SPYBOT S & D | Spybot Search & Destroy

SPYBOT Search & Destroy

.

This is a short guide to show you the first steps to remove spyware from your computer (Spyware) and others, using Spybot-Search & Destroy.


1. Download


Obviously, the first thing you need to do is download Spybot-S & D from our download page.

download spybot SPYBOT S & D


The download page first gives you some information on donations, so if you like the program, I encourage you to come back and give something. But right now, you want to download. The downloads are on the same page, scroll down a few lines and click Spybot – Search & Destroy 1.6.2. On the next page you’ll see a table with four download locations. Click on one of them will take you to a page offering the download. These pages are slightly different from each other, but you should be able to find the download link without problems.


2. Installation

install spybot SPYBOT S & D

The file you downloaded is called spybotsd162.exe or something similar. To install Spybot-S & D, all you have to do is run the file, and Setup will begin (if you have downloaded with Internet Explorer, the download dialog box has given you the option open it directly). The installer will show you the license and ask you where to install. You can keep the default settings and continue the installation by clicking Next (Next). After the installation is complete, you will see a Spybot – Search & Destroy on your desktop and a line in your Start menu. Click it to start Spybot-S & D for the first time.


3. 1st time

First spybot SPYBOT S & D

The first time you start Spybot-S & D, it will display a Wizard, a small window that will help you get started. This gives you the ability to add or remove icons you have or have not created during installation, for example. Let’s say you want them and proceed to the next page. If you use a proxy in Internet Explorer, Spybot-S & D will show you this proxy and a button will give you the opportunity to use it for Spybot-S & D. If the box is empty, you do not need, but in most cases this will show an internet address, and you should keep this proxy setting. The next page updates. It is very important to be updated. The two buttons on this page will these updates, but if you want to do it later, read on. The last page of the wizard asks you to read the help file. The help file is always a good resource if you do not know what to do, so read it, or at least the first few pages.


4. Scan


scan spybot 300x205 SPYBOT S & D
scan spybot


After the end of this guide, you may find yourself on the Settings page or on the page update. As the default settings are ok right now, and you’ve done an update, let’s ignore them for now and do the first scan. The left part of the program displays a navigation bar that can lead you to all program functions. The first section (the top button) is labeled Spybot-S & D and leads you to the main page. Right now, you see an empty list and a toolbar at the bottom. The first button in this toolbar is named Check for problems – that is the button that you click to start the scan. Rely on your back and watch the progress of the search.


5. Interpret results


interpretation spybot 300x204 SPYBOT S & D

Once there, you could just jump to point 7, and remove the results. Instead, we recommend you take a look at all the stuff that Spybot-S & D detected. The first thing is to distinguish between the red lines, which represent spyware and similar threats, and the green entries, which are usage tracks. For usage tracks (I hope you followed the link to see what they are), removal is not critical, but depends on your personal preferences. Leaving aside for the moment the traces of use, you should look at the red entries which represent the real threats. Although you can of course give us confidence that we have chosen the targets using strict criteria, you can check yourself by right clicking on each product and read the product information that appears in a new window popup.


6. Creating exceptions

All problems displayed in red are regarded as real threats and should be addressed. But reading the product description, you can still decide to keep a threat, or just a usage track. Maybe you do not want to delete the list of recently used files in Word? For that, you have three options. You can choose to ignore all traces of use. In this case, open the Plugins page in the Settings section of the program, and disable the use of tracers. Or if you just want to keep all traces of a particular product, just do a right click in the results list. Finally, if you want to keep just one file is possible in the same way.


7. Removing the threats found

Now you’re aware of everything you found. It’s time to use the Fix selected problems button. If you think you also remove traces of use, you may think that ticking all the green entries is hard work. That is a very simple reason – to force you, the newbie – to look at the results. Once you know what you’re doing, there is a hidden Select all button issues.


8. Resident


immunize spybot 300x206 SPYBOT S & D

If you use the real-time protection of Spybot-S & D against spyware (spyware), the bad spies do not fit into your system. Currently there are three types of protection. The Immunize feature prevents such cookies plotters get into your system. Vaccination works with Mozilla Firefox, Internet Explorer and Opera, and allows you to set certain browser settings to block installers of spyware known (and pests like), already registered in the database of Spybot-S & D . You enable the Immunize feature by clicking on Spybot-S & D ? Vaccination in the navigation bar on the left.


resident spybot 300x206 SPYBOT S & D

SDHelper resident is a second layer of protection for IE. The Immunize feature blocks installers by the ID (identifier) of their ActiveX, while blocking harmful SDHelper trying to return to using another method. And Internet Explorer can not download harmful files. You enable SDHelper by clicking on Tools ? Resident in the navigation bar on the left (why Spybot-S & D must be executed in Advanced mode). There you can tick the box next to Resident “SDHelper” (Blocker harmful downloads for Internet Explorer) assets to enable SDHelper.


immunize 2 spybot 300x206 SPYBOT S & D

Resident TeaTimer prevents unwanted files are installed – whatever – on your system. It continuously monitors the processes called / initiated. If processes known to be malicious want to start, TeaTimer immediately stop them, and gives you three options on how to address this process in the future: warning if the process wants to start again automatically kill the process authorize the execution of the process It is also possible to delete the file associated with this process. If you use the real-time protection of Spybot-S & D against spyware (spyware), the bad spies do not fit into your system. Currently there are three types of protection. The Immunize feature prevents such cookies plotters get into your system. Vaccination works with Mozilla Firefox, Internet Explorer and Opera, and allows you to set certain browser settings to block installers of spyware known (and pests like), already registered in the database of Spybot-S & D . You enable the Immunize feature by clicking on Spybot-S & D ? Vaccination in the navigation bar on the left. SDHelper resident is a second layer of protection for IE. The Immunize feature blocks installers by the ID (identifier) of their ActiveX, while blocking harmful SDHelper trying to return to using another method. And Internet Explorer can not download harmful files. You enable SDHelper by clicking on Tools ? Resident in the navigation bar on the left (why Spybot-S & D must be executed in Advanced mode). There you can tick the box next to Resident “SDHelper” (Blocker harmful downloads for Internet Explorer) assets to enable SDHelper.


resident 3 spybot 300x203 SPYBOT S & D

Resident TeaTimer prevents unwanted files are installed – whatever – on your system. It continuously monitors the processes called / initiated. If processes known to be malicious want to start, TeaTimer immediately stop them, and gives you three options on how to address this process in the future: warning if the process wants to start again automatically kill the process authorize the execution of the process It is also possible to delete the file associated with this process. If something tries to change critical registry keys, TeaTimer will detect it.

TeaTimer can protect you against such changes by giving you a choice: You can either Allow or Deny the change. TeaTimer runs continuously in the background. Since Spybot-S & D 1.6, TeaTimer uses our database in which files are classified as good or dangerous. This database contains several hundreds of thousands of items and constantly increasing. However, occasionally there are files that are not yet registered. In this case, and also if you are using old versions of Spybot-S & D Resident TeaTimer will ask your permission for every change. If you are unsure (e) having to authorize this change, here’s a simple principle: If you’re installing something and / or if you believe the file to be installed is good because you know his name, you can continue by allowing the registry change (this is the same if you or Spybot-S & D’re deleting an application). But if the message appears unexpectedly while you surf the web, you should beware. In this case it is better to deny the registry change.

You activate Resident TeaTimer by clicking on Tools ? Resident in the navigation bar on the left (Spybot-S & D must run in Advanced Mode). There you can tick the box next to Resident “TeaTimer” (Protection of fundamental system settings) active to activate TeaTimer. Of course, it is possible to change every decision you have taken. This may be necessary if you refused a process which later proved to be useful. To do this, simply right click on the TeaTimer icon in the Notification area – is one that is blue with a padlock. (If you do not see this icon, it’s probably because it is hidden. Simply click the arrows “<<” the notification area to show all hidden icons.) In the small window that appears, click Settings to edit your list of registry changes and processes allowed / blocked.

Real Time Web Analytics