LOGO

Spybot Search & Destroy - Malware Removal & Protection

August 4, 2009
Spybot Search & Destroy - Malware Removal & Protection

Protecting Your System with Spybot Search & Destroy

We previously demonstrated how easily computers can become vulnerable to spyware, unwanted software, and other malicious programs. Today, we will guide you through the process of cleaning your system using Spybot Search & Destroy.

Key Installation Considerations

During the installation of Spybot Search & Destroy, two specific windows warrant your close attention. The Components Selection Window allows you to customize the installation. It’s advisable to ensure that both "Download updates immediately" and "Security Center integration" are selected for optimal functionality.

Keep in mind that minor updates may still be available for download following the initial installation. The Additional Tasks Window presents further important options. Selecting both "Use Internet Explorer protection (SDHelper)" and "Use system settings protection (Tea Timer)" is strongly recommended to enhance your system’s overall security.

Scanning for Malicious Software

Upon launching Spybot Search & Destroy for the first time, you’ll be prompted to create a "Registry Backup" before initiating a scan. Creating a backup is always a prudent measure.

As illustrated, Spybot Search & Destroy proactively began detecting malware even during the initial setup phase. Identifying these as malicious processes, we opted to terminate and delete them.

Once the setup is complete, the main Home Window appears. From here, you can select the desired action. We chose to "Search for Updates" to ensure the software is fully current.

Additional updates were available for the Immunization database, the Tea Timer service, and English language descriptions. After downloading any available updates, click "Exit" to close the Updates Window.

Returning to the Home Window, you can now Immunize your system. This feature enhances protection for your installed browsers and strengthens your Hosts File. Click the "Green Plus Sign Immunize Button" to apply the immunization.

Following immunization, the shift from "Unprotected" to "Protected" will be visible. Now, initiate a malware scan by clicking the "Search & Destroy Button" on the left side of the window.

To begin the scan, click the "Check for problems Button".

The scan's progress is easily monitored via the color bar and numerical counter at the window’s bottom. The type of malware being searched for is also displayed beside the counter. During our test scan, Spybot Search & Destroy efficiently compiled a list of detected malware.

Note that the scan process may take some time, so patience is advised. The thoroughness of the scan justifies the wait.

Post-Scan Actions and Malware Removal

After the scan concludes, the number of detected problems will be displayed in the lower left corner. The main window will present a comprehensive list of identified threats.

Clicking the "Plus Sign" beside each entry reveals detailed information about the item, including its registry value, file name, and location. This list allows you to review potential false positives and deselect entries if necessary, providing granular control over the removal process.

Once you’ve reviewed the list, click "Fix selected problems". A confirmation window will appear; select "Yes" to proceed with malware removal.

A green checkmark will appear beside each successfully removed item on the list. If some malware is currently in use, you can choose to remove it upon restarting your computer. Select "Yes" to enable this option.

Confirming your choice will display a message detailing the number of fixed problems. If some issues require a reboot, you’ll be prompted to restart your computer. Select "OK" to do so.

Reboot and Final Scan

If malware removal requires a reboot, Spybot Search & Destroy will conduct another scan during the restart process to detect any attempts at re-establishment. The system will not fully restart until the scan is complete, resulting in a black screen.

This scan may take longer than the initial scan, so feel free to utilize the time for other tasks. Spybot Search & Destroy will notify you upon completion.

In our example, some malware attempted to re-establish itself during the restart, but was promptly caught by Spybot Search & Destroy. To finalize the removal, select "Fix selected problems" again. After clicking, your system will complete the restart.

Following the restart, you can enjoy a significantly cleaner system!

Conclusion

While Spybot Search & Destroy may not be the fastest anti-malware solution, its meticulous and efficient approach to eliminating malware makes it a valuable addition to your security toolkit.

Download Spybot Search & Destroy (version 1.6.2). Next Up: Cleaning Spyware with Ad-Aware We’ve covered system infection and cleaning with Spybot; stay tuned for tomorrow’s guide on removing spyware with Ad-Aware, followed by a similar walkthrough with MalwareBytes later this week.

#spybot#search and destroy#malware removal#spyware removal#antivirus#computer security