Spyware removal frame. Purpose of Trojan scanners. Types of spyware

Almost all users today are familiar with viruses and the consequences of their impact on computer systems. Among all the threats that have become most widespread, a special place is occupied by spyware that monitors the actions of users and steals confidential information. Next, we will show what such applications and applets are, and discuss the issue of how to detect spyware on a computer and get rid of such a threat without harming the system.

What is spyware?

Let's start with the fact that spy applications, or executable applets, usually called Spyware, are not viruses as such in the usual sense. That is, they have virtually no impact on the system in terms of its integrity or performance, although when infecting computers they can constantly reside in RAM and consume part of the system resources. But, as a rule, this does not particularly affect the performance of the OS.

But their main purpose is precisely to monitor the user’s work, and, if possible, steal confidential data, spoof email for the purpose of sending spam, analyze requests on the Internet and redirect to sites containing malware, analyze information on the hard drive, etc. Itself It goes without saying that any user must have at least a primitive anti-virus package installed for protection. True, for the most part, neither free antiviruses nor, especially, the built-in Windows firewall provide complete confidence in security. Some applications may simply not be recognized. This is where a completely logical question arises: “What then should be the protection of a computer from spyware?” Let's try to consider the main aspects and concepts.

Types of spyware

Before proceeding with a practical solution, you should clearly understand which applications and applets belong to the Spyware class. Today there are several main types:

  • key loggers;
  • hard drive scanners;
  • screen spies;
  • mail spies;
  • proxy spies.

Each such program affects the system differently, so next we will look at how exactly spyware penetrates a computer and what they can do to an infected system.

Spyware penetration methods into computer systems

Today, due to the incredible development of Internet technologies, the World Wide Web is the main open and weakly protected channel that threats of this type use to penetrate local computer systems or networks.

In some cases, spyware is installed on the computer by the user himself, as paradoxical as this may sound. In most cases, he doesn't even know about it. And everything is banally simple. For example, you downloaded a seemingly interesting program from the Internet and started the installation. In the first stages, everything looks as usual. But then sometimes windows appear asking you to install some additional software product or add-on to your Internet browser. Usually all this is written in small print. The user, trying to quickly complete the installation process and start working with the new application, often does not pay attention to this, agrees to all the conditions and... ultimately receives an embedded “agent” for collecting information.

Sometimes spyware is installed on a computer in the background, then masquerading as important system processes. There may be plenty of options here: installing unverified software, downloading content from the Internet, opening dubious email attachments, and even simply visiting some unsafe resources on the Internet. As is already clear, it is simply impossible to track such an installation without special protection.

Consequences of exposure

As for the harm caused by spies, as already mentioned, this generally does not affect the system in any way, but user information and personal data are at risk.

The most dangerous among all applications of this type are the so-called key loggers, or simply put, they are the ones that are able to monitor the set of characters, which gives an attacker the opportunity to obtain the same logins and passwords, bank details or card PIN codes, and just something that the user would not want to make available to a wide range of people. As a rule, after all the data has been determined, it is sent either to a remote server or via email, naturally, in hidden mode. Therefore, it is recommended to use special encryption utilities to store such important information. In addition, it is advisable to save files not on a hard drive (hard drive scanners can easily find them), but on removable media, or at least on a flash drive, and always along with the decryptor key.

Among other things, many experts consider using the on-screen keyboard to be the safest, although they recognize the inconvenience of this method.

Screen tracking in terms of what exactly the user is doing is dangerous only when confidential data or registration details are entered. The spy simply takes screenshots after a certain time and sends them to the attacker. Using the on-screen keyboard, as in the first case, will not give any results. And if two spies work simultaneously, then you won’t be able to hide anywhere.

Email tracking is done through your contact list. The main goal is to replace the contents of the letter when sending it for the purpose of sending spam.

Proxy spies are harmful only in the sense that they turn the local computer terminal into some kind of proxy server. Why is this necessary? Yes, only to hide behind, say, the user’s IP address when committing illegal actions. Naturally, the user has no idea about this. Let’s say someone hacked the security system of a bank and stole a certain amount of money. Monitoring of actions by authorized services reveals that the hack was carried out from a terminal with such and such an IP, located at such and such an address. The secret services come to an unsuspecting person and send him to jail. Is there really nothing good about this?

First symptoms of infection

Now let's move on to practice. How to check your computer for spyware if suddenly, for some reason, doubts creep in about the integrity of the security system? To do this, you need to know how the impact of such applications manifests itself in the early stages.

If for no apparent reason a decrease in performance is noticed, or the system periodically “freezes”, or refuses to work at all, first you should look at the load on the processor and RAM, and also monitor all active processes.

In most cases, the user in the same “Task Manager” will see unfamiliar services that were not previously in the process tree. This is just the first call. The creators of spyware are far from stupid, so they create programs that disguise themselves as system processes, and it is simply impossible to identify them manually without special knowledge. Then problems begin with connecting to the Internet, the start page changes, etc.

How to check your computer for spyware

As for scanning, standard antiviruses will not help here, especially if they have already missed the threat. At a minimum, you will need some kind of portable version like Kaspersky Virus Removal Tool (or better yet, something like Rescue Disc that checks the system before it boots).

How to find spyware on your computer? In most cases, it is recommended to use highly targeted special programs of the Anti-Spyware class (SpywareBlaster, AVZ, XoftSpySE Anti-Spyware, Microsoft Antispyware, etc.). The scanning process in them is fully automated, as well as subsequent deletion. But here there are things that are worth paying attention to.

How to remove spyware from your computer: standard methods and third-party software used

You can even remove spyware from your computer manually, but only if the program is not disguised.

To do this, you can go to the programs and features section, find the application you are looking for in the list and start the uninstallation process. True, the Windows uninstaller, to put it mildly, is not very good, since it leaves a bunch of computer garbage after the process is completed, so it is better to use specialized utilities like iObit Uninstaller, which, in addition to uninstalling in the standard way, allow you to perform in-depth scanning to search for residual files or even keys and entries in the system registry.

Now a few words about the sensational Spyhunter utility. Many people call it almost a panacea for all ills. We beg to differ. It scans the system yet, but sometimes it gives a false positive. This is not the problem. The fact is that uninstalling it turns out to be quite problematic. For the average user, just the number of actions that need to be performed makes their head spin.

What to use? Protection against such threats and search for spyware on your computer can be done, for example, even using the ESETNOD32 or Smart Security package with the Anti-Theft function activated. However, everyone chooses for themselves what is better and easier for them.

Legalized spying in Windows 10

But that's not all. All of the above concerned only how spyware penetrates the system, how it behaves, etc. But what to do when espionage is legal?

Windows 10 did not perform well in this regard. There are a bunch of services here that need to be disabled (communicating data with remote Microsoft servers, using identity to receive ads, sending data to a company, determining location using telemetry, receiving updates from multiple locations, etc.).

Is there 100% protection?

If you look closely at how spyware gets onto a computer and what it does afterwards, there is only one thing we can say about 100% protection: it does not exist. Even if you use the entire arsenal of security tools, you can be 80 percent sure of security, no more. However, there should be no provoking actions on the part of the user himself in the form of visiting dubious sites, installing unsafe software, ignoring antivirus warnings, opening email attachments from unknown sources, etc.

Malware, Trojans and Threats

Most computers are connected to a network (Internet, local network), which simplifies the spread of malicious programs (according to Russian standards, such programs are called “destructive software”, but since this concept is not widely used, the concept “malware” will be used in the review; on in English they are called Malware). These programs include Trojan horses (also known as Trojan horses), viruses, worms, spyware, adware, rootkits, and various other types.

Another plus is that MBAM rarely causes any conflicts with other anti-malware utilities.

Free Trojan Scanner SUPERAntiSpyware

. In addition to spyware, this program scans and removes other types of threats, such as dialers, keyloggers, worms, rootkits, etc.

The program has three types of scans: quick, full or custom system scan. Before scanning, the program prompts you to check for updates to immediately protect you from the latest threats. SAS has its own blacklist. This is a list of 100 examples of various DLL and EXE files that should not be on your computer. When you click on any item in the list, you will receive a full description of the threat.

One of the important features of the program is the presence of Hi-Jack protection, which does not allow other applications to terminate the program (with the exception of Task Manager).

Unfortunately, the free version of this program does not support real-time protection, scheduled scans, and a number of other functions.

More programs

Other free Trojan scanners not included in the review:

  • Rising PC Doctor (no longer available, you may still find older versions on the Internet) - Trojan and spyware scanner. Offers the ability to automatically protect against a number of Trojans. It also offers the following tools: startup management, process manager, service manager, File Shredder (a program for deleting files without the possibility of restoring them) and others.
  • FreeFixer - will scan your system and help remove Trojans and other malware. But the user is required to correctly interpret the results of the program. Particular care must be taken when deciding to delete important system files, as this may harm your system. However, there are forums where you can consult if you are in doubt about a decision (links to the forums are on the website).
  • Ashampoo Anti-Malware (Unfortunately, it has become a trial version. Perhaps earlier versions can still be found on the Internet) - initially this product was only commercial. The free version provides real-time protection and also offers various optimization tools.

Quick selection guide (links to download Trojan scanners)

Emsisoft Anti-Malware

Scans and removes Trojans, worms, viruses, spyware, trackers, dialers, etc. Easy to use.
The free version is very limited. Missing: automatic updates, real-time file protection, scheduled scanning, etc.
Unfortunately, it has become a trial. Perhaps earlier versions can still be found on the Internet
www.emsisoft(.)com

PC Tools ThreatFire

Proactive protection against known and unknown Trojans, viruses, worms, spyware, rootkits and other malware.
Automatic updates are not provided if you have opted out of participating in the ThreatFire's community. Version 4.10 has not changed since November 2011.

Antivirus ESET NOD32 Smart Security is a powerful utility for round-the-clock comprehensive protection of your computer from various types of spyware and viruses.

The anti-virus tool in its arsenal has a personal firewall with high-level traffic protection and technology for protecting monetary transactions, blocks email spam in services, has a developed system of notifications about the detection of a potential threat, and also tracks a stolen or lost PC using “anti-theft”.

IObit Malware Fighter Free is a useful antivirus software for detecting and removing any potentially dangerous objects.

The advanced utility ensures the security of the network connection and real-time file system protection, conducts behavioral analysis in the web navigator, checks connected portable devices, controls all processes and prevents pest infections.

BitDefender Antivirus is a free anti-virus utility that provides comprehensive computer protection against malware, spyware, hackers, data interceptors on Wi-Fi networks and various types of viruses.

The application protects the system from such annoying and dangerous software as Trojan and phishing software, ransomware, password harvesters and interceptors. The basis of Bitdefender’s work is its own powerful engine, a winner of various tests and a guarantor of quality and stability.

Panda Free Antivirus is a free cloud antivirus utility with effective methods of protection against malicious attacks and low load on the computer system.

The program developers focused on the minimum level of system load by distributing the bulk of the work in cloud storage. Thus, special servers analyze and create the most effective methods in the fight against the latest threats.

McAfee Security Scan Plus is a free anti-virus utility that is a scanner that determines the potential threat and level of PC security.

Searches for malicious objects in active applications and checks the security of the antivirus, firewall and system as a whole. The scan itself takes a few minutes and shows the threats found and the protection or lack thereof in the system. Once the scan is complete, a report is issued and, if a threat is present, the installation of the full version of McAfee is suggested.

Comodo Antivirus is a free antivirus utility that creates powerful computer protection and scans active system processes.

Despite the ability to download Comodo Antivirus for free on your computer, this application provides no less high-quality protection than its paid competitors. Even in minimized mode, the program continues to monitor malicious software and protect against Trojans and viruses trying to take over the system from the Internet.

Even if you have installed a powerful antivirus that controls your operating system inside and out (as the developer claims), it will not always cope with such a headache as spy scripts. They open the door for attackers and scammers, which means your personal data remains at risk. Here special software can help you - anti-spyware programs.

Most antiviruses operate according to a simple and proven scheme: there is a database of viruses, websites and spy scripts, including where the utility works on the principle of reconciliation, that is, it saw something suspicious, then checked with the database, deleted the bad ones, left the good ones.

Anti-spyware programs work in a slightly different way. Of course, they have their own databases, but they also have other, highly specialized solutions that specifically deal with scripts. Today we will talk about such specific software.

There are many programs of this kind on the Internet, but a good half of the applications create only the appearance of fighting threats and rightfully charge money for license support, while some are actually protégés of viruses. Therefore, here you need to behave as carefully and carefully as possible.

So, we present to your attention a selection of the best anti-spyware programs for the Windows operating system, which have distinguished themselves by their effectiveness and a lot of positive reviews on specialized forums.

Super AntiSpyware

This utility is one of the most effective solutions for eliminating malicious scripts. In addition, this anti-spyware program will intelligently clean your operating system of Trojans, worms and other suspicious code.

The utility has smart heuristic tools at its disposal to detect spies that are not in the main database, that is, potential threats. The anti-spyware program itself is updated about a couple of times a year, and the signatures are updated two or three times a month.

The utility's interface allows you to scan both the entire platform and some individual components, such as disks, individual folders or RAM. This anti-spyware program works on Windows 7, 8 and 10. There were no problems with adaptation to a particular OS. The software is distinguished by its relatively fast scanning and minimal resource consumption, so it is suitable even for the weakest computers.

Spybot Search & Destroy

This anti-spyware program is in Russian and comes with a free license. The developer often asks for financial assistance to support the product, but, as they say, without fanaticism, so you won’t see half-screen advertising blocks and other aggressive surroundings.

The utility copes well with the tasks assigned to it, and can also find and, if desired, remove any traces of the user. This is especially true if the computer is an office or “transit” one. It would also be worth mentioning the pleasant appearance of the interface, which, by the way, can be changed using numerous skins and add-ons.

Features of the program

In addition to its direct responsibilities, the software does a good job of fighting various ad viruses that attack browsers. Here we are talking about the extremely aggressive “Amigo”, “MailRu” and other unwanted “infiltrators” into everything possible.

For inexperienced users and those who like to experiment with settings and the system, there is a backup functionality where you can return the operating system to normal in case of failure. The anti-spyware program works on Windows 7, 8 and 10. It is adapted to the platform, judging by user reviews, quite competently, so there should be no problems with brakes or any glitches.

Spyware Terminator

This is something of a pioneer in the anti-spyware field, which was a recognized leader until numerous smart competitors appeared. But to this day this product enjoys enviable popularity.

In fact, the utility is a comprehensive solution and is positioned as an antivirus. There is a deep system sanitization mode that allows you to find well-hidden malicious codes. To ensure maximum efficiency, the program works in real time and monitors everything and everyone. Naturally, such control significantly loads the platform, so its requirements for the technical component of the computer are quite high. Well, or as an option, this is to relax the work and switch to the normal threat detection mode.

It is also worth mentioning the special HIPS protocol, which allows you to patch all the security holes in the system. Such a barrier will become a serious obstacle to all sorts of Trojans, worms and other malicious scripts. The anti-spyware program works on Windows XP, 7, 8, 10, and has no problems adapting to platforms.

Ad-Aware

This utility can do almost everything that was described in previous programs. In addition, it has its own unique features that make Ad-Aware one of the best applications for finding and eliminating spyware.

The software is able to block third-party location tracking systems, which means preventing the automatic activation of malicious code when visiting sites that use a similar protocol. The program also prohibits or completely removes aggressive advertising scripts by completely sanitizing browser add-ons and plugins, as well as the system registry.

Distinctive features of the software

The utility databases are updated daily and automatically, so there are no problems with the relevance of the protection. You can additionally connect a number of plugins for some specific detection of malicious code (usually for OS emulators), as well as modernize the existing interface with various extensions. The latter can turn the utility into a real “monster” that will attack everything that moves and will not miss a single third-party script that may in any way threaten your platform or personal data.

The only thing worth noting is that each plugin or extension increases the load on your processor and the OS as a whole, so you shouldn’t get carried away. Otherwise, you will get excellent “armor”, but a slow-moving Windows platform, which is already capable of properly loading the “stuffing”. Well, for virus-phobes, this is ideal software and a good night’s sleep with the understanding that the OS is under reliable protection.

Publications on the topic