from those that monitor all of your computer's activities (system monitors) to those that can steal
- or destroy data (Trojan horses). It also detects programs that pop up ads on your computer when the
- program is running (adware) and cookies that may contain and may transmit personal information (tracking cookies).
-
- Spy SweeperÖ "sweeps" your computer looking for evidence of these programs, reports its findings, and
- lets you decide whether to quarantine and remove the program or keep it running on your system.
- Quarantining and removing programs will disable it until you decide to delete the program completely or restore it.
-
- Software detected by Webroot Spy Sweeper
-
- Adware:
- Adware is advertising-supported software that displays pop-up advertisements whenever the program is
- running. The software is usually available via free download from the Internet, and it is the
- advertisements that create revenue for the company. Although seemingly harmless (aside from intrusiveness
- and annoyance of pop-up ads), adware can install components onto your computer that track personal
- information (including your age, gender, location, buying preferences, surfing habits, etc.). Most
- advertising supported software doesn't inform you that it installs adware on your system, other than via
- buried reference in a license agreement. In many cases the software will not function without the adware
- component. Some Adware can install itself on your computer even if you decline the offer.
-
- System Monitors Software:
- System monitors are applications designed to monitor computer activity to various degrees. These programs
- can capture virtually everything you do on your computer including recording all keystrokes, emails, chat
- room dialogue, web sites visited, and programs run. System monitors usually run in the background so that
- you do not know that you are being monitored. The information gathered by the system monitor is stored on
- your computer in an encrypted log file for later retrieval. Some programs are capable of emailing the log
- files to another location. Traditionally, system monitors had to be installed by someone with administrative
- access to your computer, such as a system administrator or someone that shares your computer. However, there
- has been a recent wave of system monitoring tools disguised as email attachments or "freeware" software products.
-
- Trojan Horses:
- Trojans Horses or Trojans are malicious programs that appear as harmless or desirable applications. Trojans are
- designed to cause loss or theft of computer data, and to destroy your system. Some Trojans, called RATs
- (Remote Administration Tools), allow an attacker to gain unrestricted access of your computer whenever you are
- online. The attacker can perform activities such as file transfers, adding/deleting files or programs, and
- controlling the mouse and keyboard. Trojans are generally distributed as email attachments or bundled with
- another software program.
-
- Other:
- There are many other suspicious and/or annoying programs that can find their way onto your computer without
- your express knowledge. These programs often come bundled with third-party programs or can be installed as
- ôdrive-by downloads.ö Some of these programs have spyware capabilities, while others may serve as an annoyance
- or negatively affect your system resources. There are many terms for these types of programs including scumware,
- annoyanceware, parasites, malware, etc.
-
-
-
-
-
-
-