Counterspy User Guide
Counterspy User Guide
™
CounterSpy
Use of this software is subject to the End User License Agreement found in this User
Guide (the "License Agreement"). By installing the software, you agree to accept the
terms of the License Agreement. Copyright (c) 2004-2005 Sunbelt Software, Inc. All
rights reserved. All products mentioned are trademarks or registered trademarks of their
respective companies. Information in this document is subject to change without notice.
No part of this publication may be reproduced, photocopied, stored in a retrieval system,
transmitted, or translated into any language without the prior written permission of
Sunbelt Software, Inc.
REV. 01182005
Table of Contents
CHAPTER 1: WELCOME..................................................................................... 3
CounterSpy Features ................................................................................................... 3
System Requirements.................................................................................................. 4
Customer Support........................................................................................................ 5
Installing CounterSpy ................................................................................................... 6
Before You Install ..................................................................................................... 6
Installing ................................................................................................................... 6
After Installing........................................................................................................... 7
Uninstalling ............................................................................................................... 7
The CounterSpy Home Page ....................................................................................... 8
Access Icons ............................................................................................................ 8
Important Information................................................................................................ 9
Current System Status.............................................................................................. 9
The CounterSpy Toolbar............................................................................................ 11
CounterSpy Menus .................................................................................................... 11
Getting Started........................................................................................................... 12
-2-
Chapter 1: Welcome
CounterSpy is an anti-spyware product, designed to protect your computer from
unwanted and hazardous spyware. CounterSpy detects, and then safely removes from
your computer spyware, adware, trojans, and keyloggers. CounterSpy is considerably
more powerful than most anti-spyware products, and it takes a new approach to fighting
and preventing spyware. By identifying and removing spyware, CounterSpy protects you
from the negative affects, including slow Internet connections, pop-up advertisements,
reduced computer performance, the loss of private information, or even identity theft.
Spyware is software that is installed onto your computer without your knowledge or
permission. It collects personal information, like the Web sites that you have visited or
even your user names and passwords. Spyware can generate a stream of unsolicited
advertisements, tax your computer or affect your browser's home page or search page
settings. For more information about Spyware, see page 61.
CounterSpy uses a number of methods to keep your computer protected from spyware.
It monitors your computer for known and unknown spyware. Known spyware programs
are detected and identified by name. Unknown spyware is spyware for which
CounterSpy does not yet have a definition.
CounterSpy Features
Spyware scans – CounterSpy's scanning engine scans your entire system,
including in-depth scans of your computer's hard drives, memory, process, registry
and cookies. It uses a continually updated database of thousands of known spyware
signatures to provide you with ongoing, accurate protection. Spyware scanning can
be done manually (on-demand scanning) or on a scheduled basis.
Active Protection – Active Protection protects your computer, privacy, and personal
information from hidden spyware threats before they can attack. Internet, System,
and Application Monitors look at over 50 security checkpoints, comparing any
unknown activity with the most up-to-date database of spyware threats at Sunbelt's
Research Center – stopping new spyware in its tracks.
System Tools – My PC Explorers let you explore and manage key elements of
your system that are normally hidden and difficult to change. My PC Checkup helps
keep your computer secure by updating your computer settings to recommended
security levels. The History Cleaner is a privacy tool that removes all Internet
History usage logs and 75 different activities. The Secure File Eraser is a powerful
deletion tool that ensures the complete destruction of any files you wish to remove
from your machine.
-3-
System Requirements
Operating Systems - To use CounterSpy, your computer must have one of the
following Windows operating systems:
• Windows 98SE/Me
• Windows 2000 Professional
• Windows XP Professional/Home Edition
• Windows 2003 Server
Note: It is recommended that Service Pack 2 for Windows XP be installed BEFORE
installing CounterSpy.
Note: If you are planning to upgrade your Windows operating system from Windows
98/Me to Windows 2000/XP, you must uninstall CounterSpy first and then reinstall
after the upgrade is complete.
Note: Installation of CounterSpy is not supported on Windows 95/NT, Macintosh, or
Linux computers.
System Requirements - Your computer must meet the following minimum
requirements. If you are installing on Windows 2000/XP/2003, you must install with
administrator privileges.
Windows 98SE/Me
• Intel Pentium processor (or compatible) at 133 MHz for Windows 98; 150 MHz
for Windows Me
• 64 MB of RAM (128 recommended if running Active Protection)
• 20 MB of available hard disk space
• Internet Explorer 5.0 or later
-4-
Customer Support
Sunbelt Software offers a number of avenues for obtaining technical support for
CounterSpy.
CounterSpy Knowledge Base contains answers to many frequently asked questions
about CounterSpy.
Email
Technical Support: support@sunbelt-software.com
Sales: sales@sunbelt-software.com
Customer Service: customerservice@sunbelt-software.com
Sunbelt Software
101 N. Garden Ave.
Clearwater, FL 33755
Phone: (727) 562-0101
Toll-free technical support: 877-673-1153
-5-
Installing CounterSpy
Before You Install
If you have an older version of CounterSpy, installing a new version automatically
removes the previous version. You can transfer existing option settings to the new
version during installation.
Before you install CounterSpy, here are suggestions on how to prepare your computer:
• If you have any other anti-spyware programs on your computer, you should
uninstall them and restart your computer before installing CounterSpy.
Although removing other anti-spyware programs is not required, it is
recommended. CounterSpy might detect spyware that is already quarantined by
another anti-spyware program, especially if the other anti-spyware program does
not secure its quarantined files.
To uninstall other anti-spyware programs, see the user documentation that came
with the program.
• Close all other Windows programs before installing CounterSpy, including those
programs displayed in the Windows tray.
Installing
To install CounterSpy:
1. If you are installing CounterSpy from a CD, insert the CounterSpy CD into the
CD-ROM drive.
2. In the CounterSpy window, click CounterSpy. (Skip to step number 4.)
Note: If your computer is not set to automatically open a CD, navigate to the CD
drive and then double-click the setup.exe icon.
3. If you downloaded your copy of CounterSpy, locate and double-click on the
downloaded file: CounterSpy.exe.
4. The opening installation window reminds you to close all other Windows
programs. Close those now.
5. Click Next to continue.
6. Read the License Agreement and then click I accept the license agreement. If
you decline to accept the License Agreement, you cannot continue with the
installation.
7. Click Next to continue.
8. If you are upgrading from an older version of CounterSpy, you can opt to keep
your option settings. Click Yes to keep previous settings.
9. Select the folder where you want CounterSpy to be installed, and then click Next.
10. Confirm the installation location, and then click Next.
11. After the installation is complete, click to check the Launch CounterSpy
-6-
checkbox.
12. Click Finish to exit the installation.
Sometime installing CounterSpy requires you to restart your computer. If that is
necessary, you will see a message that tells you to restart your computer.
If you are installing CounterSpy for the first time, follow the on-screen instructions
and let the CounterSpy Setup Assistant guide you.
After Installing
The Setup Assistant guides you through steps to configure CounterSpy. The process
does not take a long time. With a few short steps, you will be ready to run a
comprehensive spyware scan, disinfect your system and equip it to detect and eliminate
spyware threats.
You will setup the automatic update features, enable Active Protection, decide whether
to participate in ThreatNet, and run your first CounterSpy scan.
Uninstalling
If you need to remove CounterSpy from your computer, you can use the Add/Remove
Programs option from the Windows Control Panel or the Uninstall CounterSpy option
from the Programs menu. During uninstall, Windows may indicate that it is installing
software. Disregard this standard Microsoft installation message.
-7-
The CounterSpy Home Page
The CounterSpy Home Page is a great place to start, as it serves as the main console
for the entire application. From here, you can access most of CounterSpy's features and
view information about such things as previous scans and CounterSpy settings.
Access Icons
Three icons on the CounterSpy Home Page take you directly to CounterSpy features.
Click an icon to perform that action or manage those options.
Spyware Scan – Click the Spyware Scan icon to scan your computer, set
scan options, schedule when scans run, view previous scan results, and view quick
stats about CounterSpy. Click Run a spyware scan to start a spyware scan.
Active Protection – Click the Active Protection icon to work with Active
Protection Monitors or to manage blocked items. Active Protection gives you real-
time protection against spyware threats.
System Tools – Click the System Tools icon to use one of CounterSpy’s
powerful system configuration and privacy protection tools. Here, you will find The
PC Explorers, My PC Checkup, the History Cleaner, and the Secure File Eraser.
-8-
Important Information
The Important Information area of the CounterSpy Home Page displays messages and
announcements, based on the status of your CounterSpy installation. Watch the
messages for notices and information that can improve CounterSpy’s performance and
your computer’s security.
Last Spyware Scan - Shows the time of the last full spyware scan. In order to keep
your computer free of spyware, run a spyware scan at least once a day. You can do
this manually, or use the spyware scan scheduler.
Last Spyware Scan Results – Summarizes the result of the last spyware scan and
notifies you if your attention is required. For example, if a scan detected spyware
threats, but action has not yet been taken.
Next Scheduled Scan - Displays the time of the next scheduled spyware scan,
based on your schedule settings. Use the scheduled spyware scan to check for and
remove spyware on a regular basis. When the scheduled time arrives, CounterSpy
launches a full spyware scan that runs in the background.
-9-
Figure 3: Mouse-over an item in the status list to see
more information.
Active Protection - Shows the status of the Active Protection. Active Protection
provides real-time protection against spyware and other malicious threats that may
attack your computer.
Spyware Definitions - Shows the last time you updated spyware definitions and
indicates if definitions are up to date.
Help
Click the Help button on CounterSpy pages to see information about
that screen.
Some CounterSpy pages have explanations about specific tasks or settings. When you
see an exclamation point , click the link beside it to learn more about that specific
item.
- 10 -
The CounterSpy Toolbar
When you leave the CounterSpy Home Page, the CounterSpy Toolbar makes it easy to
get around.
CounterSpy Menus
CounterSpy’s Command Menus are another way to navigate to the information you need
to view or to a task you want to complete.
- 11 -
Getting Started
These steps will get you started with CounterSpy. You will run a Scan to remove
spyware, turn on Active Protection to protect against spyware attacks, run My PC
Checkup to set computer security, erase personal information, and check for
CounterSpy updates.
To run a spyware scan:
1. From the CounterSpy Home Page, click the Spyware Scan icon .
2. Click Scan Options.
3. Click to select Intelligent quick scan.
- 12 -
At the end of the scan, CounterSpy displays a brief summary of the scan results.
- 13 -
To keep your machine protected from new threats, CounterSpy’s Active Protection
Monitors can block spyware before it is installed. Check that CounterSpy’s Active
Protection Monitors are enabled.
7. From the CounterSpy Home Page, click the Active Protection icon .
- 14 -
Figure 11: Active Protection is enabled.
Once Active Protection is enabled, spyware is stopped before it is installed.
When a change is made to your computer, CounterSpy alerts you by displaying a
small notification window in the bottom right corner of the computer screen.
CounterSpy makes a decision to allow the, block the change, or ask you to make
a decision.
You have scanned your computer for software and turned on Active Protection. Now
have CounterSpy update your computer’s security. Run My PC Checkup to make sure
your computer settings are set at recommended security levels.
- 15 -
11. From the CounterSpy Home Page, click the System Tools icon , and then
click .
14. From the CounterSpy Home Page, click the System Tools icon .
15. Click .
16. Click Check all to check all items in the list.
- 17 -
Chapter 2: Working with CounterSpy
Spyware Scans
Running a Scan
A CounterSpy scan of your computer looks at files and critical areas of your computer,
checking for any type of spyware. These are in-depth scans of your computer’s hard
drives and processes currently running, the Windows registry, and Internet cookies.
CounterSpy seeks out and provides you options to remove both known and potentially
hazardous, unidentified spyware threats.
You can scan for spyware manually or you can use the Schedule Spyware Scan to
schedule when to have CounterSpy to perform a full system scan for spyware threats.
For more information about scheduling scans, see page 21.
To run a manual spyware scan:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
Spyware Scan icon .
Tip: You can also run a spyware scan from anywhere in CounterSpy, by
choosing View menu | Spyware Scan | Run a Scan Now.
2. Click Scan Options to display and select any scan options that apply.
Intelligent quick scan - An Intelligent quick scan runs a complete scan of your
computer where most spyware may be found. This takes only a few minutes, and
can detect more then 99% of known spyware threats. This is the default setting.
Full system scan - A full system scan lets you select from additional scanning
options, in order to perform a more in-depth or customized scan.
Scan memory - A memory scan does an in-depth scan of the processes that
are currently running in memory. It also checks each process that is loaded to
see if it is spyware.
Scan selected drives / folders - A custom file/folder scan lets you select
specific hard drives, folders, or files to include in the scan. Click after the
arrows to open a dialog where you can choose exactly what you want
scanned and not scanned. Note: CounterSpy scans known locations on the
C: drive or operating system installed drive, before scanning other drives.
Deep scan selected folders - A deep scan is a very in-depth scan of your
system. Although this scan is very accurate, it takes much longer to finish.
Scan cookies - This allows you to scan for known spyware Internet cookies.
These can track your Web surfing habits or provide targeted advertising.
Save these options - Save your spyware scan settings. CounterSpy uses your
saved options the next time a scan is run.
- 18 -
Figure 16: Select scan options.
3. Click Scan Now. At the end of the scan, CounterSpy displays a summary of the
results.
4. (Optional) Click Do not display this window after a spyware scan to have
CounterSpy skip the summary after a scan in order to go immediately to the list
of discovered spyware.
5. Click View Results to close the summary.
CounterSpy generates a list of spyware that is found during a scan. It provides
information about each piece of spyware, assigns a threat level, and suggests a
Recommended Action. All of this can help you decide what action to take.
6. (Optional) Click a threat to highlight it and display Spyware Details about that
piece of spyware.
- 19 -
To find out more about the highlighted threat, click the link Learn more about
this spyware..., located at the bottom of the Spyware Details section. This
displays such information as a detailed description, threat alias names, security
and stability information, and information about the author.
7. (Optional) Click the plus sign (+) to view all detected locations. Threat locations
are the files, folders and registry keys where a threat has installed on your
computer. When deleting or quarantining a threat, all areas where the threat is
present are cleaned. Click a location in the list to learn more about that
location.
Scheduling Scans
You can schedule customized spyware scans to run unattended on specific dates and
times or at periodic intervals. If you are using the computer when the scheduled scan
begins, it runs in the background. You do not have to stop working.
You have complete flexibility in scheduling custom spyware scans. When you select how
frequently you want a scan to run (such as daily, weekly, or monthly), CounterSpy
presents you with additional options with which you can refine your request.
To schedule a custom spyware scan:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
Spyware Scan icon .
2. Click Manage Schedule under the Schedule Scan Details section.
Tip: You can also run a spyware scan from anywhere in CounterSpy, by
choosing View menu | Spyware Scan | Manage Spyware Scan Schedule.
- 21 -
Figure 19: Define and schedule scans.
3. Choose, under "Select Your Spyware Schedule Scan Times", how frequently you
want a scan to be performed, and then refine your schedule:
Daily - Choose Every Day, or select the days when you want to perform a scan.
Weekly - Choose between Every week, Every other week, or Every three weeks,
and then select the days of the week when you want to perform the scan.
Monthly - Choose between an actual day of the month when the scan will run, or
a relative schedule, like "The first Monday of the month".
4. Under "Start time", set the time when you want to perform the scheduled scan(s).
5. Select Scheduled Scan Options to suit your needs:
Always run a deep scan - CounterSpy will run a deep scan. A deep scan is an
in-depth scan of all of your hard drives.
Automatically quarantine spyware - CounterSpy will automatically quarantine
any spyware threats that could cause harm to your computer. This includes all
spyware, keyloggers, back-door trojans, and especially hazardous adware
applications.
Do not scan for spyware cookies - CounterSpy will not scan for spyware
related cookies.
Automatically remove spyware cookies - CounterSpy automatically will
remove any spyware cookies.
Do not display spyware scan results - If spyware is detected on your
computer, CounterSpy will not display the results in a window.
Do not display the scan progress - CounterSpy displays a small progress
window in the lower right hand corner of your computer when a scan is in
progress. This window displays scan progress, as well as all spyware threats
found during the time the scan has been running. Select this option to disable the
display of this progress window.
6. (Optional) Check Disable Schedule to stop CounterSpy from running a
- 22 -
scheduled spyware scan. The Disable Schedule check box is a handy way to
suspend scheduled scans.
If you disable scheduled scans, try to run a manual spyware scan at least two or
three times a week.
7. Click Update Schedule when your selections are complete.
- 23 -
Active Protection
Enabling Active Protection
To keep your machine protected from new threats, CounterSpy comes installed with
over 100 Active Protection Monitors. These Monitors stop spyware before it is installed.
Active Protection helps protect your privacy and identity, as well as prevent unauthorized
programs from taking control of your computer.
When software is installed, or when a change is made to your computer, an internet
setting, or an application setting, Active Protection quickly reacts to analyze the change.
CounterSpy makes a decision to allow the change if it is not threatening, block the
change if it is known spyware, or ask you to decide.
To enable Active Protection:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
Active Protection icon .
Tip: You can also manage Active Protection from anywhere in CounterSpy, by
choosing View menu | Active Protection.
- 24 -
Figure 21: Enable all in an Active Protection category.
3. Click Disable under Monitor Status to turn all monitors in that category off. All
Monitors in an Active Protection category are on by default.
4. Click Enable under Monitor Status to turn all monitors in that category on.
5. Click to select and highlight a monitor to see Monitor Details.
6. Click Learn about Selected Monitor to view additional information.
7. Click Disable Selected Monitor to turn off the selected monitor.
8. Click Enable Selected Monitor to turn on a disabled monitor.
9. Click Manage allowed/blocked to view, unblock, or delete any software that was
blocked by an Active Protection Monitor.
- 25 -
Figure 22: Active Protection warns you about possible
threats.
To block or allow a threat:
1. Click Block or Allow in the alert window.
When you choose Block, CounterSpy performs a quick block of the threat, which
blocks the installation or execution of the blocked spyware.
After a threat is blocked, CounterSpy asks if you want to run a full spyware scan.
This is highly recommended, as the initial block only removes that specific
instance of the spyware threat.
2. Click Yes to initiate a scan. The CounterSpy scan setup screen is display.
- 26 -
Figure 23: Manage items blocked by Active Protection.
2. Select an item in the Blocked list to view information about that item in the
Blocked Details area.
3. Check an item to select it for action.
4. Click Un-Block item to restore the selected item to its original state.
To unblock multiple items, check the items that you want restored, and then click
Un-block all checked items.
After you unblock an item or items, it is a good idea to restart your computer.
5. Click Permanently remove item to delete the selected item from your computer.
To remove multiple items, check the items that you want removed, and then click
Permanently remove all checked items at the bottom of the screen.
Internet Monitors
Internet Monitors provide real-time protection from applications that make unauthorized
connections to the Internet or change your computer's Internet connections settings,
such as dial-up or wireless connectivity.
Dialup Connection - Monitors for unauthorized dial up activity from your computer's
modem(s). This is used to prevent dialer-type spyware from dialing out without your
knowledge. A dialer is software that dials a phone number using your computer's
modem. Most dialer programs connect to toll numbers without your permission. They
can rack up large phone charges on your phone bill.
Internet Safe Sites - Prevents unauthorized Web sites from being added to your list
of Internet Safe Sites. Safe Sites are Web sites that you trust will not damage your
computer. When you visit a safe site, Internet Explorer will lower the recommended
security and allow the site to run scripts. If Spyware adds an unsafe site to that list,
the scripts that run could be dangerous.
- 27 -
Internet Proxy Server - It prevents unauthorized changes or additions to your
Internet Explorer Proxy Server. The Internet Explore Proxy Server is a server
between the Internet Explorer Web browser and a real server. Proxy servers have
two main purposes: improve performance and filter requests. A Proxy Server
intercepts any request to the real server, to see if it can fulfill the request itself. If it
cannot fulfill the request, it forwards the request to the real server.
Name Server Protection - Prevents spyware from changing your Domain Name
Servers (DNS). By default, your Internet Server Provider assigns your Domain Name
Server, but spyware can try to change it. If your Name Server is changed, TCP IP
queries could be redirected through a potentially dangerous server.
Spam Zombie Protection - Prevents spyware from sending spam from your
computer. Spambot Prevention prevents your computer from becoming a source for
sending spam. Many spammers take advantage of security gaps and spyware, in
order to install 'spambots', also known as "spam zombies". These are installed on
personal computers with the intention of sending out spam email from that computer,
without the user's knowledge. Spammers can use your computer to send unsolicited
and possibly offensive email offers for products and services. Spammers are using
home computers to send bulk emails by the millions. If a spammer takes over your
computer, you could face serious problems. Your Internet Service Provider (ISP)
may prevent you from sending any email at all until the virus is treated. Treatment
could be a complicated, time-consuming process.
- 28 -
configuration parameters are registry parameters that are used to configure the
protocol driver, Tcpip.sys. Tcpip.sys implements the standard TCP/IP network
protocols. Some spyware threats such as CoolWebSearch can modify these
parameters to take advantage of your computer. There may be some unusual
circumstances in customer installations where changes to certain default values are
appropriate. To handle these cases, optional registry parameters can be created to
modify the default behavior of some parts of the protocol drivers. The Windows
TCP/IP implementation is largely self-tuning. Adjusting registry parameters without
careful study may reduce your computer's performance.
WiFi Protection - Monitors for access from other users on your wireless network.
When a new user enters your WiFi network, the Monitor notifies you.
System Monitors
System Monitors provide real-time protection against potential spyware that makes
unauthorized or hazardous changes to your system, such as altering your security
permissions or system settings.
Control.ini Policy - Prevents Internet Explorer control from showing in the Control
Panel. It is possible to disable the seeing of a control in the Control Panel by adding
an entry into the file called control.ini, which is stored in C:\windows\control.ini. From
within that file you can specify which specific control panels should not be visible. If
inetcpl.cpl is set to no (inetcpl.cpl=no), that may be a sign that a piece of software is
trying to make it difficult for you to change your settings, unless it is set to that value
for a specific known reason by an administrator.
Host File Protection - Monitors changes to your System Host file. If a new entry is
made to the file, if an older entry is modified, or if an older entry is deleted, an action
alert prompts you to either accept or reject the change. Spyware changes your host
file listings for one reason, to redirect your browser to a chosen Web site. Your
browser references your Host file. It performs, for specific Web site addresses, a
- 30 -
translation (Host File Redirection) from Domain Name (the URL address for a Web
site) to IP Address (a series of numbers that references the physical connection of a
computer or server on the Internet). For example, when you enter
www.somesite.com into your browser, you go to the somesite.com Web site. That
Web site has an IP Address, but you do not need to know what it is, because your
browser to find the site uses the Domain Name. If, however, this entry is in the Host
file: 192.168.0.12 www.somesite.com, each time you enter www.somesite.com into
your browser, the browser checks the Host file, matches what you type to a listing for
"somesite.com", and automatically converts what you type into the IP address in that
listing. Your browser goes to the Web site at 192.168.0.12, which could be anything
that the spyware attacker wants to display. The Host file should not require
modification. Some Hijackers use this technique to redirect popular sites to their Web
site. For example, it is possible to redirect all popular search engines to a Web site of
your choice. That kind of attack can be very hard for the average user to fix, and will
most likely require specialist software or detailed removal instructions. Other
practices involve changing auto.search.msn.com to redirect to a Web site, so
whenever a user types in an incorrect URL, the browser is redirected to
auto.search.msn.com. That is then resolved to a different IP address of the hijacker's
choice. Reset Web Settings does not fix a Host file Hijack. It only resets the search
page to auto.search.msn.com. The Host file remains altered, and any redirection
listing remains active.
Ini File Mapping - Prevents hazardous applications from being installed in an .ini file
mapping location. Newer versions of Windows (2000, XP, etc.) do not generally use
the system.ini and win.ini files. Instead of backwards compatibility, they use a
function called IniFileMapping. Ini file mapping puts all the contents of an .ini file into
the registry, with keys for each line found in the .ini key stored there. When you run a
program that normally reads their settings from an .ini file, Windows first checks the
registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\IniFileMapping, to see if there is an .ini setting that has been
mapped to that file. If a mapping is found, Windows takes settings from there.
- 31 -
session connections) to list account names and enumerate share names. For
example, the Windows NT ACL editor requires listing account names from Domain
Controllers, in order to obtain a list of users and groups in order for a user to be able
to select users and grant them access rights. Windows NT Explorer also uses listing
account names in order to grant access to shared files. Windows NT networks based
on a single Windows NT domain will always be able to authenticate connections to
list domain account information. Windows NT networks that use multiple domains
may require anonymous user logon to list account information. A brief example
shows how anonymous connections are used. Consider two Windows NT domains,
an account domain and a resource domain. The resource domain has a one-way
trust relationship with the account domain. That is, the resource domain "trusts" the
account domain, but the account domain does not trust the resource domain. Users
from the account domain can authenticate and access resources in the resource
domain based on the one-way trust. Suppose an administrator in the resource
domain wants to grant access to a file to a user from the account domain. They
would want to obtain a list of users and groups from the account domain, so that they
can select a user or group and grant access rights. Since the account domain does
not trust the resource domain, the administrator request to obtain the list of users
and groups from the resource domain cannot be authenticated. The connection is
made using a NULL session to obtain the list of account domain users.
Windows Shell Execute Hooks - Prevents changes to your system's Shell Execute
Hooks. Shell execute hooks are programs that load into the Windows shell,
Explorer.exe. A shell execute hook program receives all the execute commands that
are run on a computer. This type of integrated program can either accept or reject a
command to launch a particular program.
Windows Shell Open Commands - Prevents changes to your system's Shell Open
Commands in the Windows Registry File. What is a Shell Open Command?
Windows executes instructions in the Windows Registry File.
HKEY_CLASSES_ROOT\exefile\shell\open\command "%1" %* section of the
Registry is subject to spyware attack. A spyware command embedded there can
- 32 -
cause a program to run when any other program is started. If keys don't have the
"\"%1\" %*" value as shown, and have been changed to something like
"\"somefilename.exe %1\" %*", then the Shell Open Command automatically runs
that specified file. Many spyware worms and trojans make changes to the Windows
Registry file. Some of them change one or more of the shell\open\command keys. If
these keys are changed, the worm or trojan can run every time you run certain
programs. For example, if the \exefile\shell\open\command key is changed, the
threat will run every time that you run any .exe file. These spyware threats can also
stop you from running the Registry Editor to try to fix this.
Windows System.ini File - Monitors for additions and modifications to the Microsoft
Windows System.ini file. The Microsoft Windows system.ini file is located in the
Windows directory (C:\windows\system.ini). An initialization file is used by Microsoft
Windows to initialize system settings for the computer. These include font, keyboard,
language and other settings. The shell = statement in the system.ini file is used to
designate what program acts as the Shell for the operating system. The Shell is the
program that loads your desktop, handles windows management, and allows you to
interact with the system. In Windows, that program is explorer.exe. Any program
listed after the shell statement is loaded when Windows starts, and acts as the
default shell. (There used to be some programs that acted as valid shell
replacements, but they are generally no longer used.) It is possible to list other
programs to launch when Windows loads, by adding to the same Shell = command
line, such as Shell=explorer.exe spyware.exe. This line entry in the system.ini file
would cause both programs Windows Explorer and a spyware program to start when
Windows loads.
- 33 -
Admin Tools, Common AppData, Common Desktop, Common Favorites, Common
Programs, Common Start Menu, Common Startup, and Common Templates.
Windows Win.ini File - Monitors for additions and modifications to the Microsoft
Windows Win.ini file. The Microsoft Windows initialization file is located in the
Windows directory (C:\windows\win.ini). The win.ini file is used to load settings every
time Microsoft Windows starts. For example, it loads communications drivers, the
selected Windows wallpaper, the selected screen saver, language settings, and font
settings. These and other settings are loaded according to the instructions in the
win.ini file. If this file becomes corrupted Microsoft Windows will either not load, or
will encounter errors as it loads. Any programs listed after the run= or load=
command in the win.ini file will load when Windows starts. This run= statement was
mostly used with older versions of Windows but for backwards compatibility, the
feature still exists. Most programs today do not use a win.ini setting, and if you do not
use older programs, entries for those programs should not exist. The load=
statement was designed to load drivers for your hardware, but is not generally used
today.
- 34 -
of that program for Userinit.exe in the value of this entry, then include instructions in
that program to start Userinit.exe. You might also want to substitute Explorer.exe for
Userinit.exe if you are working off-line and are not using logon scripts. (Note: The
entry remains in the registry to support programs designed for Windows NT 4.0 or
earlier.)
WOW Boot Shell - Prevents spyware from loading a particular file when Windows
starts. WOW\Boot\Shell is a Windows registry entry that allows a program to be
loaded when Windows loads.
Application Monitors
Application Monitors provide real-time protection against threats that make changes to
your installed applications. This can include software that modifies your Internet Explorer
or downloads ActiveX applications from the Internet.
Disable Regedit Policy - Prevents spyware from disabling the Regedit functionality.
The Disable Regedit Policy prevents Regedit from being run, because an entry in the
registry has changed. Regedit is a system application that is used to change settings
in the system registry. The registry contains information about how your computer
runs and what software is installed on the computer. Changing the registry
improperly can result in your system no longer working. Note: Many administrators
for corporate networks lock this on purpose.
Tip: Here are more ways to improve your Internet Explorer security: (1) My PC
Checkup can recommend and automatically modify security settings. (2)
Microsoft Internet Explorer offers advanced security options. To access these
options in Internet Explorer: Select Tools | Internet Options, and then select the
Advanced tab. Among other choices, the Advanced tab contains a Security
section that includes several configuration options pertaining to encrypted
communications. Although most of the default settings are acceptable, certain
security levels disable the first four items by default. You should enable these
four items for maximum browser: (1) Check for publisher's certificate revocation,
(2) Check for server certificate revocation (requires restart), (3) Do not save
encrypted pages to disk, and (4) Empty Temporary Internet Files folder when
browser is closed.
Internet Explorer Third Party Cookies - Prevents unauthorized cookies from being
added as acceptable 3rd party cookies. Cookies are little files that Web sites drop
- 36 -
onto your computer, so that they can recognize you on your return visits. Many
cookies are quite useful. For example, those that let sites identify you and log you in
automatically to private member areas. Others are not so benign. Some gather
information without your knowledge and track your Web usage. Third-party cookies
are those planted by Web sites that are external to the one you are visiting. For
example, sites such as www.ninemsn.com use third-party cookies for advertising
purposes. First-party cookies are those used by the site you are actually viewing.
Internet Explorer Reset Web Settings - Prevents spyware from changing your
Internet Explorer 'Reset Web Settings' protection. Internet Explorer uses a file on
your computer if you need to reset options to Windows defaults. That file is stored in
C:\windows\inf\iereset.inf and contains all the default settings that will be used. When
you reset an Internet Explorer setting to its default, Internet Explorer reads that file
and changes the setting to the value listed in the file. If spyware changes the
information in that file, you can be re-infected when you reset a feature, because
Internet Explorer reads incorrect information in the iereset.inf file. Note: Be aware
that it is possible for iereset.inf settings to be legitimately changed by a Computer
Manufacturer or the Administrator of a computer.
Internet Explorer Trusted Sites - Prevents unauthorized sites being added to your
list of Trusted Sites. Trusted Sites are Web sites that you trust not to damage your
computer. Internet Explorers security is based upon a set of zones. Each zone has
different security in terms of what scripts and applications can be run while using that
zone. It is possible to add Web sites to zones. If that happens and you browse a
Web site that was added to a low security zone, that Web site can run scripts on your
computer. Internet Explorer sets up the Trusted zone with a low security level to
make it easier for you to do such things as download software without prompting.
Add a site to this zone only if you trust that it would never cause harm to your
computer.
Internet Explorer URLs- Monitors changes to your Internet Explorer URLs, in order
to prevent browser hijacking. An Internet Explorer URL is an address for commonly
viewed sites, like your Home Page, search engines or Web directory sites. When
spyware hijacks your Web browser, attempts to view these common Web sites can
be redirected to an alternative Web site of the hijacker's choice. A browser Hijacker
can also disallow access to certain Web pages. For example, the site of an anti-virus
software manufacturer might be blocked. These programs have also been known to
disable installed Anti-virus and anti-spyware software. Some of the Internet Explorer
URLs that are protected by this Monitor include: Internet Explorer Start Page,
Internet Explorer Search Page, Internet Explorer Default_Page_URL, Internet
Explorer Local Page, Internet Explorer Search Bar, Internet Explorer
Default_Search_URL, Internet Explorer CustomizeSearch, Internet Explorer
SearchAssistant, Internet Explorer SearchUrl Local page, Internet Explorer
SearchUrl Blank page, Internet Explorer SearchUrl Desktop navigation failure,
Internet Explorer SearchUrl Navigation canceled, Internet Explorer SearchUrl
Navigation failure, Internet Explorer SearchUrl Offline information, Internet Explorer
- 38 -
SearchUrl PostNotCached, and Internet Explorer SearchUrl mozilla.
It is possible for a browser hijacker to change the default prefix that is appended to
an URL when one is not included. For example, if you type in "google.com", the
browser would normally add the http:// to the front of what you type. This part is
called the "URL prefix", and it is not fixed to http://. The prefix values are stored in a
registry at: HLM\Software\Microsoft\Windows\CurrentVersion\URL\DefaultPrefix
HLM\Software\Microsoft\Windows\CurrentVersion\URL\Prefix. For example:
- 39 -
is used only when the value of the RestrictRun entry is 1. This subkey stores the
contents of the Show Contents box in the Run only allowed Windows applications
Group Policy. Group Policy adds this subkey and its entries to the registry when you
enable the policy. If you disable the policy or set it to Not configured, Group Policy
deletes this subkey and its entries from the registry. The entries in this subkey list all
of the Windows programs that the affected users can run. If a program is not
represented by an entry in this subkey, users cannot run the program. If no entries
appear in this subkey, users cannot run any programs that Windows Explorer starts.
Each entry in this subkey represents a Windows program, like Notepad. It contains
the name of the executable file for the program, like Notepad.exe. (The number that
names this entry represents only the order in which the programs are entered. It
does not affect the feature.)
StartUp Files - Monitors additions and modifications to your list of startup programs.
When a new program is added to your user startup folder or if one is added to the
"all users" startup program folder, this Monitor alerts you. If the program being added
is known to be safe, this Monitor automatically allows it to be added. If the program
being added is known to be spyware, this Monitor automatically blocks it, and then
warns you. If a program being added is unknown, you can select the Send Feedback
checkbox to report it to Sunbelt’s Research Center. Startup files are files (or
shortcuts to files) that are located in your startup folder. Files that are in the startup
folder are automatically loaded when Windows starts. If it is a program, the program
starts. If it is a shortcut to a program, the program that the shortcut points to starts. If
it is a file that is associated with a program, the associated program starts. For
example: If you put a Microsoft Word document (or a shortcut to one) in your Start
Up folder, Microsoft Word will automatically start, and it will open that document
when your computer starts. If you put a music file (or a shortcut to one) in the startup
folder, your audio software will start and it will play the music file. If you put an HTML
file (or a shortcut to one) that contains a list of your Internet favorites in the startup
folder, Internet Explorer (or your preferred browser) will start and it will open that
Web page for you when the computer starts.
- 40 -
The User Profile Startup Folder is your personal Startup folder. Each person who has
a profile setting on the computer has a User Profile Startup folder. Any files or
shortcuts placed in this folder are run when the user with that profile logs in. (In the
path shown below, LoginName = the name you use to log onto the computer.) This
folder is usually found in:
C:\windows\start menu\programs\startup
C:\Documents and Settings\LoginName\Start Menu\Programs\Startup
The All Users Startup Folder contains any files or shortcut files that are to run when
any user logs onto the computer. This folder applies to all Windows NT, 2000, XP
and 2003 versions. Possible folder paths are:
Startup Registry Files - Monitors additions and modifications to the list of startup
programs that are listed in your system registry keys. Startup registry keys are a
number of registry entries in the Windows registry. They store paths to applications
on your computer. Applications that are listed in any of these registry keys are
automatically loaded when Windows starts. These keys generally apply to Windows
98, ME, NT, 2000, XP, and 2003.
- 41 -
System Tools
My PC Checkup
My PC Checkup helps tighten computer security. It updates your computer settings to
recommended “best practices” security levels. My PC Checkup thoroughly scans your
computer for over 1000 different settings, suggests recommended changes, and then
allows you to execute the recommended changes. Please Note: Settings that are
changed by My PC Checkup cannot be undone using CounterSpy.
The first time you run My PC Checkup, there may be many recommended changes.
Subsequent My PC Checkups will find fewer changes to suggest. CounterSpy is self-
tuning, and when you also use Active Protection, it helps keep your computer secure.
To Run My PC Checkup:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
- 43 -
Figure 26: Select History Cleaner items for details.
2. (Optional) Click Show only available history to display only those History
Cleaners that are for applications that you have installed on your computer.
CounterSpy checks each of the available History Cleaners to see if any
applications are associated with it, and then hides those cleaners that are not
required.
Click Show all history to see all the History Cleaners that are included with
CounterSpy. If a cleaner requires an application that you do not have installed on
your computer, that eraser is displayed, but remains grayed out in the list and is
not active.
3. Select an item in the History Cleaner list to view information in the Details about
that item.
4. Click Erase selected item to clean the history for the selected item.
5. To erase multiple items, check each item in the list that you want erased, or click
Check all to check all items in the list.
6. Select the Remember Checked option for CounterSpy to remember what
activities you want cleaned in the future.
7. Click Clean History.
Warning: Files you erase this way cannot be retrieved, even with special data
recovery utilities!
- 44 -
To use the Secure File Eraser:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
- 45 -
My PC Explorers
My PC Explorers let you explore and manage key elements of your system. The different
My PC Explorers allow you to view and modify settings on your computer that are
normally hidden and difficult to change.
My PC Explorers are very powerful. With My PC Explorers, you can find out what
applications are currently connected to the internet, find out what programs automatically
start when windows starts, see and modify which applications are changing your Internet
settings, and much more.
Available PC Explorers.
Applications
• Downloaded ActiveX, see page 47
• Internet Applications, see page 48
• Running Processes, see page 49
• Startup Programs, see page 47
Internet Explorer
• Internet Explorer BHOs, see page 49
• Internet Explorer Details, see page 51
Networking
• Windows Host File, see page 51
• Winsock LSPs, see page 52
System
• Shell Explorer Hooks, see page 53
To use the My PC Explorers:
1. From the CounterSpy Home Page, or from any screen with the toolbar, click the
- 46 -
Figure 28: Click to select a My PC Explorer.
2. Click an Explorer on the left to view the information and options that it provides.
My PC Explorers - Applications
Downloaded ActiveX
My PC Explorers Downloaded ActiveX displays all the downloaded and currently
installed ActiveX programs for Internet Explorer. Each program is evaluated and labeled
Safe, Unknown, or Hazardous.
- 47 -
the program in the ActiveX Details area.
2. Click Block this ActiveX to block the selected program.
For information about how to manage blocked items, see page 26.
Internet Explorer uses ActiveX controls for interaction between the browser and
some third party applications and the operating system. ActiveX controls are similar
in function to browser plug-ins. As updated versions of third-party programs like
Shockwave and Flash become available, it is necessary to update the ActiveX
control for those programs in Internet Explorer.
ActiveX programs are a great tool for providing interactive programs for Internet
Explorer. Unfortunately, they provide a means for installing spyware onto a
computer. These are known as "drive by installations". A drive by download is an
ActiveX program that is automatically downloaded to your computer, often without
your consent or even your knowledge. Unlike a pop-up download, which ask
permission, a drive by download is invisible to the user and can be initiated simply by
visiting a Web site or viewing an HTML email message.
Internet Applications
The Internet Applications My PC Explorer displays a list of all programs that are currently
connected to a remote computer or are listening for connections from a network or the
Internet. CounterSpy lists the Local Connection IP Address and Remote Connection IP
Address for each connected application.
Some common applications use the Internet. These include programs like Internet
Explorer, Microsoft Outlook Express, or other programs that need to send and
retrieve information over the Internet.
- 48 -
Running Processes
My PC Explorers Running Processes displays a list of all the processes (programs) that
are currently running on your computer. Windows Task Manager displays these same
processes, with fewer details.
Startup Programs
My PC Explorers Startup Programs lists all the applications that can startup and run
when you start your computer or log into Windows.
3. Click Permanently remove startup program to delete the program from your
computer.
4. Click Learn more about this program… to view additional information.
Many programs that you install are set to run automatically when you start your
computer and load Windows. For the majority of cases, this type of behavior is fine.
Unfortunately, spyware, hijackers, trojans, worms, and viruses can load that way,
too. It is important to check startup registry keys.
About BHOs
A 'Browser Helper Object' (BHO) is an application that extends Internet Explorer and
acts as a plug-in. They let developers customize and control Internet Explorer.
Spyware, as well as browser hijackers, often use BHOs to display ads or follow your
moves across the Internet. A number of legitimate applications such as the Google
or Yahoo toolbars use BHOs.
When Internet Explorer starts, it first reads the Windows registry file, in order to
locate installed BHOs and then creates them. Created BHOs then have access to all
the events and properties of that browsing session. The APIs for building BHOs give
developers almost complete control over Internet Explorer.
Applications that install BHOs are becoming more and more popular because BHOs
allow application developers to control Internet Explorer. For example, Alexa uses a
BHO to monitor page navigation and show related page links. GetRight and Go!Zilla
use BHOs to monitor and control file downloading. Flyswat, Quiver, Blink, and
iHarvest use BHOs to extend and control Internet Explorer. BHO technology has
allowed the development of some very powerful applications that provide useful
functionality to its users.
It is possible that there are BHOs installed on your computer that you do not know
about. What this means is that while there are some good uses for BHOs, they may
not necessarily need your permission to install. Some are used for malicious
purposes like gathering information about your Internet usage habits. Some
companies go out of their way to hide the presence of the spyware BHOs that they
install. They go so far as to find ways around the most popular detection tools by
changing their product just enough to avoid detection, until the next version of
detection software can be released.
A lot of spyware and BHOs are poorly written. This can cause anything from
incompatibility issues to the corruption of important system functions. This makes
them not only a threat to your security, but to your system's stability.
- 50 -
Internet Explorer Details
My PC Explorers Internet Explorer Details allows you to review what URLs are set for
Internet Explorer. This includes such things as your home page, browser address search
URLs, and hidden URLs that Internet Explorer requires. Unfortunately, these URLs are
commonly taken advantage of by URL hijackers. You can modify settings for each URL
and you can save your settings for later use.
When your Web browser is hijacked, your attempts to view some Web sites (such as
common search engines or popular Web directory sites) are automatically redirected
to an alternate Web site of the hijacker's choice.
A browser hijack might also disallow access to certain Web pages, like anti-virus and
anti-spyware sites. For example, a hijack might block you from getting to the site of
an anti-virus software manufacturer like Symantec, in order to prevent updates to
that program from discovering that the browser has been hijacked.
My PC Explorers – Networking
Windows Host File
My PC Explorers Windows Host File shows you the current listings in your Windows
Host file. You can disable or remove a Host file entry.
- 51 -
About the Windows Host File
Your browser references your Host file and performs a translation for specific Web
site addresses (Host File Redirection) from Domain Name (the URL address for a
Web site) to IP Address (a series of numbers that references the physical connection
of a computer or server on the Internet).
For example, when you enter www.somesite.com into your browser, you go to the
somesite.com Web site. That Web site has an IP Address, but you do not need to
know what it is, because your browser uses the Domain Name to find the site. If,
however, this entry is in the Host file:
192.168.0.12 www.somesite.com
each time you enter www.somesite.com into your browser, the browser checks the
Host file, matches what you type to a listing for "somesite.com", and automatically
converts what you type into the IP address in that listing. Your browser goes to the
Web site at 192.168.0.12, which could be anything that the spyware attacker wants
to display.
The Host file should not need to be modified. Some Hijackers use this technique to
redirect popular sites to their Web site. For example, it is possible to redirect all
popular search engines to a Web site of your choice. That kind of attack can be very
hard for the average user to fix, and will most likely require specialist software or
detailed removal instructions. Other practices involve changing auto.search.msn.com
to redirect to their Web site, so whenever users type an incorrect URL, their browser
is redirected to auto.search.msn.com. That is then resolved to a different IP address
of the hijacker's choice.
Reset Web settings does not fix a Host file Hijack. That only resets the search page
to auto.search.msn.com. The Host file remains altered, and any redirection listing
remains active.
A Winsock Layered Service Provider (LSP) is a program that sits in the middle of the
computer's Winsock layer. That layer is used for all network communications, both
internally and on the Internet. A LSP program can intercept and modify all data that
- 52 -
goes in and out of your computer's network.
A shell execute hook is a program that is loaded into the Windows shell. The
Windows shell is Explorer.exe. A shell execute hook program receives all commands
that are run on your computer. This type of integrated program can either accept or
reject a command to launch a particular program.
- 53 -
CounterSpy Settings
- 54 -
Apply new spyware updates without interrupting me (recommended) - Check
this option to install new spyware definition updates when they become available. If
you uncheck this option, CounterSpy alert you when updates are available, allowing
you to update manually.
Startup options
Enable the CounterSpy Active Protection on startup. (recommended) - Check
this to have CounterSpy automatically start Active Protection each time you start
your computer.
Automatically prevent all scripts from running. - Select this if you want
CounterSpy, without asking for your input, to prevent many hazardous scripts from
executing on your computer.
- 55 -
Alert Settings
An alert refers to a popup window that appears in the bottom right of your Windows
desktop whenever Active Protection detects a possible security violation, suspicious
activity, or spyware attempting to install on your computer. These alerts notify you that
Active Protection has automatically allowed or blocked an event on your computer.
Blocked Alerts
When Active Protection prevents a change to your computer, a Blocked alert is
displayed. This can occur when a known spyware setting or application is installed or
attempts to install.
Enable blocked alerts - Check this to allow non-interactive alerts to display when
Active Protection successfully blocks a known threat.
Allowed Alerts
Allowed Alerts occur when Active Protection detects a change to your system, but
recognizes that it is being made by a known non-spyware applications, such the Google
toolbar.
Enable allowed alerts - Check this to allow non-interactive alerts to display when an
application that passes inspection is allowed.
Show alert if an ignored threat has been detected and allowed to run - Check
this to display an alert if an ignored threat has been installed or is executing on your
computer.
ThreatNet Settings
ThreatNet is a worldwide network of users who report on new spyware outbreaks to
Sunbelt. When CounterSpy’s Active Protection observes an unknown but potential
threat, the can anonymously send information about the threat to Sunbelt's Spyware
Research Center.
The research center can then identify new threats as they occur, making updates
available to protect users from new spyware.
Click Yes. I would like to join the Network and help fight spyware
anonymously, if you would like to join the network.
All information sent to and from ThreatNet is transmitted in a secure and private manner.
The data sent in each user’s report is completely anonymous. A report only includes
simple threat signatures, and never includes personal information that can associate you
or your computer with any sent data.
- 56 -
Spyware Scan Settings
Dealing with Spyware Threats
Display the scan results window after a spyware scan - Check this to have
CounterSpy display the results of spyware scans when they complete.
General Settings
User Modes
CounterSpy offers two user modes. These user modes generally reflect the expertise
you have with computers. You should try to select a user mode that best meets your
experience level with using your computer.
Beginning User - A beginning user is restricted from some of the actions that might
otherwise be performed when presented with various alerts. These restrictions are
based CounterSpy's recommended action.
Advanced User - An advanced user is one that is familiar with much of the
functionality of a computer. This can range from a very technical user, to a skilled
power user.
If you select the Advanced User mode, you will have complete control over blocking,
deactivating and removing installed applications. It is important to understand that
selecting this mode allows you to take any action on various alerts, regardless of
whether the action is recommended by CounterSpy.
Note: It is extremely important when using this mode that you completely understand
what you are doing, before taking actions like blocking program installations.
Additional Settings
Include technical information in selection details - Check this checkbox to
include technical details for most information presented. For example, CLSIDs are
displayed for some of the various My PC Explorers, in addition to names and file
information.
- 57 -
Updating
Rogue programmers and companies that want to defraud computer users are always
developing Spyware. They do it to steal personal and financial information, invade your
privacy, cause your computer to send spam, or to divert processor power. CounterSpy's
research experts continuously update CounterSpy to protect your computer from the
latest threats.
Spyware definitions are files that contain specific information about spyware threats.
These definitions allow CounterSpy to detect and protect against spyware, adware,
trojans and worms. CounterSpy's scanning engine uses a robust definition library with
well over 100,000 spyware threat files and settings.
Update spyware definitions as soon as you install CounterSpy. When you know that your
spyware definitions are up-to-date, continue to update them regularly. Sunbelt releases
new spyware definitions when new spyware is discovered. This can happen once a day
or every few days. CounterSpy checks for updates if your computer is connected to the
internet. If you are not connected to the Internet when a it is time for a scheduled update,
be sure to check when your computer is again connected.
Note: With the exception of the 15-day trial period, a valid CounterSpy subscription
is required for you to receive updated spyware definitions, so be sure to keep your
CounterSpy subscription current. During the 15-day trial you will also receive
updates.
CounterSpy software updates offer continuous improvements to your installed product.
These differ from product upgrades, which are newer versions of entire products.
Program updates that have self-installers to replace existing software code are usually
created to extend operating system or hardware compatibility, adjust a performance
issue, or fix bugs.
How to Update
Automatic Updates and Update Notifications
Using CounterSpy's Automatic Updates feature, CounterSpy automatically
communicates with the CounterSpy Update server. It checks for and downloads any new
spyware definitions or software updates. Automatic Updates are performed on a
schedule that you define.
Tip: If you enable Automatic Updates in the settings section, updating becomes even
easier. With Automatic Updates enabled, CounterSpy checks for newly released
updates, downloads them when they become available, and makes it possible for
you stay current, without any effort at all.
To enable automatic updates and notifications:
1. Click Automatic Updates on the CounterSpy Home Page. The CounterSpy
Automatic Update Service Settings are displayed.
- 58 -
Figure 31: Update automatically to defeat new threats.
When you enable Automatic Updates, CounterSpy checks for an Internet
connection every five minutes. Once a connection is available, CounterSpy
checks for updates.
2. Click Stay protected automatically to enable automatic update options for
CounterSpy.
3. Select when you want updates to take place: at System Startup, Daily, Every
Other Day, or Every Week.
4. Select the time you want the update to take place.
5. Check Apply new spyware updates without interrupting me to have
CounterSpy automatically install downloaded updates. Unchecked, CounterSpy
does not automatically apply the updates. Instead, it alerts you when updates are
available, so that you can install them manually.
6. Check Notify me when updates or new versions of CounterSpy are available
to have CounterSpy notify you that it is time to update CounterSpy.
7. Click Save.
Manual Updates
There are some situations where you cannot use CounterSpy's automatic updates
feature. These reasons can include personal preference, technical considerations, or
corporate standards. If you cannot enable Automatic Updates, you can still stay 100%
updated by manually performing regular updates.
To update spyware definitions and CounterSpy software manually:
Choose File menu | Check for updates, or click Spyware Definitions on the
CounterSpy Home Page.
CounterSpy checks for the latest spyware definitions and software updates. If either
are available, follow the on-screen instructions to perform the update.
- 59 -
Why you might not be able to use Automatic Updates
CounterSpy checks for updates and downloads available updates through a standard
port, port 80, which is also the port for regular HTTP Internet traffic. Because of its
design there should be few problems connecting to the update servers in a wide range
of network configurations. Most software and hardware based firewalls and proxy
servers should not prevent the update service from functioning normally.
There are situations that can prevent automatic updates. For example, you have an
ISDN router that is set to automatically connect to your Internet service provider (ISP). In
that case, many connections will be made, with connection and phone charges possibly
being incurred for each connection. If this is a problem, you can set your ISDN router to
not automatically connect to the ISP or disable CounterSpy Automatic Update.
Regular Definition Updates - Spyware programs change frequently. Stay safe from
these unwanted programs by having the latest update to CounterSpy's definitions
database.
Premier Customer Support - Spyware is incredibly invasive and can easily disrupt
essential system functionality. CounterSpy is backed by Sunbelt Software expert
technicians who will support you through any spyware and adware problems you
encounter.
Access to the Sunbelt Software Research Center – The research center is a great
resource for essential information about the latest online threats, insights into
managing spyware, and user tips. Visit the research center at http://research.sunbelt-
software.com.
- 60 -
Appendix A - What is Spyware?
Spyware is software that is installed onto your computer without your knowledge or
permission. It collects personal information, like the Web sites that you have visited or
even your user names and passwords. Spyware is often associated with adware.
Adware also is installed onto your computer without your knowledge. Adware generates
a stream of unsolicited advertisements, affecting your productivity. These
advertisements often contain pornographic images or other material that you could find
inappropriate. The extra processing that is required to support spyware or the display of
adware advertisements could tax your computer and hurt performance. There are
programs that are downloaded that can affect your browser's home page or search page
settings.
Spyware is used for two general purposes: surveillance and advertising. Surveillance
software includes key loggers, screen capture devices, and Trojans. Corporations,
private detectives, law enforcement, intelligence agencies, or even suspicious spouses
would use this kind of spyware. Advertising spyware is installed along with other
software or when ActiveX controls are downloaded from the Internet. In the hopes of
targeting your interests, advertising spyware can log information about you, including
passwords, email addresses, Web browsing history, online buying habits, computer's
hardware and software configurations, and personal information, such as the name, age,
or sex of the user.
Spyware programs fall into these categories:
Spyware – software that collects personal information and computer or Web usage
information from your computer, usually to facilitate advertising. Spyware programs
can be bundled as a hidden component on other software packages, or it can be
downloaded from the Internet. These little programs are usually installed secretly
onto your computer. They try to run without detection.
Browser Plug-ins – programs that are installed into a Web browser. Plug-ins can
come in the form of toolbars, or can take the form of a search or navigation feature.
They can also be extra task buttons on your Web browser. Although some plug-ins
perform useful functions, many plug-ins are harmful to your computer. They often
have complete access to your Web browser, and can modify, spy or even redirect
tasks as you perform them.
Browser Hijackers – malicious programs that change your Web browser settings,
usually altering the default start (home) and search pages. A browser hijacker can
modify nearly every part of a Web browser, including adding bookmarks and
redirecting your searches to alternate sites.
- 61 -
RAT (Remote Administration Tool) – trojan-type software programs that provide
someone (the attacker) with the ability to remotely control your computer. The
attacker usually has full access, while your computer listens on the Internet for
instructions.
Key Loggers – programs that run in the background, recording all the keyboard
entries (keystrokes) that are made on your computer. Keystrokes are logged, and
then the log is hidden for later retrieval. The log can then be secretly shipped by
email or over the Internet.
Remote Installers – programs that are installed on your computer without your
knowledge. Once installed, they connect to a remote server and download more
programs and files. These new files are then installed on the computer, again without
your knowledge.
Commercial Key Loggers – programs that are installed by someone who has
access to your computer. They are used to explicitly monitor the activity of computer
users. These types of program can be installed so that they remain hidden from
other users. Commercial Key Loggers can be purchased from commercial vendors.
Dialer – software that uses your computer's modem to dial a phone number. Most
dialer programs connect to toll numbers without your awareness or permission,
running up phone charges on your phone bill.
File Sharing Programs, also known as P2P (Peer to Peer) – popular applications.
They are used to share files, such as movies and music, across the Internet. Many
freeware and shareware file sharing programs such as Grokster, Kazaa and
Bearshear bundle adware with their product. Download the product, and you get the
adware. Sometimes they are also bundled with spyware software. Although most file
sharing programs themselves are safe, the adware and spyware programs that come
with them could be dangerous.
Grokster (a popular peer-to-peer file sharing program) installation can lead to the
installation of BullGuard, Cydoor, EBates Moe Money Maker, GAIN, Golden
Retriever, IGetNet, IPinsight, King Solomon's Casino, MyWay Speedbar,
NetPalNow.com, NewtonKnows, Purity Scan, Sidestep, and Webhancer.
iMesh (another file sharing program) includes GAIN, Cydoor, Hotbar, eZula TopText,
New.Net, CommonName, SideStep, NetPal, FavoriteMan, VX2, FlashTrack, and
BonziBuddy.
Silent Download and Execution of Arbitrary Code - This occurs when an already
installed program causes the download and installation of other programs, without
your consent or knowledge. Those other programs are usually spyware or adware.
- 63 -
Is All Spyware Hazardous?
No. Not all threats detected by a spyware scan are hazardous enough for you to
remove. When a spyware scan is complete, a list of any detected threats is displayed.
The first column of the results screen is called Recommended Actions. Based on a
number of factors about each threat, CounterSpy preselects a recommend action. This
is just a suggestion. You can change the recommended action for a threat to any action
you would like taken. In most cases, if a threat is of low risk or has no risk at all,
CounterSpy will display that information next to the threat.
Cookies
The least hazardous of all threats are cookies. A cookie cannot decrease the security of
your computer. In most cases, cookies that are detected as spyware threats are those
that provide cross-site tracking, in order to build profiles about a user and prove more
targeted marketing.
If you are not concerned with cookies, un-check the 'Scan Cookies' option before
running a spyware scan.
File sharing programs
Most file sharing programs are not completely hazardous, however when you install file
sharing programs, like Morpheus, Kazaa, or iMesh, they often install additional spyware
or adware programs onto your computer.
They may or may not tell you that they are doing this; if they do tell you, they will do so in
the license agreement. Unless you read the license agreement carefully, you will have
no way of knowing that additional programs are going to be installed. Because of this,
some P2P file sharing programs are hazardous and some are not hazardous.
CounterSpy attempts to remove any spyware installed by these programs, while not
removing the file sharing programs.
Low risk adware
Generally, if the software EULA (End User License Agreement) is not violated, then
software is generally not considered spyware. In the case of a program like Alexa, which
is detected by CounterSpy as potential spyware, Alexa itself is not spyware, because it
conforms to its license agreement. In fact, Alexa's license agreement is very
straightforward. It describes every point of contact with Alexa's remote servers.
If you run Alexa and it serves a purpose to you, then do not remove it. If you want to be
completely certain that Alexa is not acting as spyware, remove the 'related Links' feature
of the product or remove Alexa completely by using the Windows Add/Remove
Programs feature.
Click Responsibly!
Before spyware can be installed on your computer, you usually have to click on
something. Make this your rule: Do not click anywhere, unless you know it is safe.
Creators of deceptive software use popup ads and dialogs to trick people into
loading their software. For example, you open your browser and up pops a dialog
box. It asks if you want to download software. "Click Yes or No." Do not do it! Do not
click EITHER Yes or No. It is unlikely that clicking "No" might not make the popup go
away. It is more likely that you will help download spyware to your computer.
Here is what to do. Try to close the Web page or dialog by clicking the "X" in the top
right corner of the window. If that does not close the window that asked you to
download something, close your browser. Restarting a browser to continue using the
Internet is better than allowing your computer to be attacked by spyware.
Always delete unsolicited email. Never open them. Unsolicited email is also called
spam. It can use Internet Explorer or your email client to push spyware onto your
computer. Get rid of unsolicited email without reading it when you can; turn off the
preview pane to delete messages without opening them. In Outlook 2003, Tools |
Options, click on the Security tab and select Change Automatic Download Settings.
Make sure "Don't download pictures or other content automatically in HTML email" is
checked. Learn how to use any Junk email filters offered by your email provider.
Your computer can become the target of spyware when you download internet data,
such as utilities, games, toolbars, media players, or other software. Be careful about
installing software directly from Web sites. Read all disclosures, including license
- 65 -
agreements and privacy statements. Read the end-user license agreement (EULA)
carefully, as some EULAs will actually tell you that if you install the program in
question, you have also decided to install some spyware with the software. Check
independent sources as well, as some EULAs will not tell you about spyware.
While they may not be the worst form of spyware, information gathered via cookies
can sometimes be matched with information gathered elsewhere to provide
surprisingly detailed profiles of you and your browsing habits. Learn to use the
options in your browser that allow you to clear the cache and off-line files. That is
where cookies linger. Remember, though, if you dump the cookies, you can no
longer rely on your computer to log you automatically into Web sites. You'll have to
have passwords handy, so gather that information before you start removing those
and all the other cookies that have landed on your computer as a result of your
Internet usage.
Also known as P2P, peer-to-peer, file sharing programs are popular applications.
They are used to share files, such as movies and music, across the Internet. Many
freeware and shareware file sharing programs such as Grokster, Kazaa and
Bearshear bundle adware with their product. Beware! Download the product, and
you get the adware, too.
Although most file sharing programs themselves are safe, the adware and spyware
programs that might come with them could be dangerous. Never download
executables via P2P, because you cannot be certain what it is that you are
downloading. It is a good idea to download only executables from reputable vendors
or well-known and endorsed sites.
- 66 -
run a software or hardware firewall and antivirus application to protect you against
hackers and viruses.
- 69 -
Appendix B: Fight Back! ThreatNet
Join ThreatNet
ThreatNet is a worldwide network of users who report on new spyware outbreaks to
Sunbelt. When CounterSpy’s Active Protection observes an unknown but potential
threat, the user is provided the option of anonymously sending information on the threat
to Sunbelt's Spyware Research Center.
The research center can then identify new threats as they occur, making updates
available to protect users from new spyware.
- 71 -
Appendix C: Common Terms
Common Spyware Terminology and Definitions
• Adware - Any software application in which advertising banners are displayed
while the program is running. Adware can track your online browsing habits and
display ads, based upon your online activities. Web sites often deposit adware
onto your computer. An adware program should be considered spyware when it
is installed without your consent, or if it sends information to unauthorized
parties.
• Anti-spyware software - Software that protects a computer from spyware
infection. Spyware protection software finds and removes spyware without
system interruption.
• Browser Hijacker (or Home Page Hijacker) - A program that can change the
settings in your Internet browser. Most often, this includes your search page
URLs, in order to redirect all Internet searches to a specified pay-per-search site.
Also targeted are your default home page settings, which can be diverted to
another page, often a pornography site.
• Drive-by download - When programs are downloaded without your knowledge
or consent. This is most often accomplished when the user clicks to close or
respond to a random advertisement or dialogue box.
• Firewall - A firewall prevents computers on a network from communicating
directly with external computer systems. Firewalls provide effective protection
against worm infection, but do not protect against spyware like Trojans, which
hide in legitimate applications, and then install secretly onto your computer when
the legitimate application starts. A firewall typically consists of a computer that
acts as a barrier through which all information passing between the networks and
the external systems must travel. Firewall software analyzes information passing
between the two computers, and rejects it if it does not conform to pre-configured
rules.
• Operating System - The operating system is the underlying software that
enables you to interact with your computer. The operating system controls the
computer's storage, communications, and task management functions. Examples
of common operating systems include Microsoft Windows, MS-DOS, MacOS,
and Linux.
• Personally Identifiable Information (PII) - Information such as your name,
address, phone number, credit card information, bank account information, or
social security number.
• Privacy Policy - The responsibilities of an organization that is collecting personal
information, as well as the rights of an individual who provides personal
information. A legitimate organization should explain why information is being
collected, how it will be used, and what steps will be taken to limit improper
disclosure. Individuals should be able to obtain their own data and make
corrections if necessary.
• "Opt-out" - Options presented by spam email. These options are often fake. For
example, if you respond to a request to remove something, you may well be
subjecting yourself to more spam. By responding, the sender knows that your
email account is active. A 2002 study performed by the FTC demonstrated that in
- 72 -
63% of the cases where spam offered a "remove me" option, the option either did
nothing or resulted in more spam email.
• Shareware - Software that is distributed for evaluation without cost. Shareware
usually requires payment to the author for full rights to the software.
• Spam - Unsolicited commercial email. It is often sent in bulk, via "open-relays" to
millions of computer email accounts. It takes a toll on an Internet users' time,
their computer resources, and the resources of Internet Service Providers (ISP).
Most recently, spammers have begun to send advertisements via text message
to cell phones.
• Spyware - Spyware is software that transmits information to a third party, without
notifying you. It is also called malware, trackware, hijackware, scumware,
snoopware or thiefware. Some privacy advocates even call legitimate access
control, filtering, Internet monitoring, password recovery, security, and
surveillance software "Spyware" because those could be used without notifying
you.
- 73 -
Index
Access Icons ...............................................................8 Deleting Quarantined Spyware................................. 23
Access to CounterSpy Features...................................8 Deleting with Secure File Eraser.............................. 44
Actions on Discovered Spyware ...............................20 Dialer ....................................................................... 62
Active Protection.....................................................14 Dialup Connection.................................................. 27
Active Protection.................................................3, 10 Disable Regedit Policy............................................ 36
Active Protection ......................................................24 Disable Schedule ................................................ 21, 23
Active Protection Blocked Items ..............................26 Display Results in Window After Scan .................... 21
Active Protection settings .......................................55 Do Not Display the Scan Progress ........................... 21
ActiveX Installations...............................................35 Do Not Scan for Spyware Cookies........................... 21
Advanced User ........................................................57 Downloaded ActiveX.............................................. 47
Adware................................................................61, 72 Drive-by download ................................................. 72
After Installing............................................................7 Drive-by Download ................................................ 63
Alert Settings ...........................................................56 Email Technical Support ............................................ 5
All Users Startup Folder ...........................................41 Enable Active Protection.................................... 14, 24
Allowed Alerts..........................................................56 File Menu ................................................................ 11
Always Ignore...........................................................20 File Sharing Programs ..................................... 62, 64
Always Run a Deep Scan..........................................21 Firewall ................................................................... 72
Anti-spyware software............................................72 Full System Scan...................................................... 18
AppInit DLLs ..........................................................29 General Settings ....................................................... 57
Application History...................................................43 Getting Help............................................................ 10
Application Monitors..............................................35 Getting Started ......................................................... 12
Application My PC Explorers................................47 Grokster .................................................................. 63
Application Restrictions .........................................39 Hardware Firewall.................................................... 70
Approved Shell Extensions.....................................32 Help ......................................................................... 10
Automatic Update Settings .......................................54 Help Menu .............................................................. 11
Automatic Updates ...........................................10, 58 History Cleaner .................................................... 3, 43
Automatically Quarantine Spyware ..........................21 Host File Protection................................................ 30
Automatically Remove Spyware Cookies.................21 How CounterSpy Works ............................................ 3
Avoiding Spyware ...................................................65 How to Restore a Quarantined Item ......................... 23
Before Installation.....................................................6 Ignore ....................................................................... 20
Beginning User ........................................................57 Ignored Spyware Threats.......................................... 57
BHO Protection.........................................................35 iMesh ....................................................................... 63
BHOs ........................................................................49 Ini File Mapping..................................................... 31
Blocked Alerts ..........................................................56 Installation.................................................................. 6
Blocked Events .........................................................26 Installed Components ............................................ 39
Browser Helper Objects .........................................35 Installing CounterSpy................................................. 6
Browser Hijacker ....................................................72 Intelligent Quick Scan .............................................. 18
Browser Hijackers...............................................39, 61 Internet Applications ................................................ 48
Browser Plug-ins .....................................................61 Internet Explorer BHOs ........................................... 49
Check for Updates ..................................................59 Internet Explorer Details .......................................... 51
Commercial Key Loggers.......................................62 Internet Explorer Explorer Bars ............................... 37
Commercial Product Installation Bundling..........63 Internet Explorer Extensions .................................... 37
Commercial Spyware, Keyloggers and RATs ......63 Internet Explorer Menu Extensions ..................... 37
Common Terms ........................................................72 Internet Explorer Plugins ...................................... 37
Context Menu Handler...........................................30 Internet Explorer Reset Web Settings .................. 37
Control.ini Policy ....................................................30 Internet Explorer Restrictions .............................. 37
Cookies .....................................................................64 Internet Explorer Security ........................................ 36
CounterSpy Features...................................................3 Internet Explorer Security Settings ...................... 36
CounterSpy Home Page ..............................................8 Internet Explorer Security Zones ......................... 37
CounterSpy Installation ..............................................6 Internet Explorer ShellBrowser............................ 38
CounterSpy Menus .................................................11 Internet Explorer Third Party Cookies................ 36
CounterSpy Settings .................................................54 Internet Explorer Toolbars ................................... 38
CounterSpy Startup Options .....................................55 Internet Explorer Trusted Sites ............................ 38
CounterSpy Subscription ..........................................60 Internet Explorer URLs......................................... 38
CounterSpy Toolbar ...............................................11 Internet Explorer WebBrowser ............................ 39
Create Restore Point .................................................21 Internet History ........................................................ 43
Customer Support .......................................................5 Internet Monitors ................................................... 27
Dealing with Spyware Threats ..................................57 Internet Proxy Server ............................................ 28
Deep Scan Folders ....................................................18 Internet Safe Sites................................................... 27
Definition update notifications..................................54 Keeping CounterSpy Current ............................... 68
Keeping your Spyware Definitions Current .........58 Show all history ...................................................... 44
Key Loggers.............................................................62 Show only available history ................................... 44
Last Spyware Scan....................................................9 Silent Download and Execution of Arbitrary Code
Last Spyware Scan Results.......................................9 ............................................................................. 63
Low risk adware......................................................64 Software Firewall ..................................................... 70
Low Risk Adware....................................................62 Software update notifications ................................... 55
LSP Protection ........................................................28 Software Updates ..................................................... 58
LSPs..........................................................................52 Spam........................................................................ 73
Maintaining Protection..............................................65 Spam Zombie Protection ....................................... 28
Manual Updates ......................................................59 Spyware.......................................................... 3, 61, 73
Menu Commands....................................................11 Spyware Defined ...................................................... 61
Misrepresentation of Intention ..............................63 Spyware Definitions ............................................... 10
Misrepresentation of Source ..................................63 Spyware Details ....................19, 48, 49, 50, 51, 52, 53
My PC Checkup ..................................................3, 42 ThreatNet............................................................ 3, 70
My PC Explorers ....................................................46 ThreatNet Privacy Policy....................................... 70
Name Server Protection .........................................28 ThreatNet Settings.................................................... 56
Networking My PC Explorers...................................51 Spyware Installation................................................. 62
Next Scheduled Scan.................................................9 Spyware Quarantine ................................................. 23
Operating System....................................................72 Spyware Scan Options Explained ............................ 21
Opt-out.....................................................................72 Spyware Scan Schedule ........................................... 21
P2P............................................................................62 Spyware Scan Settings ............................................. 57
Peer to Peer ...............................................................62 Spyware Scanning .................................................... 3
Permanently Remove Quarantined Spyware.............23 Spyware Scans ......................................................... 18
Personally Identifiable Information ......................72 StartUp Files........................................................... 40
PII.............................................................................72 Startup options ......................................................... 55
Preparing for Emergencies ....................................69 Startup Programs ...................................................... 49
Print Scan Results .....................................................21 Startup Registry Files ............................................ 41
Privacy ......................................................................43 Stay protected automatically .................................... 54
Privacy Policy..........................................................72 Subscription Details ................................................. 60
Process Execution ...................................................39 System and Tool Updates......................................... 66
Quarantine.................................................................20 System Monitors..................................................... 29
RAT..........................................................................62 System Requirements ................................................. 4
Re-activate item ........................................................26 System Tools ....................................................... 3, 42
Recognizing Spyware Infection..............................64 TCP/IP Parameters ................................................ 28
Recommended Actions .............................................20 Technical Support ...................................................... 5
Remote Installers ....................................................62 Terms ....................................................................... 72
Remove .....................................................................20 Threat Levels............................................................ 20
Remove Quarantined Spyware..................................23 Threat Locations....................................................... 20
Removing Files with Secure File Eraser ...............44 Tightening Security Settings .................................... 42
Removing Files with the Secure File Eraser ...........3 Toolbar.................................................................... 11
Restore Blocked Events ............................................26 Trojan Explorer Protection ................................... 29
Restoring Blocked Items...........................................26 Uninstalling CounterSpy ............................................ 7
Restoring Quarantined Spyware ...............................23 Un-quarantine All Checked Threats ......................... 23
Running Processes ............................................40, 49 Un-quarantine Threat ............................................... 23
Running Protection Monitors ................................14 Update Notifications ................................................ 58
Scan Cookies ............................................................18 Update Schedule....................................................... 21
Scan Memory............................................................18 Updating CounterSpy............................................... 58
Scan Selected Drives.................................................18 Updating Spyware Definitions ................................. 58
Scannings..................................................................18 URL Search Hooks................................................. 41
Scheduling a Custom Spyware Scan.........................21 User Modes .............................................................. 57
Script Blocking........................................................40 User Profile Startup Folder....................................... 41
Script Blocking Active Protection ............................55 User Shell Folders Protection ................................ 33
Secure File Eraser ...............................................3, 44 View a Description of a Threat ................................ 13
Security Patches........................................................67 View Menu .............................................................. 11
Security Settings and System Updates ......................66 Welcome .................................................................... 3
Set a Single Action Option........................................21 What is Spyware?..................................................... 61
Setting Up a Scheduled Scan ....................................21 What to do when Spyware is Discovered ................. 13
Settings .....................................................................54 WiFi Protection ...................................................... 29
Shared Task Scheduler...........................................32 Windows Directory Trojans .................................. 34
Shareware................................................................73 Windows Extensions .............................................. 34
Shell Open Commands .............................................32 Windows Host File................................................... 51
Shell Service Object DelayLoad.............................33 Windows Logon Policies ........................................ 34
Windows Messenger Service ..................................28 Windows Update Website ........................................ 68
Windows Password Protection...............................30 Windows Win.ini File............................................. 34
Windows Protocols .................................................31 Windows XP Firewall Service Pack 2...................... 70
Windows Restrict Anonymous...............................31 Winlogon Shell........................................................ 34
Windows Shell Execute Hooks...............................32 Winlogon Userinit .................................................. 34
Windows Shell Explorer Hooks................................53 Winsock Layered Service Providers ............... 28, 52
Windows System.ini File ........................................33 Working with CounterSpy........................................ 18
Windows Update.......................................................67 WOW Boot Shell .................................................... 35
Windows Update Service........................................30
End User License Agreement
End-User License Agreement for CounterSpy(TM)
Sunbelt Software
End User License Agreement
CounterSpy
This Software Product is protected by intellectual property laws and treaties. The
Software Product is licensed, not sold.
PLEASE CAREFULLY REVIEW THE FOLLOWING TERMS AND CONDITIONS OF
THIS SOFTWARE PRODUCT LICENSE (THE "LICENSE AGREEMENT"). THIS
LICENSE IS A LEGALLY BINDING CONTRACT BETWEEN YOU (THE "LICENSEE")
AND Sunbelt SOFTWARE PRODUCT DISTRIBUTION, INC. ("SUNBELT").
1. INTRODUCTION: The following Software license terms and conditions apply to all of
the Software Product (the "Software Product") that is delivered or downloaded under this
license. If, after reviewing the terms and conditions which follow this paragraph, you do
not wish to be bound by its provisions, do not download the Software Product or, if the
Software Product has been delivered by CD ROM, destroy the CD ROM or return it to
Sunbelt. If the Software Product has already been downloaded then immediately delete
the Software Product. Once the Software Product has been downloaded or accessed all
of the provisions of this License Agreement apply, even if the Software Product is
subsequently deleted or returned. Any use of the Software Product by the Licensee shall
constitute unqualified acceptance of this Agreement.
2. EVALUATION VERSION LICENSE GRANT: If you have downloaded or otherwise
received an evaluation version of the Software Product, you are authorized to use the
Software Product on a royalty-free basis for evaluation purposes only during the initial
evaluation period of generally, thirty (15) days. You have the option to register for full
use of the Software Product at any time during the evaluation period by following the
instructions in the accompanying documentation, including the payment of the required
license fee. Registration will authorize you to use an unlocking key which will convert the
Software Product to full use, in accordance with the terms and conditions provided
below. Your use of the Software Product for any purpose after the expiration of the initial
evaluation period is not authorized. Upon expiration of the limited evaluation period, the
Software Product may automatically disable itself.
3. GRANT OF LICENSE. This Section of the License Agreement describes your general
rights to install and use the Software Product. The license rights described in this
Section are subject to all other terms and conditions of this License Agreement. Any use,
modification, reproduction, release, performance, display or disclosure of the Software
Product shall be governed solely by the terms of this Agreement and shall be prohibited
except to the extent expressly permitted by the terms of this Agreement.
3.1. LICENSE: The Software Product is provided on a non-exclusive, non-transferable
basis, and may not be copied, modified, or enhanced without the advance written
authorization of Sunbelt. The Software Product includes significant elements, including
its organization, algorithms, and logic, which Sunbelt has maintained as confidential
information, which constitute trade secrets of Sunbelt, and which are protected by U.S.
patent and/or copyright law and international treaty. Licensee agrees not to attempt to
disassemble, reverse compile, or reverse engineer the Software Product. The Software
Product under this Agreement is the exclusive property of Sunbelt. This License
Agreement does not grant Licensee any ownership right or title to, or interest in the
Software Product or any part thereof, and Sunbelt retains all such rights, title, and
interest.
3.2. GENERAL LICENSE GRANT TO INSTALL AND USE THE SOFTWARE
PRODUCT. This product is licensed on a per-user basis. You may install and use one
copy of the Software Product on any computer, device, workstation, terminal, or other
digital electronic or analog device ("Device") in your organization, so long as you are the
only user of the software. ANY NETWORK OR OTHER TYPE OF DISTRIBUTED USE
OF THIS SOFTWARE PRODUCT, IS STRICTLY PROHIBITED EXCEPT AS ALLOWED
IN 3.3 BELOW.
3.3. ALTERNATIVE LICENSE GRANT FOR STORAGE/NETWORK USE. As an
alternative to the rights granted in the previous section, you may install a copy of the
Software Product on one storage Device, such as a network server, and allow
individuals within your business or enterprise to access and use the Software Product
from other Devices over a private network, provided that you acquire and dedicate one
license for each individual user.
3.4. RESERVATION OF RIGHTS. All rights not expressly granted under this License
Agreement are reserved by Sunbelt.
4. DISCLAIMER OF WARRANTY: THE SOFTWARE PRODUCT IS PROVIDED "AS IS"
AND WITHOUT WARRANTY EXCEPT AS PROVIDED IN THE FOLLOWING
PARAGRAPH. Sunbelt DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND
WARRANTIES OF NON-INFRINGEMENT AND PERFORMANCE.
5. LIMITED WARRANTY: Sunbelt warrants that the Software Product covered by this
License Agreement will, for a period of thirty (30) days following its installation, operate
in accordance with the specifications found in the manual accompanying the Software
Product.
6. LIMITATION OF LIABILITY: Sunbelt makes no representations or warranties that the
operation of the Software Product will be uninterrupted or error free, or that it will
produce the results desired by the Licensee. Sunbelt does not agree to provide
modifications, enhancements, improvements or bug corrections, even if errors in the
Software Product are reported to Sunbelt. Sunbelt SHALL NOT BE LIABLE FOR ANY
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES
FOR LOSS OR BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, ETC.)
ARISING FROM LICENSEE'S USE, OR THE INABILITY OF LICENSEE TO USE, THE
SOFTWARE PRODUCT, EVEN IF Sunbelt HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
7. LICENSEE REMEDY: If Sunbelt is liable to Licensee for the breach of any of
Sunbelt's obligations under this License Agreement, Licensee's sole and exclusive
remedy shall be, at Sunbelt's option, to either receive a refund for the price Licensee
paid for the use of Sunbelt's Software Product (less any taxes, shipping fees, etc.), or
the repair or replacement of any defective Software Product.
8. LIMITATION ON EXPORTS: Licensee agrees that Licensee will not export or re-
export the Software Product outside of the United States to any individual, business,
third party, or other entity, or to any country subject to United States export restrictions.
Any Licensee who receives the Software Product outside the United States agrees not
to re-export the Software Product except as permitted by laws of the United States.
9. U.S. GOVERNMENT RIGHTS: If you are obtaining Software Product on behalf of any
part of the United States Government, the Software Product shall be deemed
"commercial computer software" and "commercial computer software documentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR 12.212, as applicable.
10. LOSS OF DATA LIMITS AND LIABILITY: Sunbelt and its suppliers do not guarantee
to accuracy of scanning known as spyware scanning. Sunbelt shall not be held liable or
responsible for ANY inaccuracy of the spyware scanning process. This includes but is
not limited to the loss of any data.
11. MISCELLANEOUS: Licensee may make one backup copy for archival purposes only
of the Software Product, provided Licensee agrees not to grant access to such backup
Software Product to any other individual or business entity. Licensee agrees not to alter
or delete any copyright notice which is included with the Software Product. Except as
expressly stated herein, there are no other agreements, understandings between the
parties, or obligations on the part of Sunbelt relative to the Software Product. The laws of
the State of Florida shall apply to the terms of this License Agreement.
12. YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT AND
UNDERSTAND IT, AND THAT BY INSTALLING OR USING THE SOFTWARE
PRODUCT YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. YOU
FURTHER AGREE THAT THIS AGREEMENT IS THE COMPLETE AND EXCLUSIVE
STATEMENT OF THE RIGHTS AND LIABILITIES OF THE PARTIES. THIS
AGREEMENT SUPERSEDES ALL PRIOR ORAL AGREEMENTS, PROPOSALS OR
UNDERSTANDINGS, AND ANY OTHER COMMUNICATIONS BETWEEN US
RELATING TO THE SOFTWARE PRODUCT OR THIS AGREEMENT.
01/18/2005