How Sunbelt Counterspy Works
Computers & Technology → Site Security
- Author Ben Sikes
- Published May 2, 2006
- Word count 502
With spyware running rampant on PCs across the planet, a good spyware defense system is required. Well worth a look is Sunbelt's CounterSpy.
Originally owned by Giant Software then acquired by Microsoft, the old CounterSpy has mutated into Microsoft's spyware program. Sunbelt, on their part, developed what has become the new CounterSpy into something quite different. However, terms of the agreement are good news for Sunbelt – as well as their own researchers, they have the benefit of using Microsoft's research too.
CounterSpy comes in two versions, plain and Enterprise. Both editions of are highly effective and functional spyware eliminators - PC World recently gave CounterSpy a "Best Buy" award for detecting the most spyware out of products tested. So, what does it do?
• Active Protection monitors in real-time for spyware. Alerts to the presence of suspicious files and allows choice of whether to delete or quarantine
• AutoUpdater keeps spyware definitions up to date. Can be programmed to update at set times
• ThreatNet is the CounterSpy user network, reporting the latest spyware discovered. If CounterSpy recognizes potential spyware, details can be anonymously sent to CounterSpy researchers to get a fix out quickly
• Includes an Internet history cleaner to remove all traces of surfing history
• Secure file eraser completely wipes out any file that needs destroying beyond recovery
CounterSpy sports a pleasant, simple to use interface, on first look rather like a browser. Bold buttons indicating the different settings are laid out along the top of the window, with clear, easy to digest information below.
It also boasts PC Explorer for viewing and modifying settings that are usually difficult to amend, such as the Browser Helper Objects installed in Internet Explorer, what Windows startup processes are installed and what programs might be affecting the Internet connection.
PC Checkup will scan the computer's security settings and suggests where security might be improved. Active Protection is fully customizable in determining what kind of threat it should look for, for example, the ActiveX monitor could be switched on or off.
Spyware scan results are presented in list form with an option to quarantine, remove or keep each item found. Selecting an item provides a detailed description of what it is to aid the decision – provided that the information has been added to the CounterSpy database.
Bizarrely, CounterSpy supports more versions of Windows than the Microsoft product, being compatible from Windows 98 SE (not Windows 98) and ME onwards. Minimum specifications are:
• IBM Compatible 300MHZ PC
• 64MB of RAM
• 24MB hard disk space
• Windows 98SE/ME/2000/SP2+/NT4 SP 6a/ and Windows XP
• 2x CDROM for CD option
• Internet Explorer 5.0
• The Admin console of Enterprise edition requires .NET Framework 1.1, Windows 2003 Server/Windows XP Professional/Windows 2000 Server SP3/Windows 2000 Professional SP2
A free download of CounterSpy is available for evaluation purposes. It comes with a twelve month upgrade subscription upon purchase and further annual subscriptions are available after expiry. The full versions of the program are downloadable (at approximately 14MB in size), or, in the US, can be ordered on CD.
Ben Sikes recommends reading the full product review of Sunbelt CounterSpy at Identity Theft Spy. See http://www.identitytheftspy.com/2006/02/sunbelt_counter.html for more information.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- A Brief Guide: The A-Z of Tailgating Attacks
- Essential Tips for Proofreading and Editing University Assignments
- Stop the Bleeding
- Top 10 Digital Forensics Tools: An In-Depth Exploration
- All You Need To Know To Secure Your Data From Phishing
- Crypto Security Guide: Everything You Need to Know to Protect Your Crypto
- Advancing Email Validation in Laravel
- Fortifying the Digital Fortress: Understanding the Foundations of Cybersecurity Architecture
- How is GenAI Changing Cybersecurity?
- AI-Enhanced Cybersecurity Trends for 2024
- The Game of Trust: A Guide to the Future of KYC in Gaming
- AI in Cybersecurity: The New Frontier in Digital Protection
- Metadata: The Attorney’s Secret Weapon in Civil Litigation
- The importance of cyber security
- 5 Reasons to Comply with CMMC
- Payless CCTV Security Camera
- How Bitdefender Protect From Pegasus Spyware
- Printer Security? Here Are 6 Tips To Keep Your Business Safe
- Why it is important to install Access control system at your business
- Powerful Keyloggers for Windows
- Website security check: Tips on how to protect your website from hackers
- How will cyber threats evolve in 2020?
- When to choose red teaming over penetration testing: A guide to a robust cybersecurity program
- Protect your files with drive image backup software
- How Cloud Management Values Change Your Business
- The U.S. Government and Zero Day Vulnerabilities
- Spyware – Yet Another Cyber Menace
- Reset lost passwords in Windows with Active@ Password Changer
- Antivirus measures you should know when your PC is infected with a virus
- Security Fit For Royalty!