Home
Spy-Emergency.com
Contents
1. Redrose O Deepsea Active language English After the installation process is finished Spy Emergency will launch automatically 3 Program Activation 3 1 Trial Limited Version From the Spy Emergency website you can download the trial version of Spy Emergency After the installation this trial full featured mode will run for 15 days After this period the program will switch to limited mode Many features and options are disabled in limited mode it is recommended to purchase a valid license to switch back to the full featured mode License is valid for purchased time period After license expiration the program will switch back to the limited mode and you should renew your license Valid time period will be visible on the main program screen after synchronization with the license server 3 2 Purchase In the Buy menu select the Buy Now button Default Internet browser will be launched with the registration page 3 3 Registration In the Buy menu select the Enter serial button Registration dialog will show up With purchase of Spy Emergency you have received registration information registration name registration e mail and serial number This information has to be exactly entered into registration dialog Please note that serial number only contains characters A F and numbers bi Spy Emergency Please enter registration information The Productis licensed to Order email Serial number 4 Working with S
2. Vista 64 bit and 32 bit Windows XP 32 bit and Windows 2000 32 bit operating systems 2 Installation Spy Emergency can be installed either from the installation file available on your installation CD or can be downloaded from Spy Emergency website www spy emergency com in download section Latest version is always available on the mentioned website 2 1 Installation from website Visit Spy Emergency website at www spy emergency com go to the Download section of the website and select appropriate Download Now link based on your language preferences Save the installation file to your disk Start the installation by executing double clicking the downloaded setup file 2 2 Installation Process Please note It is recommended that you close all other running applications before starting the installation process including other security applications that might block the installation You have to start installation process under administrator account a Double click on the installation setup file to begin the installation process b Select the preferred installation language and click on OK button Select Setup Language Select the language to use during the installation Te Note This is the language of the installation program You can change the language of the Spy Emergency later on the Skin Languages setup wizard page To change the language after installation right click the system tray icon and s
3. but using common malware behavior inspection Enable extended dynamic heuristics detection this option combines behavioral analysis and analysis in a virtual environment to identify new threats without need of classical signatures This option increase user protection with its pro active functionality and in on demand scans too Enable generic unpacker to unpack compressed executables many executables are compressed by authors to make it harder for antivirus software to detect them generic unpacker tries to uncompress them Enable malware damage repair technology some malware makes user system unusable when it is removed from a system This feature tries to repair damages produced by such malware Enable restore point creation before removal when enabled program will create restore point before removal restore points can be used to revert system to the previous state Enable rootkit detection rootkits are processes that try to hide itself from the user and detection techniques Perform host scan scans and removes ip addresses added by malware from the system host file Terminate running processes terminates malware processes before its removal this ensures better removal function Automatically restore home page editation some malware blocks home page editation this function enables editation again Note Internet Explorer only Protect browser signature modifies your browsers name signature so the remote server
4. does not know your real browser name This makes it harder to perform specifics attacks to your system Note some browsers and sites may not work properly with this options turned on Analyze compressed files when enabled Spy Emergency will scan inside compressed archives like zip rar Analyze Alternate Data Streams ADS when enabled Spy Emergency will scan ADS streams on NTFS volumes Anti Spam Tab a Spy Emergency Spy Emergency Active shields Miscellaneous An Spam Anti Spam Status Enable anti spam and malware e mail protection Scan m Add signature to every checked e mail Filtering proxy server ports POP3 IMAP POP3 SSL IMAP SSL Remov a 6211 6212 8213 8214 A The Cage Disable automatic redirection for the following processes Options Friends Enemies list aie o News Delete About a Support NETGATE TECHNOLOGIES Enable anti spam and malware e mail protection this feature checks every incoming e mail for malware and spam Add signature to every checked e mail when enabled Spy Emergency will add header to the end of each e mail notifying user that the mail was checked Filtering proxy server ports POP3 IMAP POP3 SSL IMAP SSL filtering proxy server is a proxy server that listen at specific ports and inspects every e mail for malware and spam To change filtering proxy ports change individual input fields Only experienced users should modify these settings Note s
5. NETGATE TECHNOLOGIES Enter serial by pressing this button user has the option to enter registration information the registration dialog will popup Buy Now by pressing this button your default browser windows will be shown and the online shop web page will be displayed allowing purchasing the product 5 9 Technical support The Technical support dialog allows users to send e mail message to the Spy Emergency technical support team To send a message fill in email name and description and press the Submit button to send the message User can additionally add attachment by pressing the button Spy Emergency Support New virus reporting If you have unknown virus or Suspicious Analyzer Tool application please run Analyzer Tool and send us the output log file Status The Spy Emergency Technical Support service is here to help you in problematic situations Scan Please contact our technical support team using this form Remove Your email The Cage re Your name Options Problem description Keep List _ attachment y About All fields marked with are required Please ensure that you are connected to the Internet before submitting If you submitting bigger log file please be patient while uploading Support Log File NETGATE TECHNOLOGIES Analyzer Tool this button will run the Analyzer Tool utility Log File this button will show windows with all generated log files 6 Anti Spam and Anti M
6. Spy Emergency Anti Spyware Anti Virus Anti Spam User Manual Document version 1 6 EN 15 9 2009 Copyright c 2007 2009 NETGATE Technologies s r o All rights reserved This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org This product uses compression library zlib Copyright C 1995 1998 Jean loup Gailly and Mark Adler This product uses cpulib library licensed under LGPL available at http cpulib sourceforge net All other trademarks are property of their respective owners Content E ANTRO UI CUOTA NS NE REESE NRE RIO ROE RTE Baer Ae nC OE Pe fer R E 3 1 1 Basic Protection GOMCE DES catamarca ade dsc 3 Dees Ass A E SAYA AA ts So sia awison uated eaae ua Beto cota ERS 3 12 AUS IN AIO Updates nese DI OS 3 is Demand SCAN erat ar 3 Did Ah SCME A Ane o A A A 3 1 1 5 Malware REMO di ea 3 TAO MEAT a AA TN E EAS 3 1 2 Detection Technologies ooooooincnnnnnonnnonnncnnnnnncnnonncnnonacnnononn corona ronca corona onaonoonaranos 4 1 3 Supported Operating SysteMS oococcionononononanncnnonncnnonacnnonananonnononannonaonconaonconaranos 4 DZ x Installation porerna a n ao 4 2 1 Installation from website tad AA A eso 4 2 2 Installation PPOCSSSinircctsatescteitesathesereceludsard dabsiceineraatucoletheolsusssaaeontestonsalseloiesolabanants 4 3 Program A a aA tise OTO 9 3 1 T ial Limited WRI OM s s iarna AR R eas easaas 9 3 2 PUA GENS assed is
7. alware Proxy Anti Spam feature of the Spy Emergency allows users to identify unwanted spam messages Note that not all spam e mail messages can be detected and some e mail messages could be incorrectly marked as spam Anti Spam and anti malware filtering engine is independent of any e mail client and should work with any POP3 and IMAP servers with or without SSL support Every message detected as spam is marked in the subject of the checked e mail with SPAM keyword There is extra support for Outlook Express and Windows Mail that allows automatic moving such marked messages to Inbox spam folder Users of other clients should create message rules for such functionality Note System need to be restarted after Spy Emergency installation to enable spam moving feature under Windows Vista Available Anti Spam settings are described in the Option section of this manual Spy Emergency use Bayesian method for detecting new spam and signature scanning methods Together with anti spam feature anti malware filtering of incoming e mails is enabled too E mails containing malware in an attachment or suspicious attachment are marked with warning and infected files are renamed By default programs connecting to common e mails ports are redirected to the proxy The proxy can be accessed as any other server manually using the following configuration POP3 proxy server 127 0 0 1 port 8211 login login server 110 password password IMAP p
8. ats 1 1 2 Automatic Updates Every day new spyware malware and spam is created that may be possible threat for your computer It is recommended to allow automatic updates to be turned on to receive regular updates on new threats for your better protection 1 1 3 Demand Scanner Demand scanner allows users to manually scan for malware that was installed prior Spy Emergency installation or is not activated on your computer 1 1 4 Scheduling Scan scheduling is convenient feature that simplifies scanning of your computer Selected scans are performed based on your personal settings at specified regular time 1 1 5 Malware Removal It is important to note that some but not all malware or spyware can be removed from your computer 1 1 6 The Cage Part of the removal process is the backup of malware in the Cage It is place where malware is safely stored and encrypted in inactive state so it cannot harm your computer 1 2 Detection Technologies Spy Emergency uses the following technologies to detect malware and spam e Signature scanning searching for specific signatures that are characteristic to individual malware located at different places including files and registry keys e Heuristic analysis identifies malware based on its common behavior e Bayesian analysis identifies spam messages based on probability 1 3 Supported Operating Systems Spy Emergency is compatible with Windows 7 64 bit and 32 bit Windows
9. e 21 Scan I the Cage Protection Status Web protection On Memory protection Objects scanned 2453 Objects scanned Options Keep List Objects infected 0 Objects infected News Automatic updates On i anti spam protection Last update 2009 02 20 Messages scanned Update Now About Messages infected Support Spam messages NETGATE TECHNOLOGIES Last performed scan shows the date when last system scan was performed Active scan type allows switching between Standard and Deep scan types Standard scan is faster than Deep scan it checks only common file extension for malware and use level 1 heuristics analysis Deep scan is more precise scan it checks files based on its content than on file extension and use level 2 heuristics analysis Level 2 heuristics take longer by may bring in some cases better results Standard scan is the default settings and is sufficient for malware detection in most cases Total malware detected shows total count of malware detected this count can be reset by pressing the Reset button Files in the cage shows total count of malware in the cage to show the content of the cage press the button Show Scan Now this button starts system scanning View logs shows log files generated by Spy Emergency Object scanned shows the count of checked items Object infected shows the count of infected items Web protection shows the status of the web shield and anti phishin
10. eld blocks access to malware Internet locations Spyware Communication shield blocks malware communication to the Internet Browser Helper Object shield blocks malware BHO elements Note Internet Explorer only Startup Programs shield blocks malware from setting up itself at system startup launch Trusted sites shield blocks malware from adding trusted sites items Note Internet Explorer only Windows logon shield blocks malware from setting up itself to be launched together with winlogon process at system startup launch Home page shield notifies user about home page modification and allows changing the homepage to the previous settings Note Internet Explorer Mozilla Firefox Opera only To modify home page of the browser users should modify input boxes near to the browser names and press the Update button Database Tab gt Spy Emergency Spy Emergency Active shields Miscellaneous Automatic updates Status 3 m Database Update Now Scan Anti Spam database Update interval 60 min pana m News O Hide update window during updates The Cage Proxy Options J Host Login Keep List 3i Port Password ae be About Support NETGATE TECHNOLOGIES Automatic updates this function allows user to automatically update signature databases When allowed by checking Database Anti Spam database and or News Spy Emergency will check for new signatures at program startup and at regular interval
11. elect the Options menu Select from Active Language menu your preferred language and press the Apply button c When setup begins click on Next to view the License Agreement dialog Click on I accept the agreement to accept Spy Emergency License Agreements terms and conditions 3 Setup Spy Emergency License Agreement Please read the following important information before continuing Please read the following License Agreement You must accept the terms of this agreement before continuing with the installation Spy Emergency License Agreement Please read the terms and conditions of this license agreement License before installing Spy Emergency Software By installing and using the Software you accept and agree to the terms of this License This License constitutes the entire agreement concerning the Software between You and NETGATE Technologies s r o with its seat at Tajowskeho 8 971 01 Prievidza Slovak Republic registered in the Commercial Register of the District Court Trencin Section Sro Insertion No 17325 R BIN 36 710 881 If you do not agree with these terms and conditions A e The bones Mr id accept the agreement O do not accept the agreement d Choose the destination folder for the installation and then click on Next button Setup Spy Emergency Select Destination Location Where should Spy Emergency be installed O Setup will install Spy Emergency into the following folder To c
12. g shield Memory protection shows the status of the memory shield Anti Spam protection shows the status of the anti spam protection Messages scanned shows the count of checked messages for malware and spam Messages infected shows the count of the messages that contains malware Spam messages shows the count of the messages that were classified as spam Automatic updates shows the status of the automatic updates It is recommended to have this option turned on Last update shows the date when the check for update was lastly performed 5 2 Scanner The scanner dialog is the place where the scanning engine can be controlled ina convenient way This dialog can be accessed by pressing Scan in the left menu a a Spy Emergency License valid until 2011 02 21 Status R f Scan Quick Scan System Scan Full Scan Custom Scan Remove The Cayo Signatures in database 1428043 Ak No infections in the list Processes scanned 0 gt 4 Press the Start button Options i Registry items scanned 0 amp To start new scan nee Cookies scanned 0 News Files scanned 0 J Infections found 0 0 About 3 Elapsed time 00 00 Support Current location Not active NETGATE TECHNOLOGIES Quick Scan fast scan of system memory registry and cookies for malware System Scan scans system memory registry cookies and Windows directory for malware Full Scan scans system memory registry cookies and whole
13. he Cage is the place where all removed infections are kept ba a Spy Emergency The Cage This list contains all removed infections Use Delete Forever to remove it permanently Restore to bring infections back to life Status O A vana a Low B amp Trojan win32 vundo a High amp Virus win32 Asorl m High O amp virus Win32 MSWord a High The Cage DF amp Trojan Win32 Emcodec F a High 4 Rapidantivirus E Low O Ak MsAntispyware2009 a Low C amp Trojan win32 Agent mt High O Ak Virus Win32 MSExcel ma High News O Ak Trojan Win32 AutoRun A High Scan Remove Options Keep List About Support Select all Deselect all Delete forever NETGATE TECHNOLOGIES Select all selects all items in the list Deselect all deselects all items in the list Delete forever infections will be totally removed from the system and cannot be restored again Restore restores items to the previous place Note Under Windows Vista confirmation dialog will popup You have to allow this action to successfully restore delete forever selected items 5 5 Options The Options dialog allows configuration of individual functions of Spy Emergency Spy Emergency Tab gt Spy Emergency Spy Emergency Active shields Miscellaneous Anti Spam 1 Schedulina Status Type of scan O Thursday O Memory O mae O Registry O saturday O cookies O Enable O iS on O Monday Scan at Remove O Tue
14. llation folder Command line utility takes one file argument Syntax is SpyEmergencyCmd exe lt filename gt cx C WINDOWS system32 cmd exe c Program Files NETGATE Spy Emergency gt spyemergencycmd Spy Emergency Command Line Scanner Build 7 6 195 6 2669 67 07 Copyright lt c gt 2007 2009 NETGATE Technologies s r o All rights reserved File Parameter required Syntax spyemergencycmd lt file gt c Program Files NETGATE Spy Emergency gt spyemergencycmd suchost exe vir Spy Emergency Command Line Scanner Build 7 6 195 6 2669 67 67 Copyright lt c gt 2007 2009 NETGATE Technologies s r o All rights reserved Scan results Scan took 1667935 microseconds c Program FilesNNETGATENS Emergenc y gt 10 Shell extension Shell extension is a handy way to scan specific files or folders by right clicking on selected item in windows explorer window or in any file manager that support it When popup is shown press the Scan with Spy Emergency option 11 Technical support Technical support team can be reached at support netgate sk All other questions regarding sales or general information questions please direct to netgate netgate sk
15. ontinue click Next If you would like to select a different folder click Browse C Program Files NETGATE S py Emergency At least 168 6 MB of free disk space is required e Select the Start Menu folder where the program s shortcuts will be located Click on Next to continue 3 Setup Spy Emergency Select Start Menu Folder Where should Setup place the program s shortcuts _ HH Setup will create the program s shortcuts in the following Start Menu folder To continue click Next If you would like to select a different folder click Browse Sey Eme f Check the additional tasks that should be performed It is recommended to check all options Click on Next to continue gt Setup Spy Emergency Select Additional Tasks Which additional tasks should be performed Select the additional tasks you would like Setup to perform while installing Spy Emergency then click Next Additional icons Create a desktop icon Create a Quick Launch icon g To complete the installation process click on Finish You can check individual options that will be performed during finalization process It is recommended to check all options h If you have selected skin selection in the previous step Spy Emergency Language and Skin wizard will be shown Select preferred skin and language that matches your individual taste 5 Spy Emergency Skin Languages Skin Languages Active skin Default
16. ormation about signature database additions updates News is downloaded together with signature database updates a Spy Emergency News Spy Emergency Status Current Version 2008 build 5 0 605 Spyware Database Scan Version 472 S Release 2009 02 20 The Cage Important Threats New Updated Options PrivacyguardPro gt Anti virus 1 Keep List MalwareDoctor News P j r e Trojan GameThief Win32 Lmir About Trojan Win32 Feedel Adwarefree Support Totally 2414 additions updates NETGATE TECHNOLOGIES 5 8 Buy About In the trial version this dialog shows Spy Emergency features in the registered version this dialog shows information about registered user and database information After registration the Buy button will change to About button after next program start a Spy Emergency Spy Emergency What will purchase of Spy Emergency brings you Status Protection against latest spyware malware adware and viruses aa Regular high speed updates of infection database Remove Intuitive and clear user interface for malware removal Anti spam and phishing protection The Cage p p 9p J Real time protection against known and unknown threats Options Premium technical support Keep List And much more News To visit our online shop now please press the Buy Now button or navigate your web browser to http Awww netgate sk order index php product 1 About Buy Now Support
17. pam Active shields Memory shield E active O inactive o Cookie shield m Active O Inactive Alternate Data Stream shield m Active O Inactive Remove IE Search Page shield m Active O Inactive 4z ActiveX shield E Active O inactive H The Cage Web and Anti Phishing shield m Active O Inactive Spyware Communication shield m Active O Inactive ain Browser Helper Object shield E Active O inactive Keep List Startup Programs shield m Active O Inactive Trusted Sites shield E active O inactive News Windows Logon shield Active O Inactive J Home page shield m Active O Inactive About 2 m Internet Explorer http www google com e m Mozilla Firefox http www google sk 2 m Opera Browser http portal opera com startt Support NETGATE TECHNOLOGIES Memory shield scans every starting process for possible threat When threat is detected user notified and can select appropriate action If automatically remove with backup option is selected item is removed to the cage without user confirmation Cookie shield removes tracking cookies in real time Note Internet Explorer cookies only Alternate Data Stream shield blocks processes starting from ADS streams Note Memory shield have to be enabled IE Search Page shield protects web browser search page settings Note Internet Explorer only Active X shield blocks malware active X elements Note Internet Explorer only Web and Anti Phishing shi
18. py Emergency After you have successfully installed Spy Emergency on your computer the Spy Emergency icon will appear on your desktop Double clicking the icon will launch the Spy Emergency This interface allows you to configure individual aspects of the application 4 1 System tray icon Once the application is started you can see a small orange black icon in the system tray indicating that the application is running By right clicking on the tray icon a context menu will popup Spy Emergency Start Scan Options News Enable Home Page Shields Enable Memory Shields Enable Tracking Cookies Shields Load at Startup About i Close The following options are available Spy Emergency click this option to hide or show the main application screen Start Scan this option will automatically start scanning of your system Options this option will open application configuration dialog News this option will open news dialog Enable Home Page Shields by checking this option Spy Emergency will protect your web browser homepage and notify you about its change Enable Memory Shields by checking this option Spy Emergency check every program for malware before it is executed Enable Tracking Cookies Shields by checking this option Spy Emergency will check created cookies for tracking cookies and remove it in real time Internet Explorer only Load at Startup by checking this option Spy Emergency will be la
19. roxy server 127 0 0 1 port 8212 login login server 143 password password POP3 SSL proxy server 127 0 0 1 port 8213 login login server 995 password password IMAP SSL proxy server 127 0 0 1 port 8214 login login server 993 password password 7 Analyzer Tool Analyzer Tool is a simple tool to report log files from your system These files help to isolate undetected malware problems at Spy Emergency research center After execution this utility will start automatically the logging process When the process is finished the send dialog will show up To send the log file uses should fill in the e mail address and problem description fields and press the Send button Spy Emergency Analyzer Tool SA Action About Start Analysis Stop Analysis Send LogFile View LogFile _ Fix Checked Status 2 Welcome to Spy Emergency ae B3 SA If you have pral with ee e NCEA and new spyware adua sted lao Spy Emergency Res send you a report of isd Spy Emergency from Contact The Spy Emergency Research Center Spy Emergency Analyzer will now send a generated log file to the Spy Emergency Research Center The Research Team will analyze it and send Check you a report of new potentially unwanted software on Your PC Checks _ Running Proce bd7fb09 O Y Used Modules Your e mail bb5cbffc C Running Proce f12b1781 O Used Module
20. s Problem description bbScbffc C Used Modules dibeaa O Y Used Modules 00ef9c3 C Used Modules 3d21b3t O Used Modules 9da47be O Used Modules aDf9ca O Used Modules b40990 lt O Used Modules 74d66b2 m PRA I lead Madiilas DAMIAN Consta 2A ent M1 dll 2ahRRfa 8 Signature Updates New malware threats and spam is continually being created and spread very quickly It is recommended that Spy Emergency is updated on a regular basis to protect you against all new threats Di a Spy Emergency Update status progress Downloaded 0 25 kB 0 00 kB sec Checking database integrity OK m Checking anti spam database integrity OK E Signature database information m Installed version 472 current version 472 E Signatures are up to date E Anti Spam database information m Installed version 208 current version 208 Signatures are up to date Automatic updates allows user to automatically update signature databases When enabled Spy Emergency will check for new signatures at program startup and at regular interval specified by the update interval value To update manually press the Update Now button in the Status dialog Spy Emergency use incremental updates to minimize download times and speed up update process 9 Command line interface Command line interface allows user to scan files for threats from the command line Command line utility is located in the Spy Emergency insta
21. sday 8 00 Scan Wednesday The Cage O O Storage Startup O ts Fixing Keep List m Run at Windows startup Options O Update database on program startup ews Disable on access file system protection ones Skin Lanquaqges 22 Support Active skin Default Active language English NETGATE TECHNOLOGIES Scheduling scheduling allows users to run specified system scan periodically To enable scheduling check the Enable button select hour check the day and type of the scan LSP Fixing repairs damaged LSP stack by malware at program startup Note you have to run Spy Emergency as administrator under Windows Vista to perform this action Run at Windows startup Spy Emergency will be launched at system startup Update database on program startup program will check for new database updates when it is started This option will not affect automatic database updates Disable on access file system protection this option disables on access scanning of files when opened or closed by the operating system This option does not disable on exec protection when memory shields are enabled Active skin skins change the look of buttons and menus of the program active skin is the currently selected skin Active language is the currently selected language To apply changed skin and language settings press the Apply button Active shields Tab Spy Emergency Spy Emergency Active shields Miscellaneous Anti S
22. specified by the update interval value To update manually press the Update Now button Hide update window during updates when this option is enabled the update window is not visible and the user is notified at the end of update process by system tray balloon only Proxy if the user use a proxy server to connect to the Internet then it will be necessary to specify the proxy server settings so that Spy Emergency can access the Internet for updates Note If you do not use a proxy server connection then do not modify these settings Host enter the hostname for the connection Port enter the port number for the connection Proxy Type select the type of connection HTTP Socks5S for the proxy server Login enter the login name for the proxy connection Password enter the password for the proxy connection To apply the proxy settings press the Update button Miscellaneous Tab ba a Spy Emergency Spy Emergency Active shields Miscellaneous TETT Site Identity Verifier Status Enable Site Identity Verifier s IE Search Page Settinas Remove Search Page http www microsoft comisapifredir dll prd ietjar iesearch Default_Page_URL http www microsoft comfisapi redir dil prd ie amp pver b amp ar m The Cage Default_Search_URL http iww microsoft comfisapi redir dil prd ie amp ar iesearch Options Local Page c windows system32 blank htm SearchAssistant http fie search msn com SUB_RFC1766 srchas
23. st srchasst ht Kapp CustomizeSearch http sie search msn com SUB_RFC1766 srchasst srchcust ht News Tools Clean Temporary files directory Clean Temporary IE directory Run Analyzer Tool to report unknown malware About Support NETGATE TECHNOLOGIES Enable Site Identity Verifier this option performs check of active sites against trusted and phishing malware sites database and displays information warning accordingly to it Trusted sites are reported once per internet browser sessions and may be used to ensure user is visiting correct site for example before performing internet banking Note The stated functionality is supported for Internet Explorer with disabled protected mode under Windows Vista Mozilla Firefox and Opera browsers only IE Search page settings these Internet Explorer values are protected when IE Search Page shield is active Edit individual values to your preference Only experienced users should modify these settings Clear Temporary files directory to remove all files from the local user temporary directory press the Clean button This directory contains temporary files created by applications Clear Temporary IE directory to remove all files from the local user Internet Explorer browser cache press the Clean button This directory contains web pages cache and files saved by the Internet Explorer Run Analyzer Tool to report unknown malware Analyzer Tool is a simple tool to repor
24. system disc in deep mode for malware Custom Scan switches program to custom mode where options listed bellow can be customized Scan memory on your system if this item is checked program will scan memory for malware Scan registry on your system if this item is checked program will scan registry for malware Scan cookies on your system if this item is checked program will scan cookies for tracking cookies Scan drives on your system if this item is checked program will scan files for malware To check only specific system drives use checkboxes near drive names in the top right side of this dialog Custom location can be added by clicking on Add custom path item Signatures in database shows the total count of detection signatures in the database Processes scanned shows the count of scanned process in memory Registry items scanned shows the count of scanned registry keys Cookies scanned shows the count of scanned cookies Files scanned shows the count of scanned files Infections found shows the total count of detected infections The first number is the total count of different families detected during scan the second number separated by slash is the total number of traces detected during scan Elapsed time shows the time since the start of the system scan Start pressing this button will start the system scan Pause pressing this button will cause the system scan to pause Next pressing
25. t log files from your system These files help to isolate undetected malware problems at Spy Emergency research center To run this utility press the Run button Engine Tab a Spy Emergency Spy Emergency Active shields Miscellaneous Anti Spam Engine Status a Active scan type O Standard m Deep Scan Default action for detected infections 3 m Ask user O Automatically remove with backup ci m Enable heuristic detection to detect unknown malware m Enable extended dynamic heuristic detection Enable generic unpacker to unpack compressed executables Options m Enable malware damage repair technology am The Cage i O Enable restore point creation before removal Keep List O Enable rootkit detection a m Perform host scan senti O Terminate running processes Automatically restore home page editation O Protect browser signature i Support Analyze compressed files O Analyze Alternate Data Streams ADS About NETGATE TECHNOLOGIES Active scan type allows switching between Standard and Deep scan types Default action for detected infections default action performed when infection is detected Ask user user is notified and have the option to choose appropriate action Automatically remove with backup infection is moved to the cage without user confirmation Enable heuristics detection to detect unknown malware heuristics detection allows to detect unknown malware not in the program database
26. this button will guide user to the removal wizard dialog This button is enabled when there are detected infections only Malware detected during scan is listed above the Start Pause Next buttons in the detected infections list Current location this field shows actual file or registry being checked or action being performed 5 3 Removal The removal dialog allows removal of all detected infections This dialog can be accessed by pressing Remove in the left menu This dialog is available only after some infections have been detected e Spy Emergency Select infections to remove software will be hold in the cage for later restore Status q m 4 amp PCSecureSystem Low O Action Remove Scan Remove The Cage Options Keep List News F About Select all Deselect all I Gio Support NETGATE TECHNOLOGIES Select all selects all items in the list Deselect all deselects all items in the list Details show information about detected item To Keep List selected items will be added to the keep list this infection will be ignored in the next scan Remove removes selected infections Action default action recommended by the program Only experienced user should modify these settings Ignore item will be ignored and not removed Remove item will be removed Note Under Windows Vista confirmation dialog will popup You have to allow this action to successfully remove selected items 5 4 The Cage T
27. ton top left allows you to minimize application windows to the system tray Maximize Restore top right button allow you to maximize application window to the maximum width and height of your desktop and restore it to the previous size Help bottom left button displays help information about currently open dialog Information bottom right button will show about dialog Spy Emergency Help x This window is the core of Spy Emergency search engine To begin scan press the Start button To break the scan press the Stop button If you would like to pause the scan press the Pause button To continue press the Resume button Using checkboxes you can enable or disable scans depending on your preference To enable scan set checkbox to active state To disable it set checkbox to inactive state All scans are enabled by default To customize storage scan you can check or uncheck individual drives All functions are available through right mouse click on selected item too To continue with removal process press Next button ARNO IMIECIONS immense a car 5 Application Interface 5 1 Status The status dialog allows fast access to the common program function and shows statistics information about individual components gt Spy Emergency Status System Status Status Last performed scan 2009 02 22 Active scan type O Standard m Deep Total malware detected 163455 Remove Files in the cag
28. unched every time your Windows operating system is started About this option will show application about dialog Close this option will quit the application 4 2 Memory Shields Spy Emergency resident memory shields protect your computer against malware that tries to run on your computer It checks every program that is starting up for malware It is recommended to have memory shields turned on The status of the memory shields can be easily seen by pointing on program icon in the system tray When a suspicious process is detected the memory shields will notify you about the possible threat and offer you options on how to proceed with the detected file bi Spy Emergency Warning Detected infection Infection name Worm Win32 Jeefo File location c program files postcard exe Infection type Worm Description Software that attacks user machine usually from e mails or other system vulnerabilities containing s To Keep List This dialog offers the following actions Remove removes detected file from the system To Keep List adds this threat to the Keep List Software on the Keep List will next time ignored and the user will be not notified about its presence Run scan system scan will be initiated to find all possible threat in the user system Cloase dialog will be closed without any action 4 3 Window handling icons There are four icons at the right top corner of the program interface Minimize but
29. usar lali 10 33 FRE GISELE A cs 10 4 Working with Spy Emergency c cc cccccccscscescescescescescsecseesscsecsecsecseeaseeesssseeeeseeseeass 11 AL System tray ICON eriin e E Aa a aac eae 11 4 2 Memory A A A 12 4 3 Window handling ICONS Uan 12 5 Application INEA ld 13 Dl gt N A D EA E EA os Ope e 13 AS ln A a N eas a aa 15 573 REMO Vicio 17 5 4a A A E 18 5 5 OPIO Sunbird id deis dla 18 BO ICI IS Ec oes Pac E AE E EEA T 26 Did INO WS ias 27 Pye BUVADOUE z ta NO 27 5 9 Technical SUpport a ra dai 28 6 Anti Spam and Anti Malware Proxy cooooocccccccccccocccicononccncononacononanononaonarnnonoranononacinonas 29 Te Analyzer Tool SOSA cover A RO ROR A OE A 31 Ge Sig ature Updates orina Si A 31 9 Command line INteracS cad ad 32 10 Shell extension A A e AN 33 Tide Technical SUD ads 33 1 Introduction This user manual introduces overview of all features and technologies provided by Spy Emergency 1 1 Basic Protection Concepts 1 1 1 Prevention Most threats today come from web sites emails or as content with other installed software Users should take care when visiting suspicious site do not open e mail attachments about its content are not sure and be careful when installing new software Spy Emergency scans web site URLs that may contain possible threats scans your e mail attachments for malware malicious software scan and classify your e mails for spam and scans programs before they are executed for possible thre
30. ystem need to be restarted to apply these changes Disable automatic redirection for the following processes by default all POP3 and IMAP traffic is redirected to filtering proxy To exclude some processes from this redirection enter process name into input field Only experienced users should modify these settings Friends Enemies list this list contains e mail addresses that should be specially handled E Mails added as Friend are never marked as spam e mails added as Enemy are always marked as spam To add new e mail use Add button to delete e mail from the list use the Delete button 5 6 Keep List The Keep List is the list of all software infections that should be ignored by the system scan Items on this list will be ignored by all type of scans and memory shields gt Spy Emergency Keep list holds all software you would like to exclude from the system scan Status Bearshare P2P Ps ares P2P Grokster P2P Remove kazaa P2P Dkazoom P2P Morpheus P2P overnet P2P Red Swoosh P2P Keep List Desh P2P T Dswaptor P2P pons Dxolox P2P Kazaa download accelerator warez P2P Select all Deselect all The Cage Options About Support NETGATE TECHNOLOGIES Select all selects all items in the list Deselect all deselects all items in the list Remove removes item from the list Low Low Low Low Low Low Low Low Low Low Low Low Low a 5 7 News The News dialog shows latest inf
Download Pdf Manuals
Related Search
Spy Emergency.com spy emergency spy emergency free spy emergency 2024-27.0.0.1
Related Contents
VF Ceramic Heat Service Manual Samsung SGH-N100GA Manual de Usuario Guide pratique WIFI TERRITORIAL BOURGOGNE Manual - Cordland Serviceport.se Bedienungsanleitung TE265 (pdf, 1,17MB, deutsch, englisch) USER'S MANUAL GUIA DO USUÁRIO Fonte de Alimentação CC Programável Modelo DVP505A Quel sont vos risques de cancer du sein? (Document PDF Copyright © All rights reserved.
Failed to retrieve file