G
Guest
i've got CounterSpy and Giant - er.. MS AntiSpy running
back to back - disapointed in the performance guys - have
the full set working everything active. Have used GIANT
professional and to great satisfaction.
Sweeping with
MSA it turns up:
(2 locations)
Grokster
"Type: Adware Bundler
Threat Level: Moderate
Author: Grokster, LTD
Description: Grokster (free version)
installs adware and spyware including
GAIN, CyDoor, My Search,
WebRebates, and Relivant Knowledge.
Advice: This software is not necessarily
adware. However, it does install other
adware programs as well as perform
potential hazardous actions on your
computer. In either case this software is
not to be trusted.
About Adware Bundler: A Bundler is a
software program that installs adware
on your computer either with your
permission or without. Most of the
software classified as a bundler requires
that the adware program(s) be installed
in order for the actual software to
complete installation or run. In addition
in most cases if the adware is removed
the software will seize to function as
well."
CounterSpy comes up with:
aprox. 50 locations
"Amitis1.3
Type: RAT
Level: Severe
Author: Stacked_shit
Description: Amitis is a trojan and
written in delphi, and it is more powerful
than its previous versions.
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About RAT: A Remote Administration
Tool (RAT) is a Trojan type of software
that when run, provides an attacker with
the capability of remotely controlling a
user's computer (victim) over the Internet.
The attacker usually has full access to
functions on the victim's computer. The
victim's computer usually listens on the
Internet for the attacker's commands."
BizDefender 2
aprox 50 locations
"Type: Commercial Key Logger
Level: Elevated
Author: htp://www.bizdefender.com
Description: You can now completely
take control over the remote computers
and also you can benefit of the most
comprehensive reports ever.
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy.
About Commercial Key Logger: A
commercial key logger is a program that
is installed by a user of a computer to
explicitly monitor the activity of other
users. These types of program can be
installed using stealth tactics to hide
themselves from other users. In addition
these programs can be purchased from
commercial organizations for this use."
AB System Spy
aprox. 40 location
"Type: Commercial Key Logger
Level: Elevated
Author: Aby Software
Description: It takes screenshots,
Stealth Tactics, Logs keystrokes, Sends
mail, Stays Resident, Connects to the
internet
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy.
About Commercial Key Logger: A
commercial key logger is a program that
is installed by a user of a computer to
explicitly monitor the activity of other
users. These types of program can be
installed using stealth tactics to hide
themselves from other users. In addition
these programs can be purchased from
commercial organizations for this use."
Child Control
aprox. 20 locations
"Type: Surveillance
Level: High
Author: Salfeld Computer
Description: It is a survelliance tool ,
which keeps monitoring every activity on
your computer.
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About Surveillance:" (description ends..)
Spyex
numerous locations
"Type: Key Logger
Level: High
Author: SharewareLab.com
Description: SpyEX allows monitor any
kind of activity performed by you in your
computer .
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About Key Logger: A key logger program
runs in the background, recording all the
keystrokes made by a user. Once
keystrokes are logged, they are hidden in
the machine for later retrieval, or shipped
secretly raw to the attacker via email or
over the Internet."
Webmailspy
aprox. 20 locations
"Type: Surveillance
Level: Elevated
Author: Exploreanywhere
Description: It is a spyware, it keeps
eye on every incoming and outgoing
mails.
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy."
and a cookie.
NOTE THE FR@GGIN'SEVERITY OF THESE LAPSES!
This release is dangerous for people used to GIANT.
Get it together or GET OUT!
back to back - disapointed in the performance guys - have
the full set working everything active. Have used GIANT
professional and to great satisfaction.
Sweeping with
MSA it turns up:
(2 locations)
Grokster
"Type: Adware Bundler
Threat Level: Moderate
Author: Grokster, LTD
Description: Grokster (free version)
installs adware and spyware including
GAIN, CyDoor, My Search,
WebRebates, and Relivant Knowledge.
Advice: This software is not necessarily
adware. However, it does install other
adware programs as well as perform
potential hazardous actions on your
computer. In either case this software is
not to be trusted.
About Adware Bundler: A Bundler is a
software program that installs adware
on your computer either with your
permission or without. Most of the
software classified as a bundler requires
that the adware program(s) be installed
in order for the actual software to
complete installation or run. In addition
in most cases if the adware is removed
the software will seize to function as
well."
CounterSpy comes up with:
aprox. 50 locations
"Amitis1.3
Type: RAT
Level: Severe
Author: Stacked_shit
Description: Amitis is a trojan and
written in delphi, and it is more powerful
than its previous versions.
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About RAT: A Remote Administration
Tool (RAT) is a Trojan type of software
that when run, provides an attacker with
the capability of remotely controlling a
user's computer (victim) over the Internet.
The attacker usually has full access to
functions on the victim's computer. The
victim's computer usually listens on the
Internet for the attacker's commands."
BizDefender 2
aprox 50 locations
"Type: Commercial Key Logger
Level: Elevated
Author: htp://www.bizdefender.com
Description: You can now completely
take control over the remote computers
and also you can benefit of the most
comprehensive reports ever.
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy.
About Commercial Key Logger: A
commercial key logger is a program that
is installed by a user of a computer to
explicitly monitor the activity of other
users. These types of program can be
installed using stealth tactics to hide
themselves from other users. In addition
these programs can be purchased from
commercial organizations for this use."
AB System Spy
aprox. 40 location
"Type: Commercial Key Logger
Level: Elevated
Author: Aby Software
Description: It takes screenshots,
Stealth Tactics, Logs keystrokes, Sends
mail, Stays Resident, Connects to the
internet
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy.
About Commercial Key Logger: A
commercial key logger is a program that
is installed by a user of a computer to
explicitly monitor the activity of other
users. These types of program can be
installed using stealth tactics to hide
themselves from other users. In addition
these programs can be purchased from
commercial organizations for this use."
Child Control
aprox. 20 locations
"Type: Surveillance
Level: High
Author: Salfeld Computer
Description: It is a survelliance tool ,
which keeps monitoring every activity on
your computer.
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About Surveillance:" (description ends..)
Spyex
numerous locations
"Type: Key Logger
Level: High
Author: SharewareLab.com
Description: SpyEX allows monitor any
kind of activity performed by you in your
computer .
Advice: This is a very high risk threat
and should be removed immediately as to
prevent harm to your computer or your
privacy.
About Key Logger: A key logger program
runs in the background, recording all the
keystrokes made by a user. Once
keystrokes are logged, they are hidden in
the machine for later retrieval, or shipped
secretly raw to the attacker via email or
over the Internet."
Webmailspy
aprox. 20 locations
"Type: Surveillance
Level: Elevated
Author: Exploreanywhere
Description: It is a spyware, it keeps
eye on every incoming and outgoing
mails.
Advice: This is a high risk threat and
should be removed or quarantined as to
prevent harm to your computer or your
privacy."
and a cookie.
NOTE THE FR@GGIN'SEVERITY OF THESE LAPSES!
This release is dangerous for people used to GIANT.
Get it together or GET OUT!