Anti-Virus and Spyware Tools

Important Legal NOTICE!

Click Here To Read Important Legal NOTICE!


AD & Popups info
AD & Popups Links
Virus info
Virus Links
Spyware Info
Spyware Links
ADware Info
ADware Links
Spam Info
Spam Links
Spam Info
Spam Links
Phishing Info
Phishing Links
AD & Popups info
Online guide to spyware and anti-spyware software
www.spywareguide.com
www.adwareaway.com specialized remover for all kinds of hard-to-kill malwares
www.freespywarescan.org Spyware Begone will scan your entire PC and alert you to any hidden Spyware or Adware infection
www.lavasoftusa.com Ad-aware will provide the ability to comprehensively scan your memory, registry, hard, removable and optical drives for known datamining, aggressive advertising, and tracking components.
www.javacoolsoftware.com SpywareBlaster Prevent the installation of spyware and other potentially unwanted software
www.kephyr.com Bazooka is Free - Detect a multitude of spyware, adware, trojan, keylogger and trackware components
www.killersoftware.com Adware Agent will protect your PC from spyware/adware/worms
Hijack This Hijack This is for advanced users
http://www.microsoft.com/athome/security/spyware/software/default.mspx
netfiles.uiuc.edu you'll find a long list of spyware packages, both standalone and enterprise
www.noadware.com Spyware-Adware Remover - No Adware
www.pctools.com/ Award-winning spyware protection to secure your PC against privacy and tracking threats
www.pestpatrol.com Detects and removes spyware, adware, keyloggers, Trojans, cookies, and browser hijackers
www.safer-networking.org/en Spybot - Search & Destroy can detect and remove spyware of different kinds
Spybot-S&D
www.SpyManagement.orgA new spyware management Web site
BHODemon
www.spywarevanisher.com We Guarantee that Spyware Vanisher will protect your computer from Spyware, Adware Popups, Dialers, Key Loggers, ID Theft, Home Page Hi-Jack, Worm, future attacks and Speed up your PC
www.sunbelt-software.com CounterSpy software
www.stopzilla.com/ Stop Zilla the ultimate popup killer
www.webroot.com Security products by WebRoot. Washers, Spyware, Privacy & filtering software.
www.webroot.com Spy Sweeper detects, removes and blocks even the most vicious spies
xoftspy.com/

AD & Popups Links
Virus Info
* Viruses - This type of malicious code requires you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
* Worms - Worms propagate without user intervention. They typically start by exploiting a software vulnerability (a flaw that allows the software's intended security policy to be violated), then once the victim computer has been infected the worm will attempt to find and infect other computers. Similar to viruses, worms can propagate via email, web sites, or network-based software. The automated self-propagation of worms distinguishes them from viruses.
* Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder.
Anti-virus tools are useless without frequent updates, so be sure to check back for an update. There are several sites that have free virus checkers.
Configuring Antivirus Client for Non-Administrator Updates. Search the vendors website because there are often registry hacks that will allow others then Administrators to do an update. With local administrator rights, malicious software (malware) can inflict greater damage on the local system and systems on which the local account has elevated rights.

Email viruses would essentially go away if we could teach everyone with an email account a few simple things:
- Explain that sometimes bad people write special email attachments that can do bad things if opened.
- Caution these users that opening the wrong attachment can start a chain reaction that can bring down a company's network or even the Internet.
- Everyone must examine attachments before opening them by using antivirus software.
- Caution them that antivirus software needs to be updated by download the latest virus information, called "pattern files."
Digital Cell Phone virus . . .
Telefonica what will they thing of next?


Virus Software Links
www.airscanner.com anti-virus software for Windows Mobile devices
http://antivirus.cai.com/ eTrust Anti virus
www.avast.com alwil is free
www3.ca.com Computer Associates
www.BitDefender.com
www.freedom.net The Freedom Security & Privacy Suite is a bundle of our Anti-Virus, Personal Firewall and Parental Control services
www.grisoft.com/us/us_index.php A free anti-virus scanner is AVG.
www.hauriusa.net Anti Virus software ViRobot
www.kaspersky.com/virusscanner Free Online Virus Scanner
www.microsoft.com/technet Virus Protection Strategies

www.nai.com Network Associates
www.nod32.com Real-time protection against viruses, spyware, adware, and identity theft
www.pandasecurity.com/default.htm Panda Virus Checker
www.pcpitstop.com
www.pestpatrol.com Pest Patrol does more than just check for viruses. It’s also on the lookout for Trojans, spyware, mobile
www.sarc.com/
www.secadministrator.com/panda/ Lots of virus info
www.spamhaus.org/ The Spamhaus Block List (SBL) is a realtime DNS-based database of IP addresses of senders of Unsolicited Bulk Email (Spam), designed to help email administrators enforce incoming mail policy
www.stop-sign.com Stop-Sign Computer Virus Protection Service
www.sophos.com/ Sophos Anti Virus
www.sybari.com/home/ Virus Antigen
enterprisesecurity.symantec.com/Symantec Internet Security Threat Report
housecall.trendmicro.com/ HouseCall is a free online virus checker
www.trendmicro.com Trend Micro Virus Checker
www.zeroknowledge.com/privacy/default.asp Freedom Antivirus
www.vmyths.com/ info about computer virus myths, hoaxes, and urban legends
www.tumbleweed.com • Tumbleweed's Secure Mail

Spyware Info

Spyware Software Links
www.astonsoft.com DoorGuard, identifies and deletes Trojan horses and virus
www.diamondcs.com.au lots of tools
www.majorgeeks.com HijackThis
www.moosoft.com The Cleaner Professional is a program designed to keep your computer and data safe from Trojans / Worms / Keyloggers / Spyware and all manner of malware.
www.agnitum.com Tauscan detects any backdoors
http://www.microsoft.com/spyware
netfiles.uiuc.edu you'll find a long list of spyware packages, both standalone and enterprise
www.spywareinfo.com/downloads/bhod/ BHODemon
www.spywarewarrior.com wealth of resources to help you fight spyware and adware
www.SpyManagement.orgA new spyware management Web site
www.webroot.com Security products by WebRoot. Washers, Spyware, Privacy & filtering software.

ADware Info
malware is defined as:
short for malicious software; software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse
ADware Software Links
www.lavasoftusa.com Ad-aware will provide the ability to comprehensively scan your memory, registry, hard, removable and optical drives for known datamining, aggressive advertising, and tracking components.
www.stopzilla.com/ Stop Zilla the ultimate popup killer
SpyBot
Spam Info
Unfortunately, contrary to what many spam e-mails claim, there is no current legislation in place to control spam. Do your part and write your congressmen and congresswomen to support anti-spam legislation. I recommend SpamCop. SpamCop provides a simple interface for reporting spam to ISPs.
Teach end users how to keep spam out of the inbox By Kyle Harmon
(unsolicited commercial e-mail)
#1: Maintain two separate e-mail addresses
A normal email then a second junk email account such as Hotmail or some other online account, and use that address every time you fill out a form on the Web that asks for an e-mail address.
#2: Don’t buy from a spam ad
This should be a given. Spammers will only continue to spam as long as it is profitable.
#3: Don’t even respond to it!
Never, ever respond to a spam. Responding to spam, whether to a “remove” address or otherwise will only worsen the problem. Responding to spam only tells the spammer that your address is a valid e-mail address that accepts spam.
#4: Turn off cookies
Many legitimate Web businesses use cookie technology to save customers time and to serve them better. Some unscrupulous businesses use them to obtain information from you when you visit their Web site. You can minimize the chances of your e-mail address being broadcast to every Web site you visit by turning your browser cookies off, or at least making your browser ask for confirmation before accepting cookies.
#5: Report spam to your ISP
Most ISPs have strict anti-spam policies. In many cases, there is a good chance that the account used by the spammer to get on the Internet will be disabled by the ISP. As a last resort, you can fight spam with filtering software.
- SPIM are unwanted instant messages (IMs) that are full of annoying ads and unrequested information. SPIM may now contain or lead users to viruses, worms, and other malware.
- SPIT is SPAM sent over internet telephony. Because the phone is connected to the internet, spammers could target the VOIP with unwanted messages. SPIT is not yet a major problem.
Spam Software Links
You might already know that blacklist services track IP addresses that are known to be used to send spam. So any mail filter that supports blacklist services can query the services for a given IP address.

The following steps summarize the basic requirements of the CAN-SPAM Act:
Ensure the header information on the email is accurate.
Keep the subject line descriptive and honest.
Give the recipients an opt-out method that's easy to complete.
Identify commercial email as an advertisement.
Include your physical postal address.
www.arachnoid.com/lutusp/antispam Educational material for learning how to stop spam
www.dnsbl.us.sorbs.net
www.ftc.gov/spam for the official information you need to avoid lawsuits.
www.glocksoft.com SpamCombat, spam-fighting software for Windows that combines whitelists, blacklists, HTML Validator, DNSBL filtering, and Bayesian filtering to help fight spam.
www.mail-abuse.comA resource for general information and education pertaining to spam prevention
www.ordb.org Open relay database allowing testing and look-up of open relays, plus a very useful FAQ section for learning how to both detect and close open relays
relays.visi.com
www.spam.com Just in case you were looking for the edible variety, here is the official Spam
spam.abuse.net Comprehensive resource for information on fighting spam
www.spamcon.org Antispam resources for ISPs
www.spamcop.net
http://www.spamhaus.org/ The Spamhaus Block List (SBL) is a realtime DNS-based database of IP addresses of senders of Unsolicited Bulk Email (Spam), designed to help email administrators enforce incoming mail policy
www.spamlaws.com Listing of laws by country, state and date
www.spamrecycle.com Submitting your spam to this site will get it forwarded to the Federal Trade Commission and to the spam filter developers
songseek.com/spamorg Information about reducing spam

Phishing Info
Always remember, Banks will never send customers emails asking for passwords, account numbers or personal information.
Banks, credit cards, Finacial institutions of all types will never ask you to log into their website.
If you receive one of these emails, delete it immediately and do not respond or action it.
www.castlecops.com/pirt A global phishing termination operation

Phishing Links

Back To Main Page Important Legal NOTICE!

Click Here To Read Important Legal NOTICE!


Updated October 10, 2007
Copyright© 2007 by Dana Shea

Copyright© All rights Reserved. No part of the contents of this site may be reproduced
or transmitted in any form or by any means without written permission.
Any questions or problem links please email