Spybot Search and Destroy Tutorial |
Overview | [link] |
This is a short tutorial to show you the first steps you have to do to remove spyware and other kinds of malware from your computer, using Spybot-Search and Destroy. |
1. Download | [link] |
![]() The download page first gives you a bit of donation information; if you like the program, I encourage you to come back later and donate something. But right now, you want to download. The downloads are on the same page, just scroll down a few lines and click Spybot-Search and Destroy 1.6.2. On the next page you will see a table with four download locations. Clicking on one of them will lead you to a page offering the download. Each of these pages is a bit different, but you should be able to find the download link there without problems. |
2. Installation | [link] |
![]() After the installation has finished, you will see a Spybot-Search and Destroy button on your desktop and in your start menu. Click on it to start Spybot-Search and Destroy the first time. |
3. First run | [link] |
![]() If you are using a proxy in Internet Explorer, Spybot-Search and Destroy will show you this proxy and a button will give you the opportunity to use it for Spybot-Search and Destroy, too. If the text field is blank, you don't need to do it, but in most cases this will show an internet address, and you should import this proxy setting. The next page deals with updates. It is very important to keep up-to-date. Using the two buttons this page offers will do the updates for you, if you want to do it at a later point, read this. The last page of the wizard will ask you to read the help file. The help file is always a good resource if you are unsure what to do, so please do at least read the first pages of it. |
4. Doing a scan | [link] |
![]() The left side of the program has a navigation bar that can lead you to all functions of the program. The first section there (the top-most button) is labeled Spybot-Search and Destroy and leads you to the main page. Right now, you will see only an empty list and a toolbar at the bottom. The first button in this toolbar is named Check for problems - that is the button you've got to press to start the scanning. Lean back and watch the scan progress. |
5. Interpreting the results | [link] |
![]() For the usage tracks (I hope you have followed that link to read what they are), removal is non-critical, but depends on your personal preferences. Ignoring the usage tracks for now, you should have a look at the red entries which represent the real threats. While you of course can trust us that we have chosen the targets using strict criteria, you can check for yourself if you click on each product and read the product information that will be shown in a pop-up window. |
6. Decision on exceptions | [link] |
All problems displayed in red are regarded as real threats and should be dealt with. But while you read the product description, you may still decide to keep a threat, or just a usage track. Maybe you don't want your list of most recently used Word documents removed? At this point you have three options.
|
7. Removing the threats found | [link] |
So now you should know about everything you've found. It's time to use the Fix selected problems button. Once you start thinking about removing the usage tracks, too, you may think that ticking all the green entries is hard work. This is for a simple reason - to force you, the newbie - to look at the results. Once you know what you are dealing with, there is a hidden Select all button available for you. |
8. Resident | [link] |
If you use Spybot-Search and Destroy's realtime protection against spyware, nasty spies will not enter your system. Currently there are three different kinds of protection.![]() Resident SDHelper is a second layer of protection for IE. Immunize function blocks installers by their ActiveX ID, while SDHelper blocks badware that tries to enter using a different method. Thus Internet Explorer cannot download bad files. You start SDHelper by clicking on Tools → Resident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "SDHelper" (Internet Explorer bad download blocker) active in order to activate SDHelper. ![]()
![]() If you have been installing something and/or if you judge the file that is going to be installed as good because you know its name, you can proceed by allowing the registry change (same thing if you or Spybot-Search and Destroy were deleting an application). But if the message comes out of the blue sky while you were surfing the web, you should get cautious. In this case it is better to deny the registry change. You start Resident TeaTimer by clicking on Tools → Resident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "TeaTimer" (Protection of over-all system settings) active in order to activate TeaTimer. ![]() | |
Download Page: http://www.safer-networking.org/en/download/index.html
Download Spybot-Search and Destroy from a mirror hosted by Safer-Networking | [link] | ||
To avoid confusion often caused by download sites full of advertisements, we provide this service that is dependent upon donations. If you did not already send your donation, please give it a second thought.
|
NP. I like Spybot alot and want to see it grow. You can contribute to its success by sending threats you think it does not detect. Send the file in a zipped folder to: detections@spybot.info
Solution to fix the pop-ups in Spybot's TeaTimer
This fix is from Safer-Networking Ltd.
This is a provisory solution to fix the problem the bug in the pop-ups checkbox buttons
1.- Download "ResHacker" from here
2.- Deactivate the TeaTimer
Go into Spybot > Mode > Advanced Mode > Tools > Resident.
Uncheck the following: Resident "TeaTimer" (Protection of over-all system settings)
3.- Used "ResHacker" to open TeaTimer.exe (Should be in C:\Program Files\Spybot
- Spybot-Search and Destroy).
4.- Press Ctrl+F and searched for the word: decision
You will see this code:
Code:
object cbRemember: TCheckBox
Left = 8
Top = 160
Width = 339
Height = 17
Anchors = [akLeft, akTop, akRight]
Caption = '&Remember this decision.'
TabOrder = 2
end
5.- Change the value "Top" from 160 to 190
6.- Press in "Compile Script" and File > Save
7.- Close the "Resource Hacker" and activate the TeaTimer again
This is the final result:
More information of this bug on Safer-Netowrking's Site:
http://www.safer-networking.
url:http://www.techsupportforum.
~~~~~~~~~~~~~~~~~~~
Angel Services around the world!
Client Security Solutions gifted by
A Joy Light From Within .Org
Computer Weekly Telephone Free Access
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number: 1-218-895-3911
Your Conference Passcode: 62013#
If you have any problems, please don't hesitate contacting me at holinessdavid@alightfromwithin.org
Cheers and Blessings, Holiness David Elder Lavender person alightfromwithin.org Rainbow Warriors of Prophecy
Pray With Elders around the World
Hear Your Relatives Perfect Flowing Hearts
Listen to the Blessed Rainbow Colors of the Four Directions
Learn Warrior Skills with the Peaceful Wisdom Prayer!Listen to the Blessed Rainbow Colors of the Four Directions
Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.