| 
          
            
              | The Spyware
                Warrior Guide toAnti-Spyware
                Programs:Feature Comparison |  
          
            
              | On this page... | Other pages
                of interest... |  Return
        to top 
          
            
              | Overview As spyware and adware have become increasingly powerful and
                difficult to remove, developers of anti-spyware programs have
                added a wider range of functionality to their applications to
                give users more powerful tools as well as greater control over
                those tools. Moreover, although anti-spyware applications have
                long resembled standard anti-virus applications in many ways,
                they have also started to acquire their own distinctive set of
                features in order to help users deal with the unique problems
                posed by spyware and adware. Given the bewildering array of
                programs and features available to users looking for
                anti-spyware applications, users may find it difficult to
                usefully compare anti-spyware programs and their feature sets.
                 To remedy that potential confusion, this page presents two Feature
                Comparison Tables for the major anti-spyware programs
                currently available. An explanation of the features considered
                can be found below the table
                in the Notes section. 
                 Please note...
                 Please note that the anti-spyware programs listed on this
                page comprise a limited subset of the larger array of
                anti-spyware programs that can be found on the Net (numbering at
                last count over 150). Moreover, this page is restricted to
                dedicated anti-spyware programs with scanning capabilities. 
                 
                Thus, not considered on this page are anti-virus programs,
                anti-trojan programs, or general anti-malware programs, many of
                which may be adding spyware and adware detection and removal.
                Also not considered are anti-spyware programs that are devoted
                exclusively to spyware prevention. Finally, the programs listed
                here may offer additional features that are not considered on
                this page.
                 Recommendations...
                 A set of Recommended Programs
                is listed below. Readers
                interested in purchasing anti-spyware applications are advised
                to investigate and test those programs on their own systems. No
                one program will be useful, convenient, effective, and
                appropriate for every user. Moreover, as testing
                with these anti-spyware applications has demonstrated,
                no single anti-spyware application will remove everything.
                Therefore, users are advised to install and use at least two
                anti-spyware applications.
                 Finally, users should take additional
                steps to protect their systems beyond just installing one of
                the anti-spyware programs listed below. If your system is
                currently infested with spyware and adware, see below
                for tips on what you can do.
 |  Return
        to top 
  
    
      | Anti-Spyware
        Feature Comparison Table: Group 1 (see Notes)
 |  
      | Feature/Application | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Company | Lavasoft | SaferNetworking | CA | Webroot | Microsoft | Sunbelt |  
      | - Version | SE 1.0.6 | 1.4 | 2005 | 5.0 | Beta 2 | 1.5 |  
      | - URL | link | link | link | link | link | link |  
      | - Price | free / $26.95
        * | free | $39.95 | $29.95 | n/a + | $19.95 |  
      | - Renewal | free / n/a
        * | free | $19.95 | $29.95 | n/a + | $9.98 |  
      | - Full-featured trial | X | X | --- | --- | n/a + | X |  
      | Scanning | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Memory scans | X | X | X | X | X | X |  
      | - Registry scans | X | X | X | X | X | X |  
      | - Drive scans | X | X | X | X | X | X |  
      | - Customized scans | X | X | X | X | X | X |  
      | - Remove on reboot | X | X | X | X | X | X |  
      | - Rootkit detection | --- | --- | --- | X | --- | --- |  
      | - ADS scans | X | --- | --- | --- | --- | --- |  
      | - Scan log/report | X | X | X | X | X | X |  
      | Scan Configuration | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Whitelist (exclude) | X | X | X | X | X | X |  
      | - Quarantine/recovery | X | X | X | X | X | X |  
      | - System start scans | X | X | --- | X | --- | --- |  
      | - Scheduled scans | --- | X | X | X | X | X |  
      | Prevention/Protection | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Memory processes | (X) | X | X | X | X | X |  
      | - Browser hijack | (X) | X | --- | X | X | X |  
      | - Startup settings | (X) | X | --- | X | X | X |  
      | - HOSTS file | --- | X | --- | X | X | X |  
      | - ActiveX kill bits | --- | X | --- | --- | --- | X |  
      | - Restricted sites | --- | X | --- | --- | --- | --- |  
      | Diagnostic Tools | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - BHOs | --- | X | --- | X | --- | X |  
      | - ActiveX controls | --- | X | --- | --- | --- | X |  
      | - Browser settings | X | X | --- | X | --- | X |  
      | - Startup locations | --- | X | --- | X | X | X |  
      | - HOSTS file | --- | X | --- | X | --- | X |  
      | - Winsock LSPs | [X] | X | --- | --- | X | X |  
      | Updates | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Manual | X | X | X | X | X | X |  
      | - Program start | X | X | X | X | X | X |  
      | - Scheduled | --- | --- | --- | --- | X | X |  
      | Supported
        Windows | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  
      | - Windows XP | X | X | X | X | X | X |  
      | - Windows 2000 | X | X | X | X | --- | X |  
      | - Windows NT 4 | X | X | X | --- | --- | --- |  
      | - Windows Me | X | X | X | X | --- | X |  
      | - Windows 98 SE | X | X | X | X | --- | X |  
      | - Windows 98 | X | X | X | --- | --- | --- |  
      | - Windows 95 | --- | X | --- | --- | --- | --- |  
      | Feature/Application | Ad-aware
        SE | Spybot
        S&D | Pest
        Patrol | Spy
        Sweeper | Windows Defender | CounterSpy |  Return
        to top 
  
    
      | Anti-Spyware
        Feature Comparison Table: Group 2 (see Notes)
 |  
      | Feature/Application | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Company | McAfee | TrendMicro | PC Tools | Tenebril | StompSoft | Xblock.com |  
      | - Version | 2006 (2.0) | 3.0 | 4.0 | 2006 (4.0) | 2005 | 2.2 |  
      | - URL | link | link | link | link | link | link |  
      | - Price | $29.99 | $29.95 | $29.95 | $29.95 | $29.99 | $39.95 |  
      | - Renewal | $9.99 | n/a | $14.97 | $19.95 | $29.99 | $9.95 |  
      | - Full-featured trial | X | --- | X | X | X | --- |  
      | Scanning | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Memory scans | X | X | X | X | X | X |  
      | - Registry scans | X | X | X | X | X | X |  
      | - Drive scans | X | X | X | X | X | X |  
      | - Customized scans | X | X | X | X | X | X |  
      | - Remove on reboot | X | X | X | X | X | X |  
      | - Rootkit detection | --- | --- | X | --- | --- | --- |  
      | - ADS scans | --- | --- | X | --- | --- | --- |  
      | - Scan log/report | --- | X | X | X | X | {X} |  
      | Scan Configuration | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Whitelist (exclude) | X | X | X | X | X | --- |  
      | - Quarantine/recovery | X | X | X | X | X | --- |  
      | - System start scans | --- | X | X | --- | X | <X> |  
      | - Scheduled scans | X | --- | X | X | --- | --- |  
      | Prevention/Protection | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Memory processes | X | X | X | X | X | --- |  
      | - Browser hijack | X | X | X | X | --- | --- |  
      | - Startup settings | X | --- | X | X | --- | --- |  
      | - HOSTS file | X | --- | X | X | --- | --- |  
      | - ActiveX kill bits | --- | --- | X | --- | --- | X |  
      | - Restricted sites | --- | --- | X | --- | --- | --- |  
      | Diagnostic Tools | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - BHOs | --- | --- | X | X | --- | --- |  
      | - ActiveX controls | --- | --- | --- | X | --- | --- |  
      | - Browser settings | X | --- | --- | X | --- | X |  
      | - Startup locations | X | --- | --- | X | X | X |  
      | - HOSTS file | --- | --- | --- | X | --- | --- |  
      | - Winsock LSPs | --- | --- | --- | X | --- | X |  
      | Updates | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Manual | X | X | X | X | X | X |  
      | - Program start | X | X | X | --- | X | X |  
      | - Scheduled | --- | --- | X | X | --- | --- |  
      | Supported
        Windows | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  
      | - Windows XP | X | X | X | X | X | X |  
      | - Windows 2000 | X | X | X | X | X | X |  
      | - Windows NT 4 | --- | --- | --- | --- | X | X |  
      | - Windows Me | X | X | X | --- | X | X |  
      | - Windows 98 SE | X | X | X | --- | X | X |  
      | - Windows 98 | X | --- | X | --- | X | X |  
      | - Windows 95 | --- | --- | --- | --- | --- | X |  
      | Feature/Application | AntiSpyware | Anti-Spyware | Spyware
        Doctor | SpyCatcher | Spyware
        X-term. | X-Cleaner |  Return
        to top 
  
    
      | Anti-Spyware
        Feature Comparison Table: Group 3 (see Notes)
 |  
      | Feature/Application | SUPERAntiSpyware | AVG
        Anti-Spyware | Ashampoo
        AntiSpyware | ZeroSpyware | Spyware
        Fighter | Spyware
        Terminator |  
      | - Company | SUPERAdBlocker | ewido/Grisoft | Ashampoo | FBM
        Software | SPAMFighter | Crawler |  
      | - Version | 3.2 | 4.0 | 1.4 | 2006 (3.4) | 1.7 | 2.5 |  
      | - URL | link | link | link | link | link | link |  
      | - Price | $29.95 | $29.95 | $29.99 | $29.95 | $29.00 | free |  
      | - Renewal | $9.95 | $14.97 | $29.99 | $19.95 | $29.00 | free |  
      | - Full-featured trial | X | X | X | X | X | X |  Note: full feature comparison of products in Table
        3 to follow in the next few weeks. Return
        to top   
          
            
              | Notes: 
 
                  
                    
                      | * | Ad-aware SE
                        Personal is free for personal use; Ad-aware SE Plus is
                        $26.95 |  
                      | + | On Dec. 16,
                        2004 Microsoft announced
                        that it had acquired GIANT Company. On Jan. 6, 2005
                        Microsoft announced the release of a public
                        beta of Microsoft
                        AntiSpyware, which is based on GIANT's old 
                      AntiSpyware product. In Feb. 2006, Microsoft released a 
                      second beta of its anti-spyware product, this time named 
                      "Windows Defender." |  
                      | X | feature is
                        present |  
                      | --- | feature is not
                        present |  
                      | (X) | feature is
                        present only in Ad-aware SE Plus & Professional, not
                        free Personal version |  
                      | [X] | feature is
                        present in Ad-aware SE w/ free, downloadable plug-in |  
                      | {X} | feature is
                        present in X-Cleaner through use of command line
                        switches and/or scripts |  
                      | <X> | feature is
                        present in X-Cleaner during installation but not configurable thereafter |  
                      |  |  |  
                      | General Info: | Price information is taken
        from the vendor's home page. Prices may vary at resellers, both online
        and offline. Stated price includes an initial 12 month subscription to updates.
                        Renewal price is for a 12 month renewed
                        subscription to updates, where applicable (some applications are
                        not subscription-based but rather supply free updates
                        until the next major version release of the program). All
                vendors listed here offer trial versions of their programs,
                however, many of these trial versions are severely limited. A Full-featured
                trial version offers at a minimum the ability to scan
                and remove spyware and adware, though even this kind of trial
                version will usually be time-limited and/or may not perform
                updates. |  
                      | Scanning: | Anti-spyware applications should, at
        a minimum, scan Memory, the Windows Registry,
        and all Drives on the system. Users should also be able
        run Customized scans (e.g., select only certain
        drives to scan or scan memory only). Anti-spyware applications must also
        be able to Remove on reboot spyware/adware that refuses to
        be removed through normal processes. Anti-spyware applications should 
                      have Rootkit detection capabilities that are 
                      not signature dependent, and they should be able to scan 
                      NTFS Alternate Data Streams (ADS). Finally, anti-spyware applications
        should generate an exportable Scan log/report (plain text
        or HTML). |  
                      | Scan Configuration: | Users should be able to add
        items to be ignored or excluded during scans to a Whitelist.
        They should also be able to undo removals through a Quarantine/recovery
        function. Anti-spyware applications should be able to performs scans on System
                        start. Moreover, users should be able to run Scheduled
        scans on days and times of their choosing. |  
                      | Prevention/Protection: | Anti-spyware
        applications should have a resident component that: 1) scans Memory
        processes for spyware/adware modules; 2) monitors the
        Registry for Browser hijacks and changes to system Startup
        settings; and 3) monitors the HOSTS file for
        additions and changes. Anti-spyware applications should also be able to
        immunize Internet Explorer by setting ActiveX kill bits
        for known spyware/adware and adding a list of known problem web sites to
        the Internet Explorer Restricted sites  list (or otherwise
                        blocking installations from a black list of sites).. |  
                      | Diagnostic Tools: | Anti-spyware programs should
        offer users a set of tools to examine key aspects of their systems
        including: installed BHOs (Browser Helper Objects),
        installed ActiveX controls, key user configurable Browser
        settings (e.g., home page and search pages), programs added to
        system Startup locations, entries in the Windows HOSTS
        file, modules in the Winsock LSP chain. |  
                      | Updates: | Users should be able to perform Manual
        updates as well as configure the anti-spyware application to
        automatically check for updates on program Program start
        and at Scheduled intervals. |  
                      | Supported Windows: | Anti-spyware
                        programs should support
        a range of different versions of Windows, not just the
                        "latest and greatest". |  |  Return
        to top 
          
            
              | Recommended Programs Although all of the programs listed on this page are worthy of
      consideration, at present time we officially recommend the following: 
 
        Note to Vendors: please do not email me and 
        request to be added to the above list of "recommended" products. This 
        list of "recommended" products is based on extensive experience with the 
        listed products and is not a list to which one can apply for admission.
 Disclaimer: the 
      maintainers of Spyware Warrior have enjoyed consulting relationships with
      
      Sunbelt Software, makers of the
      
      CounterSpy anti-spyware application. Given that relationship and the 
      inherent conflict of interest it represents, we refrain from recommending
      
      CounterSpy. Spyware Warrior has no financial relationship with any of 
      the companies whose products are listed or recommended above. We are not employees, affiliates, representatives, or
      other agents of any of these companies.
 
        In addition, there are  other "freeware" scanners that you may 
        find useful:  You should not rely exclusively on this short list of
      anti-spyware applications, however. Rather, you should investigate and test a range
      of reputable anti-spyware programs to find the programs that are best
      suited to your own privacy and security needs.
       Moreover, we recommend that you install and use at least two
      anti-spyware programs because, unfortunately, no single anti-spyware
      program detects and removes 100
      percent of the spyware and adware on the Net. For more information see
      the anti-spyware
      testing reported elsewhere on this site.
       Anti-Spyware for the Mac
       We're starting to get more and more questions from Mac users about
      anti-spyware. At this time, the only anti-spyware program that we know of
      for the Mac is:
 Anti-Virus & Firewall Applications In the past year, several 
      anti-virus, anti-malware, and personal firewall applications have incorporated robust 
      anti-spyware detection and removal. These programs include:
 Although these anti-virus and personal firewall products may offer some 
      protection against spyware and adware, we still recommend that users not 
      rely exclusively on one of these products in lieu of a dedicated 
      anti-spyware product, such as those listed 
      earlier on this page. Disclaimer: the 
      maintainers of Spyware Warrior have enjoyed consulting relationships with
      
      Sunbelt Software, makers of the
      
      CounterSpy anti-spyware application. Given that relationship and the 
      inherent conflict of interest it represents, we refrain from recommending
      
      CounterSpy. Spyware Warrior has no financial relationship with any of 
      the companies whose products are listed or recommended above. We are not employees, affiliates, representatives, or
      other agents of any of these companies. Other Things You Can Do... Protecting your system against spyware and adware involves more than
        just installing one of the anti-spyware programs listed above. What follows below is a set of recommended
        additional steps for protecting for your PC. If your PC is already infested with spyware or adware,
        see the instructions
        for getting help included later on
        this page. 
          
            
              | 1. |  | Install anti-malware protection |  
              |  |  |  |  
              |  |  | 
        Basic Free Protection 
        Scanning for spyware and adware isn't enough to protect your PC. You
        also need to take preventative steps to ensure that unwanted software
        doesn't come back. One effective way to prevent spyware and adware from
        returning is to install an anti-spyware prevention program such as: SpywareBlaster and SpywareGuard are excellent, free programs from
        JavaCool. I recommend installing and using both, as they protect your
        computer in different ways. SpywareBlaster "inoculates" your
        Internet Explorer browser against the installation of unwanted spyware
        and adware from the internet. SpywareGuard actively monitors your PC and
        prevents spyware infestations. Both are easy to install and update. Advanced HIPS & Rootkit Protection In the past few years a new generation of anti-malware protection
        products has emerged. This new type of anti-malware protection, called
        HIPS (Host Intrusion Protection System), works at the kernel level to
        intercept malware before it hits your hard drive and infects the system.
        Although this technology is still maturing, a HIPS defense may be worth
        looking into for some users. For a run-down of the latest HIPS
        applications, see this discussion on the Spyware Warrior forums: Advanced users may also be interested in the broadening array of
        anti-rootkit programs that are available: Please keep in mind the HIPS and anti-rootkit applications are both
        emerging technologies that may not be appropriate for home users who
        aren't technically savvy. |  
              |  |  |  |  
              | 2. |  | Lock down your browser |  
              |  |  |  |  
              |  |  | One of the most prevalent means for spyware and adware to be
        installed is through Internet Explorer. To prevent spyware and adware
        from installing without your knowledge and permission, you need to
        "lock down" Internet Explorer. There are several ways to do
        this. Securely configure the Internet zone First, you can securely configure the Internet zone of Internet
        Explorer and add sites that you trust to the Trusted sites zone. This
        means that by default web sites will not be able to use "active
        content" (i.e., ActiveX controls, Java applets, and scripting)
        until you explicitly choose to trust those web sites. See this page for
        instructions on how to securely configure Internet Explorer: 
          
        
        Internet Explorer Privacy & Security Settings By turns, you could also use this free program, which will
        automatically configure Internet Explorer for you: 
          
        
        Enough
        is Enough! One potential downside to securely configuring the Internet zone is
        that some web sites will not work properly until you add them to the
        Trusted sites zone -- a process that some users find cumbersome. Add bad sites to the Restricted sites zone Second, you can use another approach to "locking down" Internet
        Explorer which avoids the hassle of broken web sites by adding known
        "nasty" sites to the Restricted sites zone. Doing so gives
        your PC protection against known threats while still allowing most web
        sites to work by default. To put the clamp down on a long list of
        undesirable web sites, you can install and use this free program: 
          
        
        IE-SPYAD If you choose to use the Restricted sites approach of IE-SPYAD, be
        sure to update your copy of IE-SPYAD regularly, as new web sites are
        constantly being added to the list. |  
              |  |  |  |  
              | 3. |  | Use an alternative browser |  
              |  |  |  |  
              |  |  | Internet Explorer is not only the most popular browser on the Net, it
        is also the browser most widely and easily exploited by spyware pushers
        to install spyware and adware behind users' backs. Thus, you might
        decide that Internet Explorer is simply not worth the hassle or risk. In
        that case, you can install and run an alternative, non-IE browser such
        as: All three of these browsers are mature, robust, and fast. Moreover,
        they have built-in pop-up blocking and several other nice features that
        Internet Explorer simply lacks. More importantly, all three of these
        browsers are much less susceptible to unwanted adware and spyware
        installations. And all three are free. Note: even if you do switch to an alternative browser, you
        should still lock down Internet Explorer, as described above. Given that
        Internet Explorer has effectively been integrated into Windows, it can
        still be exploited by adware and spyware that gets installed to your
        system through other means. Thus, locking down Internet Explorer remains
        important even if you're not regularly using Internet Explorer to browse
        the internet.  |  
              |  |  |  |  
              | 4. |  | Keep your system safe & secure with Windows Update |  
              |  |  |  |  
              |  |  | To prevent unwanted spyware and adware from being installed behind your back, you need to install all the latest
                "Critical Updates" from Microsoft. Doing so is easier than you might think. 
 Microsoft has an entire Windows
                Update site devoted to automatically updating users' systems with all the latest fixes and patches for a wide range of Microsoft software, including Windows, Office (Word, Excel, PowerPoint, Access), and Internet Explorer.
 
 We strongly urge you to take your system past the Windows Update site and let that site download and install the appropriate fixes for your computer. Doing so just might save you some grief and headaches down the road:
 
                  Windows Updatehttp://windowsupdate.microsoft.com/
 Much of the update process at Windows Update is automated, so it's
                simple and convenient. The Windows Update site will install a small program to analyze the software on your system and recommend the appropriate fixes. This process takes only a few minutes. Check the boxes for the updates that you wish to install
                ("Critical Updates" are checked by default). Then click the appropriate button to start the download and installation process. You'll be shown a summary of the updates that you've selected, and then you'll presented with a "License Agreement." After you click through the "License Agreement," the download and intallation process will start.
 Once Windows Update has finished analyzing your system, you'll be presented with a menu of downloads that Windows Update deems appropriate for your computer. At a minimum
                you should let Windows Update install the fixes marked as "Critical Updates." The other available updates
                ("Recommended Updates," "Drivers and
                Enhancements") are optional.
 
 Since the entire download and installation process is automated,
                there's almost nothing for you to do except reboot the computer after all the updates have been installed.
 |  
              |  |  |  |  
              | 5. |  | Read Licenses & Privacy Policies |  
              |  |  |  |  
              |  |  | Anti-spyware applications alone can't protect you entirely from
        unwanted spyware and adware. You have to do your part as well by being
        vigilant in your online behavior. One of the more common sources for spyware and adware is
        "freeware" (e.g., Grokster or KaZaA) that bundles unwanted third-party applications.
        Another common source involves third-party web sites that automatically
        start the installation of spyware and adware when you visit those sites.
        These auto-installed spyware and adware programs may initially appear
        to be plug-ins necessary for the web site itself, though usually they
        are not. Wherever you happen to encounter spyware and adware, you will usually
        be presented with a EULA (End User License Agreement) and/or Privacy Policy.
        Do not blindly click through these documents. Read them carefully and
        look for the tell-tale language that discloses the presence of adware or
        spyware. For tips on what to look for, see these pages: Most if not all of the "adware-supported" or
        "advertising-supported" applications on the Net have adware-free
        equivalents. There's simply no need to use advertising-supported
        applications. If you're looking for truly free software
        without any unwanted surprises, see the following sites:
 
 |  
              |  |  |  |  
              | Other Anti-Spyware Tools |  
              |  |  |  |  
              |  | There is a wealth of specialized anti-spyware tools on the Net, many
        free for the taking. For a more complete list of anti-spyware products, see: |  |  Return
        to top 
          
            
              | If Your PC is Already
      Infested w/ Spyware & Adware... 
        If your PC is already infested with spyware and adware, resist the
        temptation to succumb to impulse buys of anti-spyware products that you
        see on the Net, esp. those included in the "rogue/suspect"
        list or advertised on
        Google. Instead, you can get help online from a corps of savvy
        volunteers who specialize in busting spyware. To get help with a spyware infestation: 
          
            
              | 1. |  | Clean your PC as best you can |  
              |  |  |  |  
              |  |  | Download and run one (or all) of these free anti-spyware scanners
        and remove whatever spyware and adware it finds.   You should also scan and clean your computer with whatever
        anti-virus program you happen to have installed on your computer. If you don't have an anti-virus program, you can
        scan your computer
        with one of these online anti-virus scanners: ...
        or download and run one of these free standalone virus removal tools: |  
              |  |  |  |  
              | 2. |  |  Visit a spyware removal forum |  
              |  |  |  |  
              |  |  | Once you've cleaned your PC as best you can, visit one of the
        following spyware removal forums: |  
              |  |  |  |  
              | 3. |  | Follow the instructions for posting a HijackThis! log |  
              |  |  |  |  
              |  |  | Most of the above forums will request that you post a HijackThis!
        log. HijackThis! (HJT) is a free program that will scan key system
        settings on your PC and generate a plain text log that you can copy and
        paste into a post. The volunteers at the above forums will examine that
        HJT log and recommend a course of action to fix your PC. HijackThis! can
        be downloaded from HERE.  Each forum has its own set of instructions and procedures for
        requesting help and posting a HJT log, so abide by the requirements of
        the forum you're visiting. Also, do not attempt to use HJT
        on your own to fix problems. Let one of the expert volunteers examine
        your HJT log and advise you on what to fix. |  
              |  |  |  |  
              | 4. |  | Help the volunteers help you |  
              |  |  |  |  
              |  |  | In order to help you clean your system, the volunteers at these
        anti-spyware forums need a good sense for what's going on with your
        computer. When you're ready to post and request help... 
          Start a new discussion topic/thread.Give your discussion topic/thread a distinctive title.Describe the symptoms and problems you're experiencing.Describe what you've already done to solve the problem.Copy and paste your HJT log into your post.Be patient while waiting for a response. Note that some of the forums listed above may require you to register
        for free before posting.
               |  
              |  |  |  |  
              | 5. |  | Follow removal instructions precisely |  
              |  |  |  |  
              |  |  | Once a volunteer does give you advice for cleaning your PC, follow
        those instructions precisely and report back what the results are. Also,
        you may be asked to download and run other specialized anti-spyware tools to
        remove the particular spyware that's on your computer. |  
              |  |  |  |  
              | The volunteer spyware busters who work these anti-spyware forums do
        this kind of thing all day long, so you'll be in good hands. At times
        they can be a bit overwhelmed, so please be patient while waiting for
        help. Once your PC has been cleaned, be sure to take
                steps to prevent
                it from being overrun with spyware adware again.
 |  
              |  |  |  |  |  Return
        to top 
          
            
              | Questions &
      Contact If you have questions or comments about any of the information
      presented on this page, please don't hesitate to get in touch. 
       
        
          Best regards,
 SpywareWarrior.com
 
  Full disclosure: the maintainers of 
              this page have performed consulting work as independent 
              contractors for Sunbelt Software, makers of CounterSpy. Because of 
              that relationship and the conflict of interest that it represents, 
              we must recuse ourselves from public comment on CounterSpy. That 
              means that we cannot and will not publicly evaluate, test, or even 
              recommend Sunbelt's anti-spyware product. The anti-spyware 
              products that we do recommend, all of which are competitors to 
              CounterSpy, are included
        above. Moreover, the opinions, 
              judgments, and conclusions found on these pages are those of 
              SpywareWarrior.com alone. |  Return
        to top 
          
            
              | This page is maintained by This page last updated: Nov.
                9, 2006
                 © Copyright 2006 
                SpywareWarrior.com |  |