Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi,
Is there any better Anti-virus tool in Windows server? In the attached screenshot, would Clamwin further totally remove the virus or not?
0
How do you know if your security is working?
LVL 1
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

Hi,

I got this message (The file c:\...\.ost cannot be accessed because another workstation has modified it. Close and then restart mail enabled applications. You might need to restart your computer)
is this means somebody spying on my computer ?
I am afraid somebody implanted a key logger in my computer
0
If you have a Sonicwall to protect the network and Anti-Virus on each computer/server, is it safe to turn off Windows Firewall?
0
Are 32 bit computers at a higher risk of Anti-Virus, Malware or Ransomware infections?

We have a few left and I need to know if I should trash them ASAP.
0
Hi all,

we are searching for the best endpoint protection available for SMB. I am looking for the top 3. Currently we are working with Kaspersky Endpoint Security.

Anyone any suggestions?

Thank you,
0
can an installed .exe file on windows os see all my key strokes
I have a custom made .exe file that appears to me to run correctly
but may have additional secret permissions

by installing any program
could a keylogger be built in

dont just tell me to run virus scan
1
Learn to use the POWER of Mailwasher Pro - Part 2
This is Part-2 of Learning to use the Power of Mailwasher Pro so if you haven't watched Part-1 yet, I urge you to do so before watching this video. Click this link to watch Part-1.

Ok, that out of the way, what we're going to cover here is how to setup additional Email accounts in Mailwasher, along with how to classify what "you" consider to be spam and what you don't. Also, we'll be looking at how we can recover deleted emails, even if you've cleared your Deleted Items folder in Outlook and more.

Remember the old adage of One Man's Rubbish is another Man's Treasure? Well, that's why I dislike Online Spam Filtering services and prefer tools like Mailwasher because it gives me total control - a control that you should have too and in doing so, never having to lose a genuine email again.

Finally, if you found this video helpful, please do click that Thumbs Up button below.

It really helps me out and provides me with positive feedback
.


With that said, let's get on with the show. I hope you enjoy the video(s)

Enjoy!

About the Author: Andrew Leniart is a self-employed IT Professional and Freelance Journalist with over 25 years of experience in using, fixing and troubleshooting Windows computers, dealing with a wide variety of installations, operating system versions, and software. He currently holds the Senior Editor position at Experts Exchange.

1. Introduction.

(00:00 - 00:20) An introduction on what is going to be covered in this episode.

2. Manually setting up an email account.

1
Learn to use the POWER of Mailwasher Pro - Part 1
If you, like me, have a dislike for using Online Subscription anti-spam services, then this video series is for you. I have an inherent dislike of leaving decisions such as what is and what isn't spamming to other people or services for me and insist on being able to make those decisions for myself.

Why?

Because as the old adage goes, one man's trash is another man's treasure. This video series is about a tool that I've been using for over 15 years now and as a result, my Outlook inbox has been 99.99% free of spam for many, many years. Yours can be too and it's easier than you may think!

This Video Tutorial shows how to obtain and install a tool called Mailwasher Pro which in this authors opinion, is one of the best Anti-Spam utilities available on the market. As mentioned previously, I've been using Mailwasher for over 15 years now and can honestly say that my Outlook Inbox is 99.9% free of Spam.

This is a multi-part series that goes into not just installation and use but shows you advanced configuration options to train Mailwasher Pro to know exactly what YOU consider to be spam, rather than rely on online services who make those decisions for you.

For those of you that prefer to read articles rather than watch videos, please check out the articles I've written on this topic and published on experts exchange at the following links:

Learn to use the POWER of Mailwasher Pro - Part 1
Learn to use the POWER of Mailwasher Pro - Part 2

1
Mailwasher Pro
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Excellent, I think a lot of users get stuck on the email settings parts and what they mean, so this guide makes that a lot clearer.
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comments Nick and I'm glad you approve. I'm writing these articles so that people can learn to use the power of this tool and enjoy it's functionality just as I have been for so many years.

Regards, Andrew
0
Mailwasher Pro
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Thanks again Andrew, you write so well!
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Thank you very much for the kind compliment Nick!

If you would be so kind as to endorse the article by clicking the thumbs up at the bottom of the article, (to the left of the word comment) I'd very much appreciate it :)

Part-4 of the series is almost written and will be published soon!

Best regards,

Andrew
0
Cloud Class® Course: SQL Server Core 2016
LVL 12
Cloud Class® Course: SQL Server Core 2016

This course will introduce you to SQL Server Core 2016, as well as teach you about SSMS, data tools, installation, server configuration, using Management Studio, and writing and executing queries.

Mailwasher Pro
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
1

Expert Comment

by:Nick Bolton
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.
0
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.

Thanks for the kind comment Nick and once again, welcome to Experts Exchange! Watch out for Part-3, being written now and will soon be published.

Best...

Andrew Leniart
0
Mailwasher Pro
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
1

Expert Comment

by:Nick Bolton
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!

Hi Nick and welcome to Experts Exchange! Thank you for your kind comment and also for endorsing the article with a thumbs up. That means a lot to me so much appreciated.
0
I have an issue where I'm sure someone is hacking our network, specifically four machines.  I have witnessed them going into my home folder and deleting my trash on these machines.  They are also able to change the camera settings.  For example, they're zooming in to locations.  They are doing playback.  This all happens between the hours of 12am-2am.

I'm using:
Windows 10
Palo Alto Networks
Security Camera Milestone software.  https://www.milestonesys.com
The cameras are made by Mobitics.

What I've narrowed it down to is this happens when the security camera milestone software is up and running on the four machines.  When I turn that software off there's no connectivity or suspicious things going on.

What I need to know is how do I find out who is doing this?  How can I get an IP address?  Are they inside my network or outside my network?

I would even appreciate a recommendation of a security company that knows how to track intruders down.

Note:
I've checked the parking lot and areas of the campus to see if someone is psychically here, but I don't see anyone.  I've also contacted Milestone software and they've recommended I change my password and the camera's password, but we are still having an issue.
0
Has anyone implemented a rule on  ESET ERA Admin Portal which blocks USB devices but still allows phones to be charged?
0
AV software best compatible with O365. Any suggestion? Local outlook emails? Thanks
0
A Trickbot Infestation has ravaged my network. It has wormed its way on to all workstations and servers. Does anyone know how to eradicate it and keep it from re-infecting other computers? If not, does anyone know of a company that specializes in removing this particular malware. I've tried different malware software removal tools and they identify and  remove it but it keeps coming back.
0
I have a question about Symantec Endpoint Protection.  We are trying to block USB access but are running into an issue with one of our devices.  From what I can tell, things like imaging devices are not supposed to be blocked.

However, many of our stations have ID scanners that are being blocked.  When I look in the device manager the ID scanners do show up as imaging devices.  

I'm not seeing how you white list a device.  

Thanks in advance for any help.
0
A friend is using Windows 10 (which is kept up to date).
He also has AVG Antivirus.
He normally uses Paypal for purchases (without any problems).

This morning, within an hour of using his actual Visa Debit Card on Government
website (motortax.ie) his card number was fraudulently used on some dating website.
(The bank phoned and cancelled the transaction and his card).

I'm going to run some scans tomorrow
- MalwareBytes scan in safe mode
- Hitman pro
- AVG

Any other suggestions?
0
Good evening Experts,
I have just been repairing my computer from a malicious virus. I could not use virus/malware software (MalwareBtyes, Superantispyware, and Spyhunter, on my machine because the malware/virus disabled them, so I used BitDefenders Rescue usb to kill most of the problems. I finished off the rest of the malware/viruses using my regular software (MalwareBtyes, Superantispyware, and Spyhunter). The system stable except for a couple of issues:
1.      My folder indexing does not work and I would like an expert to help me fix it. However I did download a free search program call everything and it is more robust than the Windows 10 index\search. I still need a solution for why the windows indexing\search is not letting me search inside of folders.
2.      This second issue is more critical than the previous one. For some reason when I login to any of my accounts: THANOS, IMRIC , ADMINISTRATOR, the desktop icon for the user profile defaults to (Folders)

Any help the experts can give me will be appreciated.
Regards,
Regis Hyde (BlackTHanos)
0
Hey MSSPs! What's your total cost of ownership?
LVL 1
Hey MSSPs! What's your total cost of ownership?

WEBINAR: Managed security service providers often deploy & manage products from a variety of solution vendors. But is this really the best approach when it comes to saving time AND money? Join us on Aug. 15th to learn how you can improve your total cost of ownership today!

does norton go after viruses
malware bytes goes after malware

do I need both

windows10
0
How can I remove maleware bytes trial and get another trial


windows 10
0
Here are the pop ups that i am getting, if i click Ok, i am getting like parameter incorrect.:  Here are the pop ups that i am getting, if i click Ok, i am getting like parameter incorrect.Whenever I plug in my charger, a small tap is popping continuously saying php update available, then i click OK, but it's again coming like update available. i am using Lenovo-idea pad-1470 series. can anybody help me please?
IMG_9388.jpg
0
I have a client who had a scareware event with a threatening dialog that offered a number to call to "help him".  I disinfected, as I normally do, with Adwcleaner, Malwarebytes, and Hitmanpro64, which usually does a nice job eradicating the beasts.  Another has appeared that seems familiar, and so I'm concerned that I might have missed something   The dialog, which my client sent me, and I didn't myself experience, is attached.  

My question is how can I find the source of that dialog, or others of that ilk, and know that I've removed it, or not, using the above system or another.

Your insights are appreciated.
IMG_2917.mov
0
How can I temporarily disable Windows Defender within Server 2016?

I don't want to uninstall or permanently disable Windows Defender.

I simply want to temporarily disable it and then I'll enable it again once I'm done.

How can this be done?
0
We have Trend Micro in our network. After looking at  sever audit failure logs on windows domain server, we ran scan and couldnt find anything.

After running scan by malwarebytes we found several issues and cleaned up. This appears to have helped with malwarebytes.

Can we do away with Trendmicro and just have malwarebytes or do we need both malwarebytes and trendmicro?
1

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.