Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

How Sunbelt Counterspy Works




By Ben Sikes

With spyware running rampant on PCs across the planet, a good spyware defense system is required. Well worth a look is Sunbelt's CounterSpy.


Originally owned by Giant Software then acquired by Microsoft, the old CounterSpy has mutated into Microsoft's spyware program. Sunbelt, on their part, developed what has become the new CounterSpy into something quite different. However, terms of the agreement are good news for Sunbelt – as well as their own researchers, they have the benefit of using Microsoft's research too.


CounterSpy comes in two versions, plain and Enterprise. Both editions of are highly effective and functional spyware eliminators - PC World recently gave CounterSpy a "Best Buy" award for detecting the most spyware out of products tested. So, what does it do?


• Active Protection monitors in real-time for spyware. Alerts to the presence of suspicious files and allows choice of whether to delete or quarantine

• AutoUpdater keeps spyware definitions up to date. Can be programmed to update at set times


• ThreatNet is the CounterSpy user network, reporting the latest spyware discovered. If CounterSpy recognizes potential spyware, details can be anonymously sent to CounterSpy researchers to get a fix out quickly

• Includes an Internet history cleaner to remove all traces of surfing history


• Secure file eraser completely wipes out any file that needs destroying beyond recovery


CounterSpy sports a pleasant, simple to use interface, on first look rather like a browser. Bold buttons indicating the different settings are laid out along the top of the window, with clear, easy to digest information below.


It also boasts PC Explorer for viewing and modifying settings that are usually difficult to amend, such as the Browser Helper Objects installed in Internet Explorer, what Windows startup processes are installed and what programs might be affecting the Internet connection.


PC Checkup will scan the computer's security settings and suggests where security might be improved. Active Protection is fully customizable in determining what kind of threat it should look for, for example, the ActiveX monitor could be switched on or off.


Spyware scan results are presented in list form with an option to quarantine, remove or keep each item found. Selecting an item provides a detailed description of what it is to aid the decision – provided that the information has been added to the CounterSpy database.


Bizarrely, CounterSpy supports more versions of Windows than the Microsoft product, being compatible from Windows 98 SE (not Windows 98) and ME onwards. Minimum specifications are:


• IBM Compatible 300MHZ PC

• 64MB of RAM

• 24MB hard disk space

• Windows 98SE/ME/2000/SP2+/NT4 SP 6a/ and Windows XP

• 2x CDROM for CD option

• Internet Explorer 5.0

• The Admin console of Enterprise edition requires .NET Framework 1.1, Windows 2003 Server/Windows XP Professional/Windows 2000 Server SP3/Windows 2000 Professional SP2


A free download of CounterSpy is available for evaluation purposes. It comes with a twelve month upgrade subscription upon purchase and further annual subscriptions are available after expiry. The full versions of the program are downloadable (at approximately 14MB in size), or, in the US, can be ordered on CD.
 
 
About the Author
Ben Sikes recommends reading the full product review of Sunbelt CounterSpy at Identity Theft Spy. See http://www.identitytheftspy.com/2006/02/sunbelt_counter.html for more information.

Article Source: http://www.simplysearch4it.com/article/26233.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/26233.html" as shown above and make it hyperlinked.



  Some other articles by Ben Sikes
ZoneLabs Zone Alarm Pro
A firewall is essential on any Internet connected PC. Firewalls control what is allowed in and out of the computer, virtually eliminating ...

Webroot Window Washer
For anyone concerned about what is left on their PC after using the Internet, Webroot Window Washer can set the mind at ease. Window ...

How Tenebril SpyCatcher Works
Spyware is a danger on any computer with access to the Internet. Software to detect and remove spyware is readily available and should always be ...

How Tenebril GhostSurf Works
For the security conscious web surfer, Tenebril's GhostSurf provides complete anonymity and privacy, keeping the computer invisible online and removing all traces of Internet activity from the PC. ...

TrendMicro PC-Cillin Internet Security
The original PC-Cillin was an antivirus application. In 2006 it's grown into a full Internet security suite with firewall, spam filter and parental controls. Computer security is essential to ...

How Evidence Eliminator Works
World-renowned Evidence Eliminator is a sure fire way to remove secret and sensitive data from a PC once and for ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database