Spyware Nuker Users Guide

http://www.SpywareNuker.com/

  •  

     

     

    1.0 Introduction Back to Top -->

     


     

    • If you are like most people on the Net, you've most likely downloaded music on the Net.

    • Did you know that when you use these file sharing services, they infect your computer with Spy Ware or Ad Ware?

    • Did you know that by simply clicking on a random "pop up" ad, your computer may have been infected with Spy Ware?

    What is Spy Ware & Ad ware you ask?

    Spy ware & Ad ware are files that are installed on your computer without your knowledge. They allow companies to monitor your Internet browsing patterns and even allow companies to inundate you with those annoying "pop up" ads!

    If after you've downloaded some music, you started getting those annoying ads popping up on your screen, you've been infected with Spy Ware and/or Ad Ware!

    But don't worry - We have come to the rescue with the most revolutionary software product on the Internet Today….
    SPYWARE NUKER!

    SpyWare Nuker will scan your PC Absolutely FREE and let you know if you have any files that are infecting your PC!

    If you're like most people, you spent a lot of money on your computer.
    Don't let shady Internet companies infect your PC by putting SpyWare or AdWare on your PC without you knowing!

     

    2.0 Getting Started with Spyware Nuker! Back to Top -->

    Below we will show you how to scan for Spyware on your system, create backups of items to be removed, view logs, and even create your own language pack.

     

    • Run Spyware Nuker as found in Start >> Programs >> Spyware Nuker  >> Spyware Nuker
    • OR run it from your desktop by double clicking the Spyware Nuker  icon.

     

     

     

     

     

    Here is a quick description of the buttons that you will see in the main window:

     

    • Help: This button launches the User's Help Manual

    • Options: Launches the program options window

    • Backup: Launched the Backup/Restore Manager, where you can restore or delete backups

    • Full System Scan: Starts the scanning process by pressing the Scan now button.

    • Scan Sections: This is where you select the parts of your system you want to scan

     

     

    2.1 Program Options:   Back to Top -->

     

    Now Lets familiarize ourselves with the options  window, and change some options to suit our scanning needs

    First to launch the options window, simply click the button from the main window.

     

     

     

    Note: Any changed settings will take effect only if you click the "OK" button
     

    Check this option if you want the report file saved automatically for every session


     

    Check this option if you want Spyware Nuker to start with windows startup

     


    Check this option only if you are sure you want the spyware to be automatically deleted when found.

    Note: Backup is not in effect in this case.
     

    Check this option if you want all the scan results checked by default.
    Note: You can check / uncheck them manually.
     

     

    This is where you can choose your language from the list of available languages installed with your spyware nuker program, or ones you have added / created.


    This is where the Spyware Nuker log files will be stored

     

    this is where the created backups will be stored

     

     

    3.0 Exclude List Back to Top -->

     

     

    3.1 - What is the Exclude List?   Back to Top -->


    The Exclude List contains entries to components you don't want Spyware Nuker to remove or detect.

     

    3.2 - How do I remove items from the Exclude List?  Back to Top -->

     


    To remove items from the Exclude List, do the following:

     

    Step 1) From the main window click the exclude button

     

    Step 2) Select the components you need to remove by clicking the checkbox icon next to the items you want deleted

     

    Step 3) Click the button
     

    Note: the next time you run a system scan, this item will show back up in te scan results as a spyware component.

     

     

     

    4.0 Task Selection Back to Top -->

     

     

    Now you are ready to select the sections from your computer to start scanning. For the purpose of this example simply select all components to scan by clicking the square box next to the item you want scanned.

     

    4.1 What are all those sections:   Back to Top -->

    • My Computer:  Checking this option will scan the complete system

    • Scan Memory: Checking this option will scan the memory for Spyware running processes

    • Scan Registry

      • Quick Scan: Checking this option will scan the registry for the main items

      • Deep Scan:  Checking this item will look deep into the registry for any suspicious keys

    • Scan Cookies: This will scan for Spyware cookies

    • Scan Drives

      • Removable Drives: This will scan drives like Floppy, etc..

      • Fixed Drives:         This will scan drives like hard drive, CD ROM, or DVD, etc..

     

    Note: Grayed icon mean that not all sub-sections were selected.
    Example: Check the "My computer" icon to quickly set for a complete system scan.
    Note
    : To start the scanning process, simply click the "Scan" button on the right .

     

     

    5.0 System Scanning Back to Top -->

     

     

    Note: Depending on your selection, the scan may take from a second up to a few minutes.
     

     

     

    The scan summary shows how many of each type of spy-ware components were found. In the above example we show that it found 1 spyware registry keys, 25 spy-ware files, 0 spy-ware folders, and none were ignored from a previous scan.


     

    5.1 Spyware types:   Back to Top -->

    • Memory process

    • Spy File

    • Spy Folder

    • Spy Registry

    • Spy Cookie

     

    5.2 Adding components to the Exclude list?   Back to Top -->

    Simply select the components you want to Exclude, and click the Exclude button

     

    5.3 Backing up components?   Back to Top -->

    Simply click the backup button

     

    5.4 Deleting components?   Back to Top -->

    Simply select the components you want to remove, and click the "Next" button

    Note: It's always a good idea to backup first.

     

    Note: During the scan, you can stop the scanning process at any time by simply clicking the button.

     

    What if I don't see any new components from the scan?
    congratulations! you don't have any new spyware components found..

    Note: Some components need a reboot to be removed, since they may be locked by a running process.

     

     



     

    6.0 Backup Management Back to Top -->

     

     

    6.1 Restoring from a backup?    Back to Top -->
     

    To restore components from a backup do the following:

    Step 1) Click the backup button from the main window to open the backup manager.

     

    Step 2) Choose the desired backup from the list.


    Step 3) After selecting the backup, click the "Restore" button to restore the backed up components.


    Note: You can change the backup folder path from the options window.

     

     

    7.0 Multi-Language Support Back to Top -->

     

     

    7.1 Adding your own language modules:  Back to Top -->

    Step 1) Copy the "English.ini" file located in the installation folder/Lang, and name it with the name of the language you are making.

    Example: Japanese.ini.
    Note: Don't change the file extension, keep it as ".INI".

     

    Step 2) Make an icon 16x16 pixels with the flag for your country language pack, and save it in bitmap format.

    Example: Japanese.bmp

    Note: It must have the same name as the language.ini file, and have the extension ".BMP"


    Step 3) Edit the file with notepad or any text pad.

    Example:

     

    ;Backup Window <--- This line is a comment since it starts with the  ";"

    1400=Restore
    1401=Clean
    1402=Cancel

     

    The strings will be changed to your language

    Example to change them to French:

     

    ; Fenętre auxiliaire

    1400=restaurez
    1401=propre
    1402=annulez

    Note : Make sure you don't change the line numbers, leave them in English, and keep the string length about the same if possible. You may test it out to see if it exceeds the button size etc..



    7.2 Special characters:   Back to Top -->

    • Line Breaks:  # - used in long strings.

    • Comments:    ; -  will not displayed.


    Note: After saving the file, simply supply a 16 x 10 or 16x16 bitmap that represents country Flag.
    Note: The flag image file, and the ini files, both must have the same name.

    Example :
    Japanese.ini 
    Japanese.bmp
     

     

    8.0 License Agreement Back to Top -->

    PLEASE READ THIS END USER LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE CHOOSING THE "YES" OPTION BELOW. BY CHOOSING "YES," YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, THEN LIONS PRIDE ENTERPRISES, INC. AND DBA BLUEHAVENMEDIA.COM (HEREINAFTER COLLECTIVELY "TREK BLUE") DOES NOT CONSENT TO LICENSE THE SOFTWARE TO YOU, AND YOU SHOULD NOT USE THE SOFTWARE. BY INSTALLING, DOWNLOADING, COPYING, OR OTHERWISE USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ THESE TERMS AND CONDITIONS, UNDERSTAND THEM, AND AGREE TO BE BOUND BY THEM. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, YOU ARE NOT AUTHORIZED AND MAY NOT USE THE SOFTWARE. 

    1. LICENSE

    The "Trek Blue" software and/or programs (the "’Trek Blue’ Program[s]" or "program[s]"), documentation and any fonts accompanying this License whether on disk, in read only memory, on any other media or in any other form are licensed to you by "Trek Blue." The program(s) may include added technology which allows "Trek Blue" to provide applications which compliment or enhance the "Trek Blue" application(s). You own the media on which the program(s) is recorded but "Trek Blue" retains title to the "Trek Blue" Program(s). The "Trek Blue" Program(s) and any copies that this License authorizes you to make are subject to this License.


    2. PERMITTED USES AND RESTRICTIONS

    This License allows you to install and use the "Trek Blue" Program(s) on your private computer. Any saved or archived "Trek Blue" Program(s) must include all copyright information and related License documentation contained on the original. You may NOT decompile, reverse engineer, disassemble, modify, rent, lease, distribute, make any commercial use of or create derivative works based upon the "Trek Blue" Program(s) in whole or part. You acknowledge that "Trek Blue" may, at their sole discretion and for any purpose, provide updates, automatic or otherwise, to the "Trek Blue" Program(s) (including but not limited to the advertising or other value-added software and technology described in paragraph 4, below); by your use of the "Trek Blue" Program(s) you acknowledge your desire to receive these updates. Your rights under this License will terminate automatically without notice from "Trek Blue" Program(s) if you fail to comply with any term(s) of this License. 

    3. PERSONAL USE ONLY FOR ENTERTAINMENT PURPOSES

    The entertainment portion of the "Trek Blue" Program(s) is made available for your personal, non-commercial use only. You may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, or sell any information, software, products or services obtained from the "Trek Blue" Program(s). Use of the functional or entertainment portion of the "Trek Blue" Program(s) for any purpose other than personal use or entertainment is expressly forbidden. 

    4. ACKNOWLEDGEMENT OF VALUE-ADDED APPLICATIONS

    You acknowledge that the "Trek Blue" Program(s) include technology which allows "Trek Blue" to provide auto-updates to the software directly to your computer to make sure you are always running the most current version of the software. By installing, downloading, copying, updating or otherwise using the "Trek Blue" Program(s), you specifically agree to include and/or accept the noted software and technology through which "Trek Blue" provides upgrades to your computer.

    5. COMPLIANCE WITH LAWS

    As a condition precedent to your use of the "Trek Blue" Program(s), you agree to comply with all laws and regulations applicable to your use of "Trek Blue" Program(s) including but not limited to US and international copyright and all intellectual property laws, obscenity, possession and distribution of child pornography, violence against racial and/or gender groups, and other prohibited pornographic materials pursuant to federal, state and local laws. Specifically, you acknowledge that the "Trek Blue" Program(s) is useful for personal entertainment only. You acknowledge that images, portrayals, depictions, or other representations of public events and personalities, if any, qualify as a "fair use" and/or "parody" under state, federal and international definitions thereof. Finally, you acknowledge that the "Trek Blue" Program(s) is a personal search tool and may NOT be used to:
    - Transmit any content that is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, invasive of another's privacy, hateful, or racially, ethnically or otherwise objectionable;
    - Harm minors in any way;
    - Impersonate any person or entity or falsely state or otherwise misrepresent your affiliation with a person or entity;
    - Forge headers or otherwise manipulate identifiers in order to disguise the origin of any content transmitted through any means;
    - Transmit any content that you do not have a right to transmit under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);
    - Transmit any content that infringes any patent, trademark, trade secret, copyright or other proprietary rights of any party;
    - Transmit any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
    - Intentionally or unintentionally violate any applicable local, state, national or international law, including securities exchange and any regulations having the force of law; 
    - "Stalk" or otherwise harass another; or 
    - Collect or store personal data about other users. You acknowledge and agree that "Trek Blue" may preserve content and may also disclose content if required to do so by law or in the good faith belief that such preservation or disclosure is reasonable necessary to:
    (a) comply with legal process;
    (b) enforce this Agreement;
    (c) respond to claims that any content violates the rights of third-parties; or 
    (d) protect the rights, property, or personal safety of "Trek Blue", its users and the public.
    - Monitor network traffic or make search requests in order to accumulate information about individual users.

    6. DISCLAIMER OF WARRANTIES

    THE "TREK BLUE" PROGRAM(S) IS PROVIDED ON AN "AS IS" AND "AS AVAILABLE" BASIS. "TREK BLUE" MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE OPERATION OF THE "TREK BLUE" PROGRAM(S) OR THE USE OR THE RESULTS OF THE USE OF THE"TREK BLUE" PROGRAM(S). YOU EXPRESSLY AGREE THAT YOUR USE OF THE "TREK BLUE" PROGRAM(S) IS AT YOUR SOLE RISK. "TREK BLUE" EXPRESSLY DISCLAIMS TO THE FULLEST EXTENT PERMITTED BY LAW ALL EXPRESS, IMPLIED, AND STATUTORY WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF PROPRIETARY RIGHTS. "TREK BLUE" DISCLAIMS ANY WARRANTIES REGARDING THE SECURITY, RELIABILITY, TIMELINESS, AND PERFORMANCE OF THE SERVICES. "TREK BLUE" DISCLAIMS, ANY WARRANTIES FOR ANY INFORMATION OR ADVICE OBTAINED THROUGH THE "TREK BLUE" PROGRAM(S). "TREK BLUE" DISCLAIMS ANY WARRANTIES FOR SERVICES OR GOODS RECEIVED THROUGH THE "TREK BLUE" PROGRAM(S) OR RECEIVED THROUGH ANY PROVIDED BY THE "TREK BLUE" WEB SITE OR ANY USE OF THE "TREK BLUE" PROGRAM(S). "TREK BLUE" DOES NOT WARRANT THAT THE "TREK BLUE" PROGRAM(S), THE "TREK BLUE" SERVERS, OR E-MAIL SENT FROM "TREK BLUE" ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS.

    CERTAIN STATE LAWS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR THE EXCLUSION OR LIMITATION OF CERTAIN DAMAGES. IF THESE LAWS APPLY TO YOU, SOME OR ALL OF THE ABOVE DISCLAIMERS, EXCLUSIONS, OR LIMITATIONS MAY NOT APPLY TO YOU. 

    7. LIMITATION OF LIABILITY

    IN NO EVENT SHALL "TREK BLUE" BE LIABLE FOR ANY DIRECT, INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR NEGLIGENCE, DEFAMATION, COPYRIGHT OR ANY OTHER CLAIMS, ARISING OUT OF OR IN ANY WAY CONNECTED WITH THE USE OR PERFORMANCE OF THE "TREK BLUE" PROGRAM(S) , WITH THE DELAY OR INABILITY TO USE THE "TREK BLUE" PROGRAM(S) , THE PROVISION OF OR FAILURE TO PROVIDE SERVICES, OR FOR ANY INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS OBTAINED THROUGH THE "TREK BLUE" PROGRAM(S) OR OTHERWISE ARISING OUT OF THE USE OF THE "TREK BLUE" PROGRAM(S), WHETHER BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY OR OTHERWISE, EVEN IF USER HAS BEEN ADVISED OF THE POSSIBILITY OF DAMAGES.

    BECAUSE CERTAIN STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IF YOU ARE DISSATISFIED WITH ANY PORTION OF THE "TREK BLUE" PROGRAM(S) , OR WITH ANY OF THESE TERMS OF USE, YOUR SOLE AND EXCLUSIVE REMEDY IS TO DISCONTINUE USING THE "TREK BLUE" PROGRAM(S) .

    8. COPYRIGHT

    "Spyware Nuker" and other "Trek Blue" Program(s) and are the property of "Trek Blue" and protected by United States and international copyright laws.

    9. TRADEMARKS

    "Spyware Nuker" and "Trek Blue" are trademarks of "Trek Blue". You agree not to display or use such trademarks in any manner without "Trek Blue"'s express written prior permission.

    10. EXPORT LAW ASSURANCES

    You may not use or otherwise export or re-export the "Trek Blue" Program(s) except as authorized by United States law and the laws of the jurisdiction in which the "Trek Blue" Program(s) was obtained.

    11. MISCELLANEOUS

    The License constitutes the entire agreement between you and "Trek Blue" Program(s) and govern your use of the "Trek Blue" Program(s), superceding any prior agreements between you and "Trek Blue". You also may be subject to additional terms and conditions that may apply when you use affiliate services, third-party content or third-party software. The License and the relationship between you and "Trek Blue" shall be governed by the laws of the State of California without regard to its conflict of law provisions. "Trek Blue" may amend the License at any time by a notice on the "Trek Blue" web site, which shall be binding upon you. You may not revise or amend the License without the prior written authorization of an officer of "Trek Blue". You hereby irrevocably consent to the personal and exclusive jurisdiction of the courts located within the County of San Diego, State of California in all disputes arising out of or relating to the use of the "Trek Blue" Program(s). The failure of "Trek Blue" to exercise or enforce any right or provision of the License shall not constitute a waiver of such right or provision. If any provision of the License is found by a court of competent jurisdiction to be invalid, the parties nevertheless agree that the court should endeavor to give effect to the parties' intentions as reflected in the provision, and the other provisions of the License remain in full force and effect. You agree to indemnify and hold "Trek Blue", its parents, subsidiaries, affiliates, officers, directors and employees, harmless from any claim, demand, or damage, including reasonable attorneys' fees, asserted by any third party due to or arising out of your use of the "Trek Blue" Program(s).

     Back to Top -->