M
Microsoft private
I have installed and run Beta 1 on my system. Based on other products (Ad
Aware), my own very conservative settings on IE, general safe computing
practices, and no symptoms of spyware, I do not believe that I have any
spyware on my system. The Beta detected 3 instances of spyware. The
first, WinPCap, I had installed, and it correctly said it was a low threat.
The system has a cool "always ignore" setting that I will use for WinPCap.
The second, EZCyberSearch, was detected in a folder c:\documents and
settings\knox\favorites\cool sites. In this folder I have about 30 various
URL's and it shows all to be infected. Apparently it doesn't like the word
"cool" in the path. I changed the name of the directory and now it doesn't
show up. I guess there's no double checking.
The third, Network Essentials, is detected in the folder c:\program
files\pop which contains a Microsoft Access MDB that I myself created. It
seems unlikely that it would contain a Browser hijacker. I don't feel like
renaming my application to test it, but I hope that it is not just looking
for the word "pop". The "learn more about this threat" link does not
currently have any information.
So far I find the user interface and installation to be very clean, easy to
use, and easy to understand.
Knox
Aware), my own very conservative settings on IE, general safe computing
practices, and no symptoms of spyware, I do not believe that I have any
spyware on my system. The Beta detected 3 instances of spyware. The
first, WinPCap, I had installed, and it correctly said it was a low threat.
The system has a cool "always ignore" setting that I will use for WinPCap.
The second, EZCyberSearch, was detected in a folder c:\documents and
settings\knox\favorites\cool sites. In this folder I have about 30 various
URL's and it shows all to be infected. Apparently it doesn't like the word
"cool" in the path. I changed the name of the directory and now it doesn't
show up. I guess there's no double checking.
The third, Network Essentials, is detected in the folder c:\program
files\pop which contains a Microsoft Access MDB that I myself created. It
seems unlikely that it would contain a Browser hijacker. I don't feel like
renaming my application to test it, but I hope that it is not just looking
for the word "pop". The "learn more about this threat" link does not
currently have any information.
So far I find the user interface and installation to be very clean, easy to
use, and easy to understand.
Knox