- PeerGuardian 2 - PeerGuardian 2 is Phoenix Labsâ€™ premier IP blocker for Windows.
ANTI-VIRUS (If you don't know whether you need Anti-virus software for Windows then you DO. Again, pick one)
- Panda's Online Scan (uses ActiveX, so you need to use Internet Explorer for it)
ANTI-SPYWARE (as many as you want):
- Javacool's SpywareBlaster
- Javacool's SpywareGuard
- Spybot Search & Destroy
- Lavasoft's Ad-Aware SE Personal (they seem to have most of their site hosted on Akami, which trips my Adblock filters... you may have to disable it temporarily to get to the download)
- Windows Defender
- Another spyware/adware remover - http://www.spywareinfo.com/xscan.php Uses activeX so probably wont work with firefox etc.
to assist ClamWin
and of course:
- Process Explorer:
Task manager that so far is unrivaled for detail, usability, integration and file size. So good, MS bought out the company/group that made it. Updates have curiously stopped though.. hmm..
Made by the same bunch, it lists every startup item, service, BHO, .dll injection, etc. If spyware is abound, its very likely listed by AutoRuns and easily deleted. Though you can feck up your system really easily with cack-handed use. Ace!
Thanks go to Doogle Smile, Tinlad, woodcock68, Trippynet, Blak, Simon42, RaleighBurner, zoon, ceiron, -Dave-, stevewill61, OakenSheild, Craig and Ward for their contributions.
Here's some info on Rootkits, kindly provided by Sch1sm:
Wikipedia definds a Root Kit as -
A root kit typically hides logins, processes, and logs and often includes software to intercept data from terminals, network connections, and the keyboard. In many sources, root kits are counted as trojan horses.
A root kit may also include utilities, known as backdoors to help the attacker subsequently access the system more easily.
Why Is Root Kit Protection Forgotten About?
The actual explanation is a little longer than what i have quoted but if you wish to see the full explanation of a Root Kit, the click here. Now, back on topic, a Root Kit protection program is not normally counted in "protecting yourself" on the internet and as such, is largely forgotten as a vital piece of software but i thought making users more aware of the threat, they could better protect themselves and others.
How Does A Compromised PC Become A Target?
Compromised PCs can become a target if they do not have sufficient security features such as a software or hardware firewall, a software firewall being Zone Alarm and a hardware firewall being an ADSL Firewall Router such as those from NetGear. Failing to update your PC with crucial Security fixes from Windows Update can also lead to a users PC being a target, so make sure you apply the fixes as soon as they are available!
So, what to do about these nasties then? A simple and effective way to protect yourself and detect a Root Kit, is to download a simple program called Root Kit Revealer which scans your Windows directory and compares it with a vanilla directory, comparing file sizes, and other such attributes.
Microsoft intends to add a root kit detection program into their MS Anti-Spyware system but for the moment, Root Kit Revealer is your best protection against this threat.
I hope this has given you a short insight into Root Kits and the possible threat they pose, and after reading this you have and will protect yourself accordingly, any security flaw, no matter how small, is always best protected by the appropriate techniques and software.