Protecting Myself from Spyware and Adware - Tech Learning

Protecting Myself from Spyware and Adware

Listen to this podcast "What are all these windows open on my screen?” a campus administrator asked me recently. Unfortunately, windows were appearing on her personal laptop's screen at an alarming rate. She had Adware! Adware sometimes causes advertising banners to appear on your screen in multiple,
Publish date:

Listen to this podcast

"What are all these windows open on my screen?” a campus administrator asked me recently. Unfortunately, windows were appearing on her personal laptop's screen at an alarming rate. She had Adware! Adware sometimes causes advertising banners to appear on your screen in multiple, cascading windows that can appear so quickly that you are unable to use your computer for anything else. Furthermore, when doing a search, advertisements could appear everywhere on your computer. They are pernicious and invasive. And then there are Spybots, which are no fun either. These can be used to collect the keystrokes you make--consider how dangerous this is when typing in sensitive information such as social security numbers or critical passwords--and send them on to others.

Although we came to the brink of reformatting--wiping her hard drive of data and starting over--we were finally able to install the right combination of software to prevent spyware/adware software from taking over her computer. The software programs listed below are all free for individual use. I encourage you to take these steps to immediately protect your computer. If you are undergoing a spyware attack, start with Step 2; this will prevent pop-ups from overwhelming you as you try to take care of the problem. They include the following:

  1. Update your Windows Operating System . You can do this by pointing your Internet Explorer browser to “Protect Your PC” (
    This Web site will allow you to get (download) the latest updates for your particular operating system.
  2. Install an Internet Monitoring or Firewall program such as Zone Lab's ZoneAlarm (, Kerio's Personal Firewall ( or Agnitum's Outpost Firewall Free ( A firewall program essentially monitors and restricts incoming and outgoing Internet use. It allows you to see how the Internet is being accessed on your computer. After a few alerts, you are able to identify which program is trying to access the Internet and deduce why. The program can be taught to remember which programs to allow, and which to bar. ZoneAlarm is a free download and includes a short tutorial/wizard to help you configure it. The first few uses of the Internet will require your permission, but you will actually be able to prevent your computer from sending out unauthorized spyware connections. This is important since an unauthorized spyware could further install other software on your computer.

    If you do not want a firewall, but still want to know what programs on your computer require Internet access, you can install a monitoring program. For Macintosh computers, you can download BrickHouse ( or Little Snitch ( While both are shareware ($25), BrickHouse allows you unlimited use as opposed to Little Snitch which allows only three hours of use before you have to pay. Both will allow you to monitor incoming/outgoing traffic on your Mac. Although Macs, as of 11/26/2004, are immune to spyware, these two products will help you keep track of applications that communicate with the software manufacturer via the Internet.

    Windows users, who will still need a firewall program to monitor Internet connections even with Windows XP Service Pack 2 installed, can take advantage of the free WinPatrol ( or Spybot's TeaTimer, which is discussed below, to monitor Windows settings changes. Another alternative is JavaCool Software's FileChecker ( Each program provides you with more information to facilitate your decision-making and awareness of spyware/adware/viruses that may need Internet access. In some cases, you are able to halt the process before worse damage occurs or recognize the problem. A rule of thumb is to disallow Internet access unless it is critical to the operation of your machine. This is especially critical after installing something you've just downloaded off the Internet, even if it is coming from C-Net's, which has some software infected with spyware/adware.
  3. Disable System Restore : If using Windows XP, you need to disable a feature called "system restore." This is a utility that makes back ups of selected files on your computer. If a virus infected file, or spyware/adware file, is backed up, when you restart your computer, the infected files will be restored. This would prevent a clean-up from taking place. You can find directions on how to disable System Restore online at “Disabling System Restore” (
  4. Install several anti-spyware programs --unfortunately, 1 or 2 is not enough--including the following:
  5. Finally, fix your Windows Registry . If you've had to battle spyware or adware on your computer, then you may have other, long-lasting problems. After cleaning out toxic programs, the Registry on your computer has been corrupted. The Registry is a place where the Windows operating system, as well as other programs, save information about themselves. A corrupt registry means that your machine will start up slowly and/or crash frequently. While there are many "registry cleaners" out on the Web, I would recommend Macecraft's Registry Supreme ( Not only is it easy to use, but when I used it on three different systems within it's 30 day evaluation period, it worked flawlessly. And, while not free, it only costs $12.95! And, cleaning your Registry periodically can speed up your system significantly! If you aren't interested in installing RegSupreme, you might try this alternative--although it's not as comprehensive as RegSupreme, it is completely free— EasyCleaner ( EasyCleaner also offers other options similar to RegSupreme Pro including removing installed programs, checking startup services, and more.



Protecting Deleted Files

Listen to this podcast Over the last 6 months, I've had to explain to several folks that simply because you delete files on your computer, it does not mean that they are "safe" and "unrecoverable." In fact, it is a relatively simple manner to undelete files off your computer. This is especially

Protecting Your Digital Privacy

Listen to this podcast From banks to school districts to the Veterans Administration, every other week, we hear about some other individual who has jeopardized confidential information for millions of people. This article is about how YOU can maintain your digital privacy on your computer. Consider these

PDF Primer: Printing and Converting

Listen to this Podcast Let's take a moment and imagine what life would be like without PDF files, that standard document format that is viewable across all operating system platforms (e.g. Windows, Macintosh, Linux). The standard document format makes it easy to exchange documents that keep the original formatting

Compressing Multiple Files to Email

Listen to this podcast Sending Email attachments is easy, but can cause a lot of trouble for the recipient. Before you send an Email message, contact the recipient and agree on a compression format. Compression programs work like electronic suitcases. A suitcase allows you to carry your clothes relatively neatly on

Making Flyers, Brochures and More

Listen to this podcast A few years ago, I remember obtaining my first copy of Publish It! It came on multiple diskettes, and allowed me to create brochures easily. Unlike with word processing programs of the time, such as WordPerfect, I was able to easily create textboxes, place images and then copy-n-paste text and

Backing Up Your Hard Drive

Subscribe to TechTips RSS Feed Listen to this podcast If you have ever reformatted a computer, reloaded it with software by loading the programs one by one, you know it can be a time-consuming process. As a matter of fact, I recall spending many an hour loading software with a book in hand (pleasure reading, not

Free Graphic Editors

Listen to this podcast Some time ago, I had the opportunity to visit several private school campuses. Of course, I was privately surveying their level of technology implementation (LOTI). However, I was surprised that some campuses weren't taking advantage of all the free available software that they could use. At