FREE Spyware Terminator DOWNLOAD
FREE Spyware Terminator
Freeware Spyware Terminator Download
Spyware Terminator will scan your computer for known threats and report findings in a manner that is easy to read and interpret. Every entry is given a rating and a classification, which makes it very easy to decide if a detected item should be removed. Unlike some free software titles, Spyware Terminator will remove all threats for free.
“Spyware Terminator includes Real-Time Protection, HIPS, and antivirus. Effectively remove spyware, adware, trojans, keyloggers, home page hijackers, and malware threats even dangerous threats like Look2Me, BetterInternet, VX2, and CWS. Spyware Terminator is easy-to-use, requires minimal PC resources, and performs ultra fast scans. Protect your computer with powerful real-time protection shield, advanced system scanning and safe quarantine for found spyware. Scan your computer manually or schedule full system sweeps. Perform in-depth scans of your computer’s hard drives, memory, process, registry and cookies to seek out and remove all known spyware threats. Includes optional Web Security Guard which displays website reviews and threat level to help identify potentially dangerous Web sites.”
CNET Editor’s Note: The Download Now link will download a small installer file to your desktop. Remain online and double-click the installer to proceed with the actual download.
Spyware Terminator has included the popular award winning open-source antivirus, Clam AntiVirus (ClamAV), for optional integration to achieve a higher level of security. ClamAV can be integrated into spyware scans, updates and the real-time protection.
Spyware Terminator is a computer protecting software from Crawler LLC. It is freeware so you can enjoy it without any restriction. The installation file takes 2.23 MB of your disk space. The interface allows the user to work with the software very easy and it does not have a complicated settings menu.
The language of the interface permits even the least experienced users the maneuvering of the application. The difficult part comes though when you have to remove the objects detected as malicious to your computer.
The software scans, cleans and protects your computer against malware. The scanning menu has five options to choose from. The user can do a Fast Scan and the software will check only the important parts of the system; Full Scan performs checks on memory, registry, drives and NTFS ADS. I must warn you that this type of scanning takes a lot of time, computer memory and CPU – in my case it took about 90 minutes to scan almost 50 000 objects.
The user can do a customized scan and choose exactly what the software should check. The options here are virus scan, system, registry and files scan. You can also choose to do a deep files scan and test only infectible files (.exe, .com, .dll) on your drives. The option of scanning only some folders is also available.
The threats found on your computer can be moved to quarantine or to the ignore list.
A useful feature of the software is the “system restoration” one. You can find it under Spyware Scan>Utilities. This option is to be used in case of installing or uninstalling programs by mistake. Spyware Terminator creates a system checkpoint before any removal of an application. This way you can restore your system to a previous checkpoint.
The program provides the user with scheduling the scan task. Simply go into Settings>Scheduler Settings and set a day of the week and a time for the application to perform the scanning of your computer. You can enable/disable displaying the results or running a full system scan. This way your computer will be scanned for malware even if you are not there.
For the software to be up to date with the spyware database the user can set an update period (from one hour to 24). Of course, if you do not want an update you can disable the option.
In the Real-Time Protection menu one can set the permission levels for the system, Internet and Clam AntiVirus. Application Guard monitors several important checkpoints and checks for attempts to add or modify your installed applications. It includes startup registry, services and threats.
The System Guard checks for hazardous changes in your computer (security permission changes). It includes system .ini files, hosts file and file extensions.
Internet Guard checks for applications that make unauthorized connections to the Internet or modify Internet connection settings. The options here are BHO (Browser Helper Objects), toolbar, WinSock and IE URL.
FREE TOOLS AND UTILITY FOR PC SECUTIRY | SPYWARE TERMINATOR