Spybot-S&D Course: 60-564 Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.

Slides:



Advertisements
Similar presentations
AVG Anti-Malware 7.5 Product presentation. AVG Anti-Malware 7.5 Contents Anti-virus protection levels Detection methods Supported platforms and installation.
Advertisements

Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
What is a Firewall Anyway?
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
AVG Internet Security 7.5 Product presentation.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Chapter 5 System Software.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Security Advice Georgie Pepper Campsmount Acadamy.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Internet Security. A computer virus is an executable file designed to replicate itself while avoiding detection.
How to maintain your computer
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid Project 1 Fall 2004.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
Keeping your computer current and trouble free Aaron Robertson.
Using Windows Firewall and Windows Defender
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Smart Fortress Incident. The Initial Issue EXTREMELY slow system performance.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
September 2015 LCCU Meeting How can you manage the Adobe Flash security risk? How can you keep Flash and other software updated? We’ll answers members’
Return to the PC Security web page Lesson 5: Dealing with Malware.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
BMTS 242: Computer and Systems Lecture 5: Yousef Alharbi Website
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
How to Fix Trojan.Poweliks Using Norton Antivirus?
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Windows Vista Inside Out
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal

Agenda Agenda  Introduction  Download and Installation  The First Run  Exploring Spybot-S&D  Closing Remarks

Introduction  Spyware is rampant in the Internet  Spyware  Relatively new kind of threat Relatively new kind of threat  Program that surreptitiously monitors an Internet user’s actions Program that surreptitiously monitors an Internet user’s actions  Gather or helps to gather information about a person or organization without their knowledge  Gather information about the user and relay it to advertisers or other interested parties

Introduction (Cont’d..)  Spyware  Currently, just about every Internet user has had to deal with the spyware  Poses serious security and privacy risk  Degrades system performance  By stealing the computer's memory resources  By eating bandwidth, as it sends information back to the spyware's home base

Introduction (Cont’d..)  Spybot-S&D  Spybot - Search & Destroy by PepiMK S/W  According to the PC World & Download.com, the best privacy software available According to the PC World & Download.com, the best privacy software available  Free to download from the Internet Free to download from the Internet  Detects and removes: Detects and removes:  Adware and Spyware Adware and Spyware  Dialers Dialers  Keyloggers Keyloggers  Trojans and other baddies Trojans and other baddies  Usage tracks Usage tracks

Introduction (Cont’d..)  Permanent blocking: Permanent blocking:  Threatening ActiveX downloads Threatening ActiveX downloads  Known tracking cookies for IE Known tracking cookies for IE  Threatening downloads in IE Threatening downloads in IE  Fix some registry inconsistencies Fix some registry inconsistencies  Provide extended reports Provide extended reports  Provide list of opt-out addresses (to stop unwanted solicitations) Provide list of opt-out addresses (to stop unwanted solicitations)  Provide file shredder to securely overwrite unwanted files deleted from PC Provide file shredder to securely overwrite unwanted files deleted from PC

Introduction (Cont’d..)  OS support

Introduction (Cont’d..)  Features

Introduction (Cont’d..)  Languages

Download & Installation  Download  Freeware  Donation appreciated  Download link:   Current version: Spybot S&D 1.3  Downloaded file name: spybotsd13.exe  Downloaded file size: 4.15 MB

Download & Installation (Cont’d..)  Installation  Run spybotsd13.exe  Select setup language  Decide on the options e.g. additional languages, skins to change appearance, permanent protection.  Creates a program group and desktop icon  By default, activates resident tools (SD helper, TeaTimer)

The First Run  The First run provides options for:  Creates registry backups  Search for updates  Download available updates  Immunize the system  Read tutorial  Read help files  Start using the system

The First Run

Exploring Spybot-S&D  System used  PC  Windows XP  Connected to Internet

Exploring Spybot-S&D  Scanning the system

Exploring Spybot-S&D Cont’d  Fixing the problem

Exploring Spybot-S&D Cont’d

Exploring Spybot-S&D (Cont’d..)  Recovery

Exploring Spybot-S&D (Cont’d..)  Immunize

Exploring Spybot-S&D (Cont’d..)  Online Update

Exploring Spybot-S&D (Cont’d..)  Advance mode - settings

Exploring Spybot-S&D (Cont’d..)  File sets

Exploring Spybot-S&D (Cont’d..)

 Scheduler Exploring Spybot-S&D (Cont’d..)

 Skins

Exploring Spybot-S&D (Cont’d..)  Ignore products

Exploring Spybot-S&D (Cont’d..)  Ignore cookies

Exploring Spybot-S&D (Cont’d..)  Tools

Exploring Spybot-S&D (Cont’d..)  Secure Shedder

Exploring Spybot-S&D (Cont’d..)  Resident

Exploring Spybot-S&D (Cont’d..)  IE tweaks

Exploring Spybot-S&D (Cont’d..)  ActiveX

Exploring Spybot-S&D (Cont’d..)  BHOs

Exploring Spybot-S&D (Cont’d..)  Browser Pages

Exploring Spybot-S&D (Cont’d..)  Host Files

Exploring Spybot-S&D (Cont’d..)  Opt Out

Exploring Spybot-S&D (Cont’d..)  Process List

Exploring Spybot-S&D (Cont’d..)  System Internals

Exploring Spybot-S&D (Cont’d..)  System Startup

Exploring Spybot-S&D (Cont’d..)  Winsock LSPs

Exploring Spybot-S&D (Cont’d..)  Statistics

Closing Remarks  Free, no address required  Easy to use interface  Detect other anti-spyware programs installed in the system, warns for possible false-positive results by them  Online support not the best, no network version  Thank You  Questions ?

References      Spybot-S&D Integrated Help files  