Solved

Spyware

Posted on 2011-02-22
16
563 Views
Last Modified: 2012-05-11
Anyonehave a good free spyware program to recommend?
0
Comment
Question by:wball1217
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
  • 3
  • +3
16 Comments
 
LVL 38

Accepted Solution

by:
younghv earned 200 total points
ID: 34951298
Download, install, and run
Malwarebytes (MBAM) (http://www.malwarebytes.org/mbam.php)
When downloading, save to your "Desktop" and use the "Save As" function (Internet Explorer) to rename the file.
The instructions are included right in that link.

You might want to review my Article here for more details:
http://www.experts-exchange.com/Digital_Living/Software/A_1958-MALWARE-An-Ounce-of-Prevention.html
0
 
LVL 2

Expert Comment

by:Little_K
ID: 34951307
Hi there,

You can try malwarebytes or spybot.

They are both freeware programs
0
 
LVL 38

Expert Comment

by:younghv
ID: 34951335
Hi Little_K,
Welcome to EE.

A little tip for posting suggestions is to include a valid link when you're recommending a download - it saves the Asker the trouble of searching for it.
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

 
LVL 29

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 200 total points
ID: 34951912
There are, it seems, hundreds of pieces of free software.  If you look at the Ultimate Boot CD 4 Windows (UBCD4Win) it contains many of them.  Check it out http://www.ubcd4win.com/ .

Also I have found some specific ones helpful.  As already mentioned MalwareBytes AntiMalware (MBAM), and Spybot.  Also  CCleaner, Glary Utilities, SuperAntispyware, Free version of Avira and too many more to delineate.
0
 
LVL 6

Expert Comment

by:theonlyallan
ID: 34952684
I second malwarebytes as well.. Very useful, and free.
0
 
LVL 4

Expert Comment

by:Joseph Ruiz
ID: 34956120
Adaware scans in the background for you. Just like antivirus, and its free. Malware bytes will catch somethings that most other spywares do not, but you'll have to remember to run it manually.
0
 
LVL 38

Expert Comment

by:younghv
ID: 34956538
Malwarebytes (Free) provides "on-access" scanning while using your computer.

You have to 'manually' run the definition updates and the actual scan of your computer.

The basic program is in fact free, but a lifetime (your lifetime) license is only about US$25 - a one time cost for your current and all subsequent computers.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 34956737
Since the OP asked about "Spyware" apps, I didn't mention in my first answer that it would be wise to have antirootkit software handy as well.  I do sometimes harp on this only because I feel it is really useful and rootkits are becoming more prevalent.

For a review of free anti-rootkit software and a basic explanation of rootkits, see my article:

http://www.experts-exchange.com/Virus_and_Spyware/Anti-Virus/A_2245-Anti-rootkit-software.html
0
 
LVL 2

Assisted Solution

by:Hapexamendios
Hapexamendios earned 100 total points
ID: 34960623
Just one addition to the other expert's valuable comments: be wary.

Don't download something purely on oen or two recommendations, and be particularly aware that any searches you perform for "anti-virus", "anti-spyware" or "anti-rootkit" software will most often lead you to software which infects rather than helps you. These programs are the "bona-fide" or orignal Trojan Horses; they do a real, useful job, leading you not to suspect them, whilst doing something nasty in the background.

If you feel compelled (as you should) to look around on the web, use a browser which doesn't identify itself or send "HTTP-Referrer" infromation to sites. This is something malware users rely on to gain victims whilst avoiding analysis by security experts. Doing so will allow you to learn more with reduced infection risk.

Happ hunting...
0
 
LVL 2

Expert Comment

by:Hapexamendios
ID: 34960625
Just one addition to the other expert's valuable comments: be wary.

Don't download something purely on oen or two recommendations, and be particularly aware that any searches you perform for "anti-virus", "anti-spyware" or "anti-rootkit" software will most often lead you to software which infects rather than helps you. These programs are the "bona-fide" or orignal Trojan Horses; they do a real, useful job, leading you not to suspect them, whilst doing something nasty in the background.

If you feel compelled (as you should) to look around on the web, use a browser which doesn't identify itself or send "HTTP-Referrer" infromation to sites. This is something malware users rely on to gain victims whilst avoiding analysis by security experts. Doing so will allow you to learn more with reduced infection risk.

Happ hunting...
0
 
LVL 38

Expert Comment

by:younghv
ID: 34960671
@Hapexamendios,
I have no way of knowing what you are implying, but I always encourage question askers to review the profile/history of the Experts making recommendations.

Mine: (http://www.experts-exchange.com/M_3628488.html); and
tzucker's (http://www.experts-exchange.com/M_5150276.html); and
yours (http://www.experts-exchange.com/M_5334174.html)

Based on the actual results, it would seem to be safe for our Members to follow the advice give by tzucker and me.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 34961321
@younghv - interesting observation.  I generally have not given that advice, but that omission has been due to the fact that I recognize most of the experts' handles and have taken it for granted.  Checking out profiles is something I haven't done regularly since the first months I joined ee.

I do agree with @hapexamendios that using a browser that gives the least amount of information about the user is good.  However one should also use a browser that has enough safeguards to prevent driveby infections (visit a website, don't click on anything, but you are infected).  I personally like chrome with unchrome applied to it.  I also augment Chrome's built in security with WOT.  And I highly suggest using a virtual machine when browsing the web, especially if you are doing a search for antimalware applications.  Of course you can use any browser if you set it up to use TOR.
0
 
LVL 2

Expert Comment

by:Hapexamendios
ID: 34961612
@younghv and @tzucker

No offense intended, or implicit accusation of anyone - particularly those who have attained "Genius" or "Guru" rank :)

Just trying to state the obvious for clarity since the poster's question does suggest this might be necessary. I personally don't trust Malwarebytes Anti-malware, but that's a personal opinion not intended to outweigh your experience with it. My distrust is anecdotal and stems from often finding it on computers which I have to forensically examine and prepare for evidence, or recover from a malware product. In those cases the anti-malware program had clearly been tampered with prior to its download and install (packed with an encrypted, compressed Trojan) and then re-posted on the download site.

This is not by any means conclusive proof of any weakness in the product, I smply stick to what I know like most folks :) and I doubt either of you two needed to be told any of this - but we're not here for each otehr in that respect, eh? :)

Keep solving, I note with respect your inherent skills and helpfulness.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 34961668
Good observation and one that should be taken seriously.  There is a site, which will not be mentioned here, where mbam can be downloaded but it is generally not good practice to download from there as it has been found to have malware infections.  I always suggest downloading mbam from http://www.malwarebytes.org/.
0
 
LVL 38

Expert Comment

by:younghv
ID: 34969773
<<In those cases the anti-malware program had clearly been tampered with prior to its download and install (packed with an encrypted, compressed Trojan) and then re-posted on the download site.>>

It is more likely that the malware modified the files DURING the download process.

Many forms of malware currently "know" the file names for MBAM, ComboFix, etc.

The standard advice is to use the "Save As" (IE), function to give the downloaded executables completely random names...to prevent that modification.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 34970257
Also here is my delicious bookmarks list of relevant sites and interesting articles regarding AV problems (not comprehensive, but certainly helpful): http://www.delicious.com/tzucker/antivirus
0

Featured Post

Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Some of the most commonly posted questions in the "Virus & Malware" Zones are related to the family of rogue malware with the date "2012" somewhere in the title. Examples: XP Antispyware 2012 XP Antivirus 2012 XP Security 2012   XP Home Sec…
The password reset disk is often mentioned as the best solution to deal with the lost Windows password problem. In Windows 2008, 7, Vista and XP, a password reset disk can be easily created. But besides Windows 7/Vista/XP, Windows Server 2008 and ot…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question