Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

How Tenebril SpyCatcher Works




By Ben Sikes

Spyware is a danger on any computer with access to the Internet. Software to detect and remove spyware is readily available and should always be installed, along with anti-virus software, to protect the computer and the user.


Spyware, as it's name suggests, spies on PC user habits. The mildest types are really little more than a nuisance, popping up advertising according to the type of websites visited. At its worst, spyware can damage system files and steal passwords or other personal information.


Tenebril SpyCatcher is a well recommended anti-spyware program. It's attractive and easy to use interface disguises powerful and effective spyware elimination techniques, with features including:


• database regularly updated from research and user input

• blocking re-installation of spyware

• "Deep Defense" protection, embeds into the operating system

• advanced algorithms to prevent false positive identifications

• behavioral detection to catch mutating or new spyware

• compatibility with Windows 2000 or newer, Pentium 350MHz or faster, 64MB RAM and 16MB hard disk space

• download and CD options


SpyCatcher Express is the free version of the software, available to download from Tenebril's website. The paid version, currently called SpyCatcher 2006 includes several additional features:


• automatic updates

• background scans

• submit reports for analysis

• anti-phishing protection

• Hosts File Analyzer

• AD (Active Directory) and workgroup compatibility


• option to buy multiple licenses

• one or two year subscription package


SpyCatcher's methods may confuse some – it allows spyware to install but then quarantines it when it attempts to do anything, before removing it on the next removal scan. This is how the behavioral learning of the program works – reading spyware programs installed and analyzing them in order to detect any new installations that display characteristics of spyware.


Upon detecting a new item of spyware, licensed users may submit a report to Tenebril. This is then used alongside in-house research to ensure the database is always kept right up to date.


SpyCatcher has a suspicious file wizard, to help in the identification of spyware and to check against the Tenebril database. It also protects against phishing, or fake, websites by checking page definitions and URLs and warning if the page does not appear legitimate.


A great feature of SpyCatcher is the Deep Defense protection. Sometimes, spyware fixes itself into the operating system even though it has been detected by a removal program, ready to to jump back into action after a reboot. The Parachute feature protects the PC on startup. SpyCatcher loads ahead of the computers boot sequence, checking for spyware as it goes. If it detects anything, it will boot the PC in Safe Mode, delete the offending program, then reboot normally.


It's likely that on revisiting a site, which gave away, its spyware on the last visit, the same infection will be picked up again. Not with SpyCatcher. It works to make sure that no spyware is allowed to come back into a system once it's already been on that hard disk.


The National Cyber Security Alliance's research suggests that 90 percent of PCs become prey to spyware. This is all the more a good reason to install a program like SpyCatcher.
 
 
About the Author
Ben Sikes recommends reading the full product review of Tenebril SpyCatcher at Identity Theft Spy. See http://www.identitytheftspy.com/2006/02/tenebril_spycat.html for more information.

Article Source: http://www.simplysearch4it.com/article/26236.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/26236.html" as shown above and make it hyperlinked.



  Some other articles by Ben Sikes
ZoneLabs Zone Alarm Pro
A firewall is essential on any Internet connected PC. Firewalls control what is allowed in and out of the computer, virtually eliminating the possibility of a hacker gaining control or of spyware ...

Webroot Window Washer
For anyone concerned about what is left on their PC after using the Internet, Webroot Window Washer can set the mind at ease. Window Washer wipes away all traces of past PC use. ...

How Tenebril GhostSurf Works
For the security conscious web surfer, Tenebril's GhostSurf provides complete anonymity and privacy, keeping the computer invisible online and removing all traces of Internet activity from the PC. ...

How Sunbelt Counterspy Works
With spyware running rampant on PCs across the planet, a good spyware defense system is required. Well worth a look is ...

TrendMicro PC-Cillin Internet Security
The original PC-Cillin was an antivirus application. In 2006 it's grown into a full Internet security suite with firewall, spam filter and parental controls. Computer security is essential to prevent PC ...

How Evidence Eliminator Works
World-renowned Evidence Eliminator is a sure fire way to remove secret and sensitive data from a PC once and for all. ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database