|
|
-
If you are like most people on the Net, you've most
likely downloaded music on the Net.
-
Did you know that when you use these file sharing
services, they infect your computer with Spy Ware or Ad Ware?
-
Did you know that by simply clicking on a random
"pop up" ad, your computer may have been infected with Spy Ware?
What is Spy Ware & Ad ware you ask?
Spy ware & Ad ware are files that are installed on your computer without
your knowledge. They allow companies to monitor your Internet browsing
patterns and even allow companies to inundate you with those annoying
"pop up" ads!
If after you've downloaded some music, you started getting those
annoying ads popping up on your screen, you've been infected with Spy
Ware and/or Ad Ware!
But don't worry - We have come to the rescue with the most revolutionary
software product on the Internet Today….
SPYWARE NUKER!
SpyWare Nuker will scan your PC
Absolutely FREE and let you know if you have any
files that are infecting your PC!
If you're like most people, you spent a lot of money on your computer.
Don't let shady Internet companies infect your PC by putting SpyWare or
AdWare on your PC without you knowing!
2.0
Getting Started with Spyware Nuker!:
Back to Top -->
Below we will show you how to scan
for Spyware on your system, create backups of items to be removed, view logs,
and even create your own language pack.
- Run Spyware Nuker as found in Start >> Programs >>
Spyware Nuker >> Spyware Nuker
- OR run it from your desktop by double clicking the Spyware Nuker
icon.
Here is a quick description of the
buttons that you will see in the main window:
-
Help: This button launches the User's
Help Manual
-
Options: Launches the program
options window
-
Backup: Launched the Backup/Restore
Manager, where you can restore or delete backups
-
Full System Scan: Starts the scanning process
by pressing the Scan now button.
-
Scan Sections: This is where you
select the parts of your system you want to scan
2.1 Program
Options: Back
to Top -->
Now Lets
familiarize ourselves with the options window, and change some options to suit
our scanning needs
First to launch the options window,
simply click the
button from the main window.
Note: Any changed
settings will take effect only if you click the "OK" button
Check this option
if you want the report file saved automatically for every session
Check this option if
you want Spyware Nuker to start with windows startup
Check this option only if you are sure you want the spyware to be automatically
deleted when found.
Note: Backup is not in effect in this case.
Check this option if you
want all the scan results checked by default.
Note:
You can check / uncheck them manually.
This is where you can
choose your language from the list of available languages installed with your
spyware nuker program, or ones you have added / created.
This is where the
Spyware Nuker log files will be stored
this is where the
created backups will be stored
3.0
Exclude List:
Back to Top -->
3.1 - What is the Exclude List? Back
to Top -->
The Exclude List contains entries to components you don't want Spyware Nuker
to remove or detect.
3.2 - How do I remove items from the Exclude List?
Back
to Top -->
To remove items from the Exclude List, do the following:
Step 1) From the main window click
the exclude button
Step 2) Select the components you
need to remove by clicking the checkbox icon next to the items you want deleted
Step 3) Click the
button
Note: the next time you run a
system scan, this item will show back up in te scan results as a spyware
component.
4.0 Task Selection:
Back to Top -->
Now you are ready to select the
sections from your computer to start scanning. For the purpose of this example
simply select all components to scan by clicking the square box
next to the item
you want scanned.
4.1 What are all those sections: Back
to Top -->
-
My Computer: Checking this option
will scan the complete system
-
Scan Memory: Checking this option
will scan the memory for Spyware running processes
-
Scan Registry
-
Scan Cookies: This will scan for
Spyware cookies
-
Scan Drives
-
Removable Drives: This will scan
drives like Floppy, etc..
-
Fixed Drives: This will scan drives
like hard drive, CD ROM, or DVD, etc..
Note: Grayed icon mean that
not all sub-sections were selected.
Example: Check the "My computer" icon
to quickly set for
a complete system scan.
Note:
To start the scanning
process, simply click the "Scan" button on the right
.
5.0
System Scanning:
Back to Top -->
Note: Depending on your
selection, the scan may take from a second up to a few minutes.
The scan summary shows how many of
each type of spy-ware components were found. In the above example we show that
it found 1 spyware registry keys, 25 spy-ware files, 0 spy-ware folders, and
none were ignored from a previous scan.
5.1
Spyware types: Back
to Top -->
-
Memory process
-
Spy File
-
Spy Folder
-
Spy Registry
-
Spy Cookie
5.2 Adding components to the Exclude list? Back
to Top -->
Simply select the components you want
to Exclude, and click the Exclude button
5.3 Backing up components? Back
to Top -->
Simply click the backup button
5.4 Deleting components? Back
to Top -->
Simply select the components you want
to remove, and click the "Next" button
Note: It's always a good idea
to backup first.
Note: During the scan, you can
stop the scanning process at any time by simply clicking the
button.
What if I don't see any new
components from the scan?
congratulations! you don't have any new spyware components found..
Note: Some components need a reboot to be removed, since they may be
locked by a running process.
6 .0
Backup Management:
Back to Top -->
6.1 Restoring from a backup?
Back
to Top -->
To restore components from a backup
do the following:
Step 1) Click the backup button
from the main
window to open the backup manager.
Step 2) Choose the desired backup
from the list.
Step 3) After selecting the backup, click the "Restore" button to restore the
backed up components.
Note: You can change the backup folder path from the options window.
7.0 Multi-Language
Support:
Back to Top -->
7.1
Adding your own language modules: Back
to Top -->
Step 1) Copy the "English.ini" file located in the installation folder/Lang, and
name it with the name of the language you are making.
Example: Japanese.ini.
Note: Don't change the file extension, keep it as ".INI".
Step 2) Make an icon 16x16 pixels
with the flag for your country language pack, and save it in bitmap format.
Example: Japanese.bmp
Note: It must have the same
name as the language.ini file, and have the extension ".BMP"
Step 3) Edit the file with notepad or any text pad.
Example:
;Backup Window <--- This line is a
comment since it starts with the ";"
1400=Restore
1401=Clean
1402=Cancel
The strings will be changed to your
language
Example to change them to French:
; Fenętre auxiliaire
1400=restaurez
1401=propre
1402=annulez
Note : Make sure you don't change the line numbers, leave them in English,
and keep the string length about the same if possible. You may test it out to
see if it exceeds the button size etc..
7.2 Special characters:
Back
to Top -->
Note: After saving the file, simply supply a 16 x 10 or 16x16 bitmap that
represents country Flag.
Note: The flag image file, and the ini files, both must have the same
name.
Example :
Japanese.ini
Japanese.bmp
8 .0
License Agreement:
Back to Top -->
PLEASE READ THIS END USER LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE CHOOSING THE "YES" OPTION BELOW. BY CHOOSING "YES," YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, THEN LIONS PRIDE ENTERPRISES, INC. AND DBA BLUEHAVENMEDIA.COM (HEREINAFTER COLLECTIVELY "TREK BLUE") DOES NOT CONSENT TO LICENSE THE SOFTWARE TO YOU, AND YOU SHOULD NOT USE THE SOFTWARE. BY INSTALLING, DOWNLOADING, COPYING, OR OTHERWISE USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ THESE TERMS AND CONDITIONS, UNDERSTAND THEM, AND AGREE TO BE BOUND BY THEM. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, YOU ARE NOT AUTHORIZED AND MAY NOT USE THE SOFTWARE.
1. LICENSE
The "Trek Blue" software and/or programs (the "’Trek Blue’ Program[s]" or "program[s]"), documentation and any fonts accompanying this License whether on disk, in read only memory, on any other media or in any other form are licensed to you by "Trek Blue." The program(s) may include added technology which allows "Trek Blue" to provide applications which compliment or enhance the "Trek Blue" application(s). You own the media on which the program(s) is recorded but "Trek Blue" retains title to the "Trek Blue" Program(s). The "Trek Blue" Program(s) and any copies that this License authorizes you to make are subject to this License.
2. PERMITTED USES AND RESTRICTIONS
This License allows you to install and use the "Trek Blue" Program(s) on your private computer. Any saved or archived "Trek Blue" Program(s) must include all copyright information and related License documentation contained on the original. You may NOT decompile, reverse engineer, disassemble, modify, rent, lease, distribute, make any commercial use of or create derivative works based upon the "Trek Blue" Program(s) in whole or part. You acknowledge that "Trek Blue" may, at their sole discretion and for any purpose, provide updates, automatic or otherwise, to the "Trek Blue" Program(s) (including but not limited to the advertising or other value-added software and technology described in paragraph 4, below); by your use of the "Trek Blue" Program(s) you acknowledge your desire to receive these updates. Your rights under this License will terminate automatically without notice from "Trek Blue" Program(s) if you fail to comply with any term(s) of this License.
3. PERSONAL USE ONLY FOR ENTERTAINMENT PURPOSES
The entertainment portion of the "Trek Blue" Program(s) is made available for your personal, non-commercial use only. You may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, or sell any information, software, products or services obtained from the "Trek Blue" Program(s). Use of the functional or entertainment portion of the "Trek Blue" Program(s) for any purpose other than personal use or entertainment is expressly forbidden.
4. ACKNOWLEDGEMENT OF VALUE-ADDED APPLICATIONS
You acknowledge that the "Trek Blue" Program(s) include technology which allows "Trek Blue" to provide auto-updates to the software directly to your computer to make sure you are always running the most current version of the software. By installing, downloading, copying, updating or otherwise using the "Trek Blue" Program(s), you specifically agree to include and/or accept the noted software and technology through which "Trek Blue" provides upgrades to your computer.
5. COMPLIANCE WITH LAWS
As a condition precedent to your use of the "Trek Blue" Program(s), you agree to comply with all laws and regulations applicable to your use of "Trek Blue" Program(s) including but not limited to US and international copyright and all intellectual property laws, obscenity, possession and distribution of child pornography, violence against racial and/or gender groups, and other prohibited pornographic materials pursuant to federal, state and local laws. Specifically, you acknowledge that the "Trek Blue" Program(s) is useful for personal entertainment only. You acknowledge that images, portrayals, depictions, or other representations of public events and personalities, if any, qualify as a "fair use" and/or "parody" under state, federal and international definitions thereof. Finally, you acknowledge that the "Trek Blue" Program(s) is a personal search tool and may NOT be used to:
- Transmit any content that is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, invasive of another's privacy, hateful, or racially, ethnically or otherwise objectionable;
- Harm minors in any way;
- Impersonate any person or entity or falsely state or otherwise misrepresent your affiliation with a person or entity;
- Forge headers or otherwise manipulate identifiers in order to disguise the origin of any content transmitted through any means;
- Transmit any content that you do not have a right to transmit under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);
- Transmit any content that infringes any patent, trademark, trade secret, copyright or other proprietary rights of any party;
- Transmit any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
- Intentionally or unintentionally violate any applicable local, state, national or international law, including securities exchange and any regulations having the force of law;
- "Stalk" or otherwise harass another; or
- Collect or store personal data about other users. You acknowledge and agree that "Trek Blue" may preserve content and may also disclose content if required to do so by law or in the good faith belief that such preservation or disclosure is reasonable necessary to:
(a) comply with legal process;
(b) enforce this Agreement;
(c) respond to claims that any content violates the rights of third-parties; or
(d) protect the rights, property, or personal safety of "Trek Blue", its users and the public.
- Monitor network traffic or make search requests in order to accumulate information about individual users.
6. DISCLAIMER OF WARRANTIES
THE "TREK BLUE" PROGRAM(S) IS PROVIDED ON AN "AS IS" AND "AS AVAILABLE" BASIS. "TREK BLUE" MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE OPERATION OF THE "TREK BLUE" PROGRAM(S) OR THE USE OR THE RESULTS OF THE USE OF THE"TREK BLUE" PROGRAM(S). YOU EXPRESSLY AGREE THAT YOUR USE OF THE "TREK BLUE" PROGRAM(S) IS AT YOUR SOLE RISK. "TREK BLUE" EXPRESSLY DISCLAIMS TO THE FULLEST EXTENT PERMITTED BY LAW ALL EXPRESS, IMPLIED, AND STATUTORY WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF PROPRIETARY RIGHTS. "TREK BLUE" DISCLAIMS ANY WARRANTIES REGARDING THE SECURITY, RELIABILITY, TIMELINESS, AND PERFORMANCE OF THE SERVICES. "TREK BLUE" DISCLAIMS, ANY WARRANTIES FOR ANY INFORMATION OR ADVICE OBTAINED THROUGH THE "TREK BLUE" PROGRAM(S). "TREK BLUE" DISCLAIMS ANY WARRANTIES FOR SERVICES OR GOODS RECEIVED THROUGH THE "TREK BLUE" PROGRAM(S) OR RECEIVED THROUGH ANY PROVIDED BY THE "TREK BLUE" WEB SITE OR ANY USE OF THE "TREK BLUE" PROGRAM(S). "TREK BLUE" DOES NOT WARRANT THAT THE "TREK BLUE" PROGRAM(S), THE "TREK BLUE" SERVERS, OR E-MAIL SENT FROM "TREK BLUE" ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS.
CERTAIN STATE LAWS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR THE EXCLUSION OR LIMITATION OF CERTAIN DAMAGES. IF THESE LAWS APPLY TO YOU, SOME OR ALL OF THE ABOVE DISCLAIMERS, EXCLUSIONS, OR LIMITATIONS MAY NOT APPLY TO YOU.
7. LIMITATION OF LIABILITY
IN NO EVENT SHALL "TREK BLUE" BE LIABLE FOR ANY DIRECT, INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR NEGLIGENCE, DEFAMATION, COPYRIGHT OR ANY OTHER CLAIMS, ARISING OUT OF OR IN ANY WAY CONNECTED WITH THE USE OR PERFORMANCE OF THE "TREK BLUE" PROGRAM(S) , WITH THE DELAY OR INABILITY TO USE THE "TREK BLUE" PROGRAM(S) , THE PROVISION OF OR FAILURE TO PROVIDE SERVICES, OR FOR ANY INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS OBTAINED THROUGH THE "TREK BLUE" PROGRAM(S) OR OTHERWISE ARISING OUT OF THE USE OF THE "TREK BLUE" PROGRAM(S), WHETHER BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY OR OTHERWISE, EVEN IF USER HAS BEEN ADVISED OF THE POSSIBILITY OF DAMAGES.
BECAUSE CERTAIN STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IF YOU ARE DISSATISFIED WITH ANY PORTION OF THE "TREK BLUE" PROGRAM(S) , OR WITH ANY OF THESE TERMS OF USE, YOUR SOLE AND EXCLUSIVE REMEDY IS TO DISCONTINUE USING THE "TREK BLUE" PROGRAM(S) .
8. COPYRIGHT
"Spyware Nuker" and other "Trek Blue" Program(s) and are the property of "Trek Blue" and protected by United States and international copyright laws.
9. TRADEMARKS
"Spyware Nuker" and "Trek Blue" are trademarks of "Trek Blue". You agree not to display or use such trademarks in any manner without "Trek Blue"'s express written prior permission.
10. EXPORT LAW ASSURANCES
You may not use or otherwise export or re-export the "Trek Blue" Program(s) except as authorized by United States law and the laws of the jurisdiction in which the "Trek Blue" Program(s) was obtained.
11. MISCELLANEOUS
The License constitutes the entire agreement between you and "Trek Blue" Program(s) and govern your use of the "Trek Blue" Program(s), superceding any prior agreements between you and "Trek Blue". You also may be subject to additional terms and conditions that may apply when you use affiliate services, third-party content or third-party software. The License and the relationship between you and "Trek Blue" shall be governed by the laws of the State of California without regard to its conflict of law provisions. "Trek Blue" may amend the License at any time by a notice on the "Trek Blue" web site, which shall be binding upon you. You may not revise or amend the License without the prior written authorization of an officer of "Trek Blue". You hereby irrevocably consent to the personal and exclusive jurisdiction of the courts located within the County of San Diego, State of California in all disputes arising out of or relating to the use of the "Trek Blue" Program(s). The failure of "Trek Blue" to exercise or enforce any right or provision of the License shall not constitute a waiver of such right or provision. If any provision of the License is found by a court of competent jurisdiction to be invalid, the parties nevertheless agree that the court should endeavor to give effect to the parties' intentions as reflected in the provision, and the other provisions of the License remain in full force and effect. You agree to indemnify and hold "Trek Blue", its parents, subsidiaries, affiliates, officers, directors and employees, harmless from any claim, demand, or damage, including reasonable attorneys' fees, asserted by any third party due to or arising out of your use of the "Trek Blue" Program(s).
Back
to Top --> |
|
|