title
Removing Spyware and Malware from a Windows PC Using Spybot Search and Destroy

description
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: January 16, 2012 Length of Class: 43 Minutes Tracks Computer Security /Integrity Computer Repair Prerequisites Simple Windows PC Tune Up Cleaning an Infected Windows PC Purpose of Class This class teaches students how to remove spyware and malware from their Windows PC using Spybot Search and Destroy Chapters Introduction (00:00) First Steps (07:43) Spybot Search and Destroy (13:20) Demonstration (28:09) Final Thoughts (33:26) Class Notes Introduction Spyware and Malware tries to make your computer do things you do not want it to do, not destroy it. Spyware can generally be removed fairly easily Spybot Search and Destroy has been a solid product for many years and is free First Steps First do a basic PC Tune Up: Delete temp Files, Uninstall Crapware, Disable Startup Items Verify AntiVirus is installed and working AntiVirus Software removes PUPs - Potentially Unwanted Programs, that are almost always unwanted. Install ALL Updates: Make sure Internet Explorer is up to date, Install ALL Windows Updates, Install Latest Java, Install latest Flash and Adobe Reader. Spybot Search and Destroy Eli suggests that you do not use Tea Timer - a Registry Guard When you start Spybot Right Click Icon and Select "Run as Administrator" Immunize System - This edits the HOSTS file for DNS protection and locks it. It additionally closes other holes. Demonstration Final Thoughts If Spybot does not remove the spyware you can try other Anti Spyware software (Malwarebytes, Combofix, AdAware, etc.) After the spyware has been removed uninstall any additional Anti Spyware software you have installed To protect your system in the future use Google Chrome, Firefox or Safari to prevent getting malware in the future. (Or buy a Mac) Resources Spybot Search and Destroy

detail
{'title': 'Removing Spyware and Malware from a Windows PC Using Spybot Search and Destroy', 'heatmap': [{'end': 1273.282, 'start': 1238.848, 'weight': 0.949}, {'end': 1452.331, 'start': 1395.394, 'weight': 0.838}, {'end': 1770.412, 'start': 1639.328, 'weight': 0.774}], 'summary': 'Tutorial covers the process of removing spyware and malware from a windows pc using spybot search and destroy, including system immunization, scanning, and installation details, emphasizing the efficacy of spybot search and destroy in detecting and removing infections, and the importance of updating software for protection against vulnerabilities.', 'chapters': [{'end': 405.262, 'segs': [{'end': 49.612, 'src': 'embed', 'start': 28.466, 'weight': 2, 'content': [{'end': 38.569, 'text': 'Now, if you saw one of my previous courses on cleaning an infection from a PC, you know that when I talk about computers having viruses,', 'start': 28.466, 'duration': 10.103}, {'end': 42.09, 'text': 'I say it is best to simply do a wipe and reload of the system.', 'start': 38.569, 'duration': 3.521}, {'end': 49.612, 'text': 'That is not worth trying to rip a virus out of a PC because you never know whether or not you have really gotten it.', 'start': 42.13, 'duration': 7.482}], 'summary': 'Best approach to dealing with viruses: wipe and reload system.', 'duration': 21.146, 'max_score': 28.466, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q28466.jpg'}, {'end': 240.769, 'src': 'embed', 'start': 148.724, 'weight': 0, 'content': [{'end': 161.334, 'text': "basically what the creator of it is trying to do it is They are trying to get more hits to their website so that they can hopefully get somebody to buy their pornography or whatever it is that they're trying to sell.", 'start': 148.724, 'duration': 12.61}, {'end': 170.423, 'text': 'Why wait for somebody to Google to get to your website if you can just try to force them to go to your website automatically?', 'start': 162.635, 'duration': 7.788}, {'end': 180.609, 'text': 'So with this type of software, you can actually remove it from your system many times relatively easily and your system will be okay,', 'start': 171.624, 'duration': 8.985}, {'end': 182.991, 'text': "because again it's not getting in there.", 'start': 180.609, 'duration': 2.382}, {'end': 185.212, 'text': "It's not really damaging your system.", 'start': 183.031, 'duration': 2.181}, {'end': 188.154, 'text': "Basically, it's trying to take over Internet Explorer settings.", 'start': 185.252, 'duration': 2.902}, {'end': 190.675, 'text': "It's trying to steal some information from you.", 'start': 188.514, 'duration': 2.161}, {'end': 195.718, 'text': "It's trying to do stuff that you don't want done.", 'start': 191.055, 'duration': 4.663}, {'end': 200.423, 'text': "But at the same hand, it's not necessarily trying to crash your computer.", 'start': 196.96, 'duration': 3.463}, {'end': 203.165, 'text': 'So a virus, a virus gets into your computer.', 'start': 200.463, 'duration': 2.702}, {'end': 204.706, 'text': 'It tries to replicate itself.', 'start': 203.325, 'duration': 1.381}, {'end': 206.147, 'text': 'It tries to crash your computer.', 'start': 205.026, 'duration': 1.121}, {'end': 208.409, 'text': 'It tries to do all kinds of nasty stuff.', 'start': 206.167, 'duration': 2.242}, {'end': 215.934, 'text': "Spyware is simply trying to get your computer to do stuff that you don't necessarily want it to do.", 'start': 209.089, 'duration': 6.845}, {'end': 223.6, 'text': "Now, one of the things with this, when you're dealing with viruses and when you're dealing with spyware, spyware can be very virus-like.", 'start': 216.355, 'duration': 7.245}, {'end': 227.184, 'text': 'And viruses can have a lot of spyware functionality.', 'start': 224.031, 'duration': 3.153}, {'end': 236.667, 'text': "So you, as a professional, have to decide when whatever you're dealing with is spyware or if it's a virus.", 'start': 227.961, 'duration': 8.706}, {'end': 240.769, 'text': 'So it sometimes can be a difficult call.', 'start': 237.067, 'duration': 3.702}], 'summary': 'Spyware aims to manipulate systems for unauthorized actions, distinct from viruses.', 'duration': 92.045, 'max_score': 148.724, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q148724.jpg'}, {'end': 382.355, 'src': 'embed', 'start': 336.859, 'weight': 5, 'content': [{'end': 339.982, 'text': 'So back when I started, Spybot Search and Destroy was the absolute best.', 'start': 336.859, 'duration': 3.123}, {'end': 351.005, 'text': "And then it was AdAware and then it was like spy doctor something or other, and now it's probably like malware bites, is one of the best detection,", 'start': 340.783, 'duration': 10.222}, {'end': 355.55, 'text': 'but spy bot always consistently stays in the one, two or three spot.', 'start': 351.005, 'duration': 4.545}, {'end': 358.454, 'text': 'it is always been a very good piece of software,', 'start': 355.55, 'duration': 2.904}, {'end': 366.922, 'text': "so teaching you guys a class today it's something that I'm confident six months or a year or two years is still going to be good for you to use.", 'start': 358.454, 'duration': 8.468}, {'end': 372.707, 'text': 'one of the reasons I like spy bot 2 is not only does it detect the spyware and malware,', 'start': 366.922, 'duration': 5.785}, {'end': 382.355, 'text': 'but it also tries to immunize your system to prevent spyware and malware from getting on your computer and causing more problems for you also.', 'start': 372.707, 'duration': 9.648}], 'summary': 'Spybot search and destroy consistently stays in the top 3 spots for detection, with spybot 2 also immunizing systems against spyware and malware.', 'duration': 45.496, 'max_score': 336.859, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q336859.jpg'}], 'start': 5.316, 'title': 'Removing spyware from windows pc', 'summary': 'Covers the process of removing spyware and malware from a windows pc, emphasizing the differences between viruses, spyware, and malware, and the intention behind spyware and malware, with a focus on using spybot search and destroy. it also discusses the potential damage caused by spyware and the efficacy of spybot search and destroy in detecting and immunizing systems, emphasizing its consistent performance and free availability.', 'chapters': [{'end': 170.423, 'start': 5.316, 'title': 'Removing spyware from windows pc', 'summary': 'Covers the process of removing spyware and malware from a windows pc, emphasizing the differences between viruses, spyware, and malware, and the intention behind spyware and malware, with a focus on using spybot search and destroy.', 'duration': 165.107, 'highlights': ['Spyware and malware are not necessarily the same thing as viruses, with the former aiming to get the computer to perform specific actions rather than causing damage.', 'The creator of spyware and malware aims to get more hits to their website by forcing users to visit it automatically, rather than relying on organic traffic through search engines.', 'The recommendation to wipe and reload the system is emphasized when dealing with viruses, as it is often difficult to ensure complete removal of the virus from the PC.']}, {'end': 405.262, 'start': 171.624, 'title': 'Understanding spyware and using spy bot', 'summary': 'Discusses the differences between viruses and spyware, the potential damage caused by spyware, and the efficacy of spybot search and destroy in detecting and immunizing systems against spyware, emphasizing its consistent performance and free availability.', 'duration': 233.638, 'highlights': ['Spyware tries to take over Internet Explorer settings and steal information, but may not crash the computer, unlike viruses.', 'Professionals need to differentiate between spyware and viruses, as they can exhibit similar functionalities.', 'Spy Bot Search and Destroy has consistently ranked among the top security software, detecting and immunizing systems against spyware and malware.', 'Spy Bot Search and Destroy is generally free to download and use, providing an added advantage for users.']}], 'duration': 399.946, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q5316.jpg', 'highlights': ['Spyware and malware aim to get the computer to perform specific actions rather than causing damage.', 'The creator of spyware and malware aims to get more hits to their website by forcing users to visit it automatically.', 'The recommendation to wipe and reload the system is emphasized when dealing with viruses.', 'Spyware tries to take over Internet Explorer settings and steal information, but may not crash the computer, unlike viruses.', 'Professionals need to differentiate between spyware and viruses, as they can exhibit similar functionalities.', 'Spy Bot Search and Destroy consistently ranks among the top security software, detecting and immunizing systems against spyware and malware.', 'Spy Bot Search and Destroy is generally free to download and use, providing an added advantage for users.']}, {'end': 1019.097, 'segs': [{'end': 431.848, 'src': 'embed', 'start': 405.863, 'weight': 1, 'content': [{'end': 410.794, 'text': 'So in my book, Legally confusing as hell so I will use it for free.', 'start': 405.863, 'duration': 4.931}, {'end': 417.019, 'text': 'So, basically, with Spybot you get all the functionality seemingly for free, and they make it so convoluted.', 'start': 411.054, 'duration': 5.965}, {'end': 418.62, 'text': "I don't think they're going to sue you anymore.", 'start': 417.019, 'duration': 1.601}, {'end': 425.886, 'text': "where, unlike, let's say, with Spy Sweeper or Ad Aware or some of this other software, Malwarebytes,", 'start': 419.704, 'duration': 6.182}, {'end': 428.927, 'text': 'they do have pay-for versions that you have to pay for outright.', 'start': 425.886, 'duration': 3.041}, {'end': 431.848, 'text': "If you don't pay for it, you have flat out pirated the software.", 'start': 429.147, 'duration': 2.701}], 'summary': 'Spybot offers free functionality, unlike spy sweeper or ad aware which have pay-for versions.', 'duration': 25.985, 'max_score': 405.863, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q405863.jpg'}, {'end': 481.163, 'src': 'embed', 'start': 449.293, 'weight': 2, 'content': [{'end': 453.138, 'text': "All hunky-dory, all good, 99% of the time, everybody's happy.", 'start': 449.293, 'duration': 3.845}, {'end': 456.702, 'text': 'Spyware and malware is not the same as viruses.', 'start': 453.838, 'duration': 2.864}, {'end': 458.404, 'text': "You're going to have to make the call.", 'start': 456.922, 'duration': 1.482}, {'end': 460.947, 'text': "And when you're sitting down on a computer, do you think it's a virus??", 'start': 458.584, 'duration': 2.363}, {'end': 461.948, 'text': "Do you think it's spyware?", 'start': 461.147, 'duration': 0.801}, {'end': 472.434, 'text': 'So before we use Spybot, Search and Destroy to remove the spyware and malware from your computer,', 'start': 467.83, 'duration': 4.604}, {'end': 475.397, 'text': "we're going to have to do a couple of prerequisite steps.", 'start': 472.434, 'duration': 2.963}, {'end': 481.163, 'text': 'This is basically the same as whenever you sit down to a computer.', 'start': 476.658, 'duration': 4.505}], 'summary': '99% satisfaction rate, differentiate spyware from viruses, use prerequisite steps before removing spyware and malware.', 'duration': 31.87, 'max_score': 449.293, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q449293.jpg'}, {'end': 655.006, 'src': 'embed', 'start': 628.148, 'weight': 3, 'content': [{'end': 633.189, 'text': 'The next thing is you want to make sure that you have antivirus installed on your computer.', 'start': 628.148, 'duration': 5.041}, {'end': 640.672, 'text': 'Now as I talked about before, Viruses and spyware malware are two separate things.', 'start': 633.509, 'duration': 7.163}, {'end': 645.294, 'text': 'And you do need two separate pieces of software to deal with them.', 'start': 641.452, 'duration': 3.842}, {'end': 646.254, 'text': "I don't know why.", 'start': 645.454, 'duration': 0.8}, {'end': 647.415, 'text': 'It seems stupid.', 'start': 646.274, 'duration': 1.141}, {'end': 650.556, 'text': 'It seems like the antivirus companies have just all put it into the antivirus software.', 'start': 647.435, 'duration': 3.121}, {'end': 652.324, 'text': 'But I digress.', 'start': 651.363, 'duration': 0.961}, {'end': 655.006, 'text': 'You do have to have two different pieces of software to deal with them.', 'start': 652.584, 'duration': 2.422}], 'summary': "It's important to have separate antivirus and antispyware software installed on your computer.", 'duration': 26.858, 'max_score': 628.148, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q628148.jpg'}, {'end': 788.002, 'src': 'embed', 'start': 762.431, 'weight': 0, 'content': [{'end': 771.335, 'text': 'You do those, the Microsoft updates, Adobe updates, and Java updates, and that will solve a lot of the problems with some of the Spyware.', 'start': 762.431, 'duration': 8.904}, {'end': 772.995, 'text': 'So these are the preliminary steps.', 'start': 771.635, 'duration': 1.36}, {'end': 780.879, 'text': "So, before we jump in to using Spybot, Search and Destroy, we're going to do a basic tune-up clean out the temporary files, uninstall the crapware,", 'start': 773.015, 'duration': 7.864}, {'end': 788.002, 'text': 'disable the startup items, Make sure antivirus is installed, get rid of those pups potentially unwanted programs and then do all the updates.', 'start': 780.879, 'duration': 7.123}], 'summary': 'Perform microsoft, adobe, and java updates to solve spyware issues, then do a basic tune-up and clean out temporary files, uninstall crapware, disable startup items, and ensure antivirus is installed.', 'duration': 25.571, 'max_score': 762.431, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q762431.jpg'}], 'start': 405.863, 'title': 'Using spybot search and destroy', 'summary': 'Covers using spybot search and destroy to remove spyware and malware from a windows pc, as well as preliminary pc tune-up steps such as cleaning temporary files, uninstalling toolbars, and updating the system.', 'chapters': [{'end': 472.434, 'start': 405.863, 'title': 'Removing spyware and malware with spybot', 'summary': 'Explains how to remove spyware and malware from a windows pc using spybot search and destroy, emphasizing the difference between free and paid versions of similar software and the legality of using pirated software.', 'duration': 66.571, 'highlights': ['Spybot Search and Destroy offers free functionality unlike some other software like Spy Sweeper or Ad Aware, which have pay-for versions.', 'Using Spybot Search and Destroy to remove spyware and malware from a computer is legal and generally successful 99% of the time.', "It's illegal to use pirated software, so if you don't pay for software like Malwarebytes, you have flat out pirated it.", "Spyware and malware can generally be removed from a computer using tools like Spybot Search and Destroy, but it's important to differentiate between them and viruses.", 'The chapter emphasizes the importance of discerning between viruses and spyware/malware when deciding which tool to use for removal.']}, {'end': 1019.097, 'start': 472.434, 'title': 'Pc tune-up and spybot search and destroy', 'summary': 'Covers the preliminary steps for a pc tune-up, including cleaning temporary files, uninstalling toolbars, disabling unnecessary startup items, installing antivirus and updating the system, before diving into using spybot search and destroy for spyware scans.', 'duration': 546.663, 'highlights': ['Before using Spybot Search and Destroy, perform a PC tune-up by cleaning temporary files, uninstalling toolbars, disabling unnecessary startup items, installing antivirus, getting rid of potentially unwanted programs, and updating the system.', 'Uninstalling toolbars, considered as crapware, is essential to prevent problems such as Internet Explorer redirects and other issues caused by these applications.', 'Installing both antivirus and anti-spyware software, and ensuring they are up to date, is crucial for detecting and eliminating viruses, spyware, and potentially unwanted programs.']}], 'duration': 613.234, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q405863.jpg', 'highlights': ['Before using Spybot Search and Destroy, perform a PC tune-up by cleaning temporary files, uninstalling toolbars, disabling unnecessary startup items, installing antivirus, getting rid of potentially unwanted programs, and updating the system.', 'Spybot Search and Destroy offers free functionality unlike some other software like Spy Sweeper or Ad Aware, which have pay-for versions.', 'Using Spybot Search and Destroy to remove spyware and malware from a computer is legal and generally successful 99% of the time.', 'Installing both antivirus and anti-spyware software, and ensuring they are up to date, is crucial for detecting and eliminating viruses, spyware, and potentially unwanted programs.', 'The chapter emphasizes the importance of discerning between viruses and spyware/malware when deciding which tool to use for removal.']}, {'end': 1378.118, 'segs': [{'end': 1162.886, 'src': 'embed', 'start': 1114.542, 'weight': 0, 'content': [{'end': 1124.33, 'text': 'The host file, back with Windows XP, you know, Pre-Service Pack 2, This was the big attack vector for this malware and the spyware.', 'start': 1114.542, 'duration': 9.788}, {'end': 1129.673, 'text': 'It would go in, it would modify the host file, just like I talked about in that hacking DNS class.', 'start': 1124.39, 'duration': 5.283}, {'end': 1136.278, 'text': 'And then again, like I say, instead of going to facebook.com, you will go to sitonmyface.com.', 'start': 1130.034, 'duration': 6.244}, {'end': 1141.401, 'text': 'Instead of going to yahoo.com, you go to yippiesex.com, etc.', 'start': 1136.298, 'duration': 5.103}, {'end': 1143.863, 'text': 'Basically, this was all done through the host file.', 'start': 1141.842, 'duration': 2.021}, {'end': 1147.145, 'text': "And I'll show you that when we do the demonstration.", 'start': 1144.023, 'duration': 3.122}, {'end': 1153.537, 'text': "And then after you do the immunization, Then you're going to go in and then you're going to scan your system for spyware.", 'start': 1147.566, 'duration': 5.971}, {'end': 1159.843, 'text': 'And this is basically just a stock standard scam like you do with anything, antivirus or whatever.', 'start': 1154.338, 'duration': 5.505}, {'end': 1162.886, 'text': 'So you just basically hit scan and it will scan your whole system.', 'start': 1160.163, 'duration': 2.723}], 'summary': 'Malware targeted windows xp through host file, redirecting popular websites to malicious ones.', 'duration': 48.344, 'max_score': 1114.542, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1114542.jpg'}, {'end': 1211.045, 'src': 'embed', 'start': 1185.349, 'weight': 3, 'content': [{'end': 1190.014, 'text': 'So Spybot may give you the option, it may say, please reboot your system.', 'start': 1185.349, 'duration': 4.665}, {'end': 1197.014, 'text': "so that it can do a full scan before the service has started and it won't be able to uninstall the spyware.", 'start': 1190.629, 'duration': 6.385}, {'end': 1203.82, 'text': 'Just remember with this that when you reboot the system, it is not going to simply delete what it has already found.', 'start': 1197.555, 'duration': 6.265}, {'end': 1205.821, 'text': 'It is going to do another full scan.', 'start': 1204, 'duration': 1.821}, {'end': 1211.045, 'text': 'So if it took an hour to do a scan the first time, when you reboot, it is going to take you another hour.', 'start': 1205.841, 'duration': 5.204}], 'summary': 'Spybot may prompt system reboot for full scan, doubling the scan time.', 'duration': 25.696, 'max_score': 1185.349, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1185349.jpg'}, {'end': 1275.723, 'src': 'heatmap', 'start': 1238.848, 'weight': 5, 'content': [{'end': 1242.17, 'text': "We have Chrome opened, and I'm on Google.", 'start': 1238.848, 'duration': 3.322}, {'end': 1249.835, 'text': 'I just did a Google search for Spybot, and the first thing that comes up is the home of Spybot SND, Search and Destroy.', 'start': 1242.411, 'duration': 7.424}, {'end': 1254.278, 'text': "So the website we're going to be going to is www.safer-networking.org.", 'start': 1250.216, 'duration': 4.062}, {'end': 1257.313, 'text': 'All we do is click on this.', 'start': 1255.752, 'duration': 1.561}, {'end': 1261.595, 'text': 'So Spybot Search and Destroy, they have a few different products.', 'start': 1257.753, 'duration': 3.842}, {'end': 1267.199, 'text': 'So they have Spybot Search and Destroy, the bootable CD, Runalyzer, Filelyzer, Regulizer.', 'start': 1261.816, 'duration': 5.383}, {'end': 1268.86, 'text': "We'll probably do different classes on those.", 'start': 1267.259, 'duration': 1.601}, {'end': 1273.282, 'text': 'But what we want today is Spybot Search and Destroy.', 'start': 1269.36, 'duration': 3.922}, {'end': 1274.403, 'text': "So we're going to click on here.", 'start': 1273.362, 'duration': 1.041}, {'end': 1275.723, 'text': 'uh here.', 'start': 1275.283, 'duration': 0.44}], 'summary': 'Using chrome to access www.safer-networking.org, searching for spybot, and focusing on spybot search and destroy.', 'duration': 36.875, 'max_score': 1238.848, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1238848.jpg'}, {'end': 1318.881, 'src': 'embed', 'start': 1293.914, 'weight': 4, 'content': [{'end': 1301.861, 'text': 'so uh so, since we are professionals, remember, professionals need to worry about more than TCP, IP and spyware and all that.', 'start': 1293.914, 'duration': 7.947}, {'end': 1304.484, 'text': 'We need to worry about things like licenses.', 'start': 1301.901, 'duration': 2.583}, {'end': 1309.51, 'text': "So under here, under license agreement, I'm going to show you how convoluted this thing is.", 'start': 1304.945, 'duration': 4.565}, {'end': 1311.372, 'text': 'So it does say freeware.', 'start': 1310.131, 'duration': 1.241}, {'end': 1314.416, 'text': 'First of all, the reasons why Spybot Search and Destroy is free.', 'start': 1311.513, 'duration': 2.903}, {'end': 1318.881, 'text': "It's dedicated to a wonderful girl, blah, blah, blah, blah, blah.", 'start': 1315.557, 'duration': 3.324}], 'summary': 'Professionals need to worry about licenses, not just tcp/ip and spyware. spybot search and destroy is freeware due to dedication to a girl.', 'duration': 24.967, 'max_score': 1293.914, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1293914.jpg'}], 'start': 1021.653, 'title': 'System immunization and spyware scanning', 'summary': 'Discusses the process of immunizing the system to prevent malware or spyware from redirecting web traffic, and scanning for spyware. it also covers the use of spybot search and destroy for detecting and removing infections, including licensing terms for corporate users.', 'chapters': [{'end': 1162.886, 'start': 1021.653, 'title': 'System immunization and spyware scanning', 'summary': 'Discusses the process of immunizing the system to prevent malware or spyware from redirecting web traffic by modifying the host file, and then scanning the system for spyware.', 'duration': 141.233, 'highlights': ['Spybot modifies the host file to prevent malware from redirecting web traffic, which was a significant attack vector for malware and spyware in pre-Windows XP Service Pack 2, as demonstrated during the session.', 'Immunizing the system locks down holes in the Windows operating system to prevent undesirable activities by malware or spyware, with the host file being a critical target for manipulation by spyware, as it can redirect legitimate domains to harmful websites.', 'Scanning the system for spyware is a standard process, similar to antivirus scans, and involves scanning the entire system to detect and remove any spyware present.']}, {'end': 1378.118, 'start': 1162.986, 'title': 'Spybot search and destroy', 'summary': 'Discusses the process of using spybot search and destroy to detect and remove infections, including the option to reboot for a full scan, and the complexities of its licensing terms for corporate users.', 'duration': 215.132, 'highlights': ['Spybot Search and Destroy detects and removes infections, with the option to reboot for a full scan, which may take a significant amount of time.', 'Complexities in the licensing terms for corporate users of Spybot Search and Destroy, including additional costs for business editions despite being advertised as free.', 'Various products are offered by Spybot Search and Destroy, such as the bootable CD, Runalyzer, Filelyzer, and Regulizer.']}], 'duration': 356.465, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1021653.jpg', 'highlights': ['Immunizing the system locks down holes in the Windows operating system to prevent undesirable activities by malware or spyware, with the host file being a critical target for manipulation by spyware, as it can redirect legitimate domains to harmful websites.', 'Spybot modifies the host file to prevent malware from redirecting web traffic, which was a significant attack vector for malware and spyware in pre-Windows XP Service Pack 2, as demonstrated during the session.', 'Scanning the system for spyware is a standard process, similar to antivirus scans, and involves scanning the entire system to detect and remove any spyware present.', 'Spybot Search and Destroy detects and removes infections, with the option to reboot for a full scan, which may take a significant amount of time.', 'Complexities in the licensing terms for corporate users of Spybot Search and Destroy, including additional costs for business editions despite being advertised as free.', 'Various products are offered by Spybot Search and Destroy, such as the bootable CD, Runalyzer, Filelyzer, and Regulizer.']}, {'end': 1789.079, 'segs': [{'end': 1452.331, 'src': 'heatmap', 'start': 1378.878, 'weight': 0, 'content': [{'end': 1387.485, 'text': "Or like I say with Spybot, whether or not the licensing seems so damn convoluted that you can't imagine anybody could sue you anyway.", 'start': 1378.878, 'duration': 8.607}, {'end': 1390.488, 'text': "Like I say, if you read this, I really don't understand what they're talking about.", 'start': 1387.665, 'duration': 2.823}, {'end': 1392.349, 'text': "But anyways, that's the licensing there.", 'start': 1390.808, 'duration': 1.541}, {'end': 1393.33, 'text': "So we're going to go back.", 'start': 1392.449, 'duration': 0.881}, {'end': 1395.294, 'text': 'And then we will scroll up.', 'start': 1394.013, 'duration': 1.281}, {'end': 1399.256, 'text': 'And then all you do is you click on the link to download Spybot Search and Destroy.', 'start': 1395.394, 'duration': 3.862}, {'end': 1402.637, 'text': 'And then you have different mirrors here.', 'start': 1400.676, 'duration': 1.961}, {'end': 1406.239, 'text': "So we'll just go to File, Forum, Download.", 'start': 1402.657, 'duration': 3.582}, {'end': 1408.66, 'text': 'And then we do Download Spybot Search and Destroy.', 'start': 1406.279, 'duration': 2.381}, {'end': 1412.502, 'text': 'And we do Keep.', 'start': 1408.68, 'duration': 3.822}, {'end': 1415.027, 'text': "And so this isn't too big.", 'start': 1413.766, 'duration': 1.261}, {'end': 1421.369, 'text': "So with me, I have Comcast cable internet, so it's pretty quick, but it's about a 15.6 meg file.", 'start': 1415.067, 'duration': 6.302}, {'end': 1426.051, 'text': "So if you have Comcast, it'll take you that quick, and if you have DSL, it'll take you 10 times as long.", 'start': 1421.569, 'duration': 4.482}, {'end': 1430.893, 'text': "So all we're going to do, though, is we're going to double click on this, and then we're going to run.", 'start': 1426.451, 'duration': 4.442}, {'end': 1435.215, 'text': 'This is just a standard installer, yes.', 'start': 1430.913, 'duration': 4.302}, {'end': 1438.977, 'text': 'And then we do English.', 'start': 1435.235, 'duration': 3.742}, {'end': 1444.747, 'text': 'Next And then we do accept the agreement.', 'start': 1442.506, 'duration': 2.241}, {'end': 1447.869, 'text': 'Next Where are you going to install it? Next.', 'start': 1444.887, 'duration': 2.982}, {'end': 1449.43, 'text': 'All this stuff.', 'start': 1448.629, 'duration': 0.801}, {'end': 1452.331, 'text': 'Icons for blind user mode.', 'start': 1450.29, 'duration': 2.041}], 'summary': 'Downloading spybot search and destroy takes about 15.6 mb and comcast users experience quicker downloads.', 'duration': 42.491, 'max_score': 1378.878, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1378878.jpg'}, {'end': 1584.73, 'src': 'embed', 'start': 1551.43, 'weight': 2, 'content': [{'end': 1552.913, 'text': "We're going to do continue.", 'start': 1551.43, 'duration': 1.483}, {'end': 1555.319, 'text': "And we're going to do download.", 'start': 1552.933, 'duration': 2.386}, {'end': 1559.353, 'text': "It's going to download all these updates.", 'start': 1558.052, 'duration': 1.301}, {'end': 1561.895, 'text': "Just like everything else in the world, there's a million updates.", 'start': 1559.413, 'duration': 2.482}, {'end': 1568.239, 'text': 'And remember, for security software, new vulnerabilities come out like every couple of minutes.', 'start': 1561.955, 'duration': 6.284}, {'end': 1571.921, 'text': 'So whenever you run SpyBot, you always want to do an update.', 'start': 1568.459, 'duration': 3.462}, {'end': 1578.966, 'text': "Like literally, if you run it in the morning and it's the evening, do the updates again just to make sure that you've got everything.", 'start': 1571.941, 'duration': 7.025}, {'end': 1584.73, 'text': 'Now, close and cancel.', 'start': 1580.127, 'duration': 4.603}], 'summary': 'Regularly update spybot for security; new vulnerabilities emerge frequently.', 'duration': 33.3, 'max_score': 1551.43, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1551430.jpg'}, {'end': 1770.412, 'src': 'heatmap', 'start': 1607.131, 'weight': 3, 'content': [{'end': 1614.796, 'text': "Now what you want to do when you're going to be running SpyBot is you right click, and as I say, you do this run as administrator.", 'start': 1607.131, 'duration': 7.665}, {'end': 1619.72, 'text': 'If you do not run SpyBot Search and Destroy as an administrator, it is going to cause problems.', 'start': 1614.896, 'duration': 4.824}, {'end': 1621.401, 'text': "I'm going to tell you, it's going to cause problems.", 'start': 1619.74, 'duration': 1.661}, {'end': 1626.064, 'text': 'So with the icon, make sure to right click, and then do run as administrator.', 'start': 1621.881, 'duration': 4.183}, {'end': 1629.927, 'text': "And of course, it's going to give you this warning, and you're going to say yes.", 'start': 1626.704, 'duration': 3.223}, {'end': 1640.749, 'text': "and then it's going to open up.", 'start': 1639.328, 'duration': 1.421}, {'end': 1644.551, 'text': 'Now the first thing that we are going to do is we are going to immunize a system.', 'start': 1640.949, 'duration': 3.602}, {'end': 1646.492, 'text': 'So we click on the immunize button.', 'start': 1644.611, 'duration': 1.881}, {'end': 1652.115, 'text': "It's going to search and it's going to look for vulnerabilities.", 'start': 1649.094, 'duration': 3.021}, {'end': 1655.557, 'text': "So what we're going to do is we're going to check again.", 'start': 1652.395, 'duration': 3.162}, {'end': 1658.339, 'text': 'So this is where we check to see what the vulnerabilities are.', 'start': 1655.657, 'duration': 2.682}, {'end': 1666.673, 'text': "We're going to see that we have currently 80, 000 vulnerabilities protected, and 104, 000 unprotected.", 'start': 1658.859, 'duration': 7.814}, {'end': 1671.817, 'text': 'All you do is you leave all these things checked, and then you just hit the immunize button.', 'start': 1667.274, 'duration': 4.543}, {'end': 1678.221, 'text': 'So this will automatically fix all those problems and protect all the issues that you might have on your computer.', 'start': 1672.297, 'duration': 5.924}, {'end': 1680.162, 'text': 'This can take a couple of minutes.', 'start': 1678.781, 'duration': 1.381}, {'end': 1683.064, 'text': "Generally, it's not too bad.", 'start': 1681.503, 'duration': 1.561}, {'end': 1685.866, 'text': 'It usually takes somewhere under three minutes to do.', 'start': 1683.084, 'duration': 2.782}, {'end': 1693.043, 'text': 'And so Spybot has immunized the system now.', 'start': 1689.861, 'duration': 3.182}, {'end': 1697.766, 'text': 'So basically, we just checked for the system, then we clicked the Immunize, and then it finished.', 'start': 1693.343, 'duration': 4.423}, {'end': 1700.948, 'text': 'So this total thing, we did a little time lapse here.', 'start': 1698.286, 'duration': 2.662}, {'end': 1704.41, 'text': 'But this little thing took about five minutes to do.', 'start': 1700.988, 'duration': 3.422}, {'end': 1711.474, 'text': 'So now all these holes have been protected within Windows and Internet Explorer.', 'start': 1704.97, 'duration': 6.504}, {'end': 1714.916, 'text': 'So things like cookies and domains and all that kind of stuff.', 'start': 1711.534, 'duration': 3.382}, {'end': 1722.461, 'text': 'Now as I said before, one of the really interesting things with the immunization is it modifies your host file.', 'start': 1715.477, 'duration': 6.984}, {'end': 1727.045, 'text': 'So the host file is used in DNS, Donate Name Services Resolution.', 'start': 1722.581, 'duration': 4.464}, {'end': 1739.535, 'text': 'So, if we want to look at the host file, we go to C, we go to Windows, we go to System32, we go to Drivers,', 'start': 1727.545, 'duration': 11.99}, {'end': 1742.717, 'text': 'we go to ETC and then we go to the hosts file.', 'start': 1739.535, 'duration': 3.182}, {'end': 1745.019, 'text': 'We can right-click this, and we can do Edit It.', 'start': 1742.877, 'duration': 2.142}, {'end': 1758.538, 'text': 'And what you will see is within the host file, Spybot has inserted domain names to point back to 127.0.', 'start': 1746.518, 'duration': 12.02}, {'end': 1759.568, 'text': '0.1 So 127.0.', 'start': 1758.538, 'duration': 1.03}, {'end': 1765.79, 'text': '0.1 is something called the loopback address.', 'start': 1759.568, 'duration': 6.222}, {'end': 1770.412, 'text': 'This is the IP address of the network adapter on your computer all the time.', 'start': 1766.23, 'duration': 4.182}], 'summary': 'Running spybot as administrator, immunizing system, protecting 80,000 vulnerabilities in 5 minutes.', 'duration': 48.426, 'max_score': 1607.131, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1607131.jpg'}], 'start': 1378.878, 'title': 'Spybot search and destroy installation and usage', 'summary': 'Focuses on the installation and usage of spybot search and destroy, covering the convoluted licensing, a file size of 15.6 mb, varying download times, and the importance of immunization and updating for protection against vulnerabilities.', 'chapters': [{'end': 1449.43, 'start': 1378.878, 'title': 'Spybot search and destroy installation', 'summary': 'Highlights the process of downloading and installing spybot search and destroy, mentioning the convoluted licensing and the file size of 15.6 mb, with a note on the varying download times based on internet speed.', 'duration': 70.552, 'highlights': ['The file size of Spybot Search and Destroy is 15.6 MB, with faster download times for Comcast cable internet compared to DSL.', 'The licensing process for Spybot Search and Destroy is convoluted and hard to understand.']}, {'end': 1789.079, 'start': 1450.29, 'title': 'Spybot search & destroy installation and usage', 'summary': 'Discusses the installation and usage of spybot search & destroy, emphasizing the importance of immunization and the process of updating to protect against vulnerabilities.', 'duration': 338.789, 'highlights': ['Immunization process and its significance', 'Importance of updating for security software', 'Running SpyBot as an administrator']}], 'duration': 410.201, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1378878.jpg', 'highlights': ['The file size of Spybot Search and Destroy is 15.6 MB, with faster download times for Comcast cable internet compared to DSL.', 'The licensing process for Spybot Search and Destroy is convoluted and hard to understand.', 'Importance of updating for security software', 'Immunization process and its significance', 'Running SpyBot as an administrator']}, {'end': 2172.697, 'segs': [{'end': 1811.694, 'src': 'embed', 'start': 1789.619, 'weight': 3, 'content': [{'end': 1799.245, 'text': 'Now, what Spybot has done is it has redirected all of these really bad domain names just so it goes back to your computer.', 'start': 1789.619, 'duration': 9.626}, {'end': 1803.231, 'text': 'Essentially what this does is it kills the connection.', 'start': 1800.43, 'duration': 2.801}, {'end': 1811.694, 'text': "So if for some reason you go to firstpagehere.com, it'll just send you straight back to your computer and nothing else will happen.", 'start': 1803.691, 'duration': 8.003}], 'summary': 'Spybot redirects bad domain names to kill connection to your computer.', 'duration': 22.075, 'max_score': 1789.619, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1789619.jpg'}, {'end': 1955.819, 'src': 'embed', 'start': 1923.974, 'weight': 1, 'content': [{'end': 1926.695, 'text': "And all you're going to do is you're going to say Fix Selected Problems.", 'start': 1923.974, 'duration': 2.721}, {'end': 1928.696, 'text': 'So you click on this Fix Selected Problems.', 'start': 1926.935, 'duration': 1.761}, {'end': 1930.737, 'text': 'Do you want to remove these entries? Yes.', 'start': 1928.836, 'duration': 1.901}, {'end': 1932.338, 'text': 'And Fixed.', 'start': 1931.818, 'duration': 0.52}, {'end': 1935.64, 'text': "OK So that's all there is to running the scan.", 'start': 1932.738, 'duration': 2.902}, {'end': 1941.094, 'text': "Like I said, I doubt you understand what any of this says anyway, so don't uncheck it.", 'start': 1936.673, 'duration': 4.421}, {'end': 1944.896, 'text': "And that's what there is for SpyBot Search and Destroy.", 'start': 1942.555, 'duration': 2.341}, {'end': 1946.616, 'text': 'So we installed SpyBot.', 'start': 1944.916, 'duration': 1.7}, {'end': 1948.317, 'text': 'I showed you a little bit about the licensing.', 'start': 1946.776, 'duration': 1.541}, {'end': 1955.819, 'text': "When you're installing it, again, I would suggest you don't use TTimer, but that's kind of up to you.", 'start': 1949.197, 'duration': 6.622}], 'summary': 'Using spybot to fix selected problems and install with caution.', 'duration': 31.845, 'max_score': 1923.974, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1923974.jpg'}, {'end': 2020.28, 'src': 'embed', 'start': 1991.468, 'weight': 2, 'content': [{'end': 1992.951, 'text': "I just wouldn't mess with them if I were you.", 'start': 1991.468, 'duration': 1.483}, {'end': 1996.116, 'text': 'Everybody does certain things very well.', 'start': 1993.932, 'duration': 2.184}, {'end': 2001.224, 'text': 'The thing that Spybot does very well is the immunize and the removing the spyware part.', 'start': 1996.497, 'duration': 4.727}, {'end': 2004.63, 'text': "So with that, let's go back out to the real world and have some final thoughts.", 'start': 2001.745, 'duration': 2.885}, {'end': 2017.238, 'text': "So that's all there is to using Spybot Search and Destroy to remove the malware and spyware from your computer.", 'start': 2011.516, 'duration': 5.722}, {'end': 2020.28, 'text': "I showed you it's a pretty simple piece of software.", 'start': 2017.799, 'duration': 2.481}], 'summary': 'Spybot search and destroy excels at immunizing and removing spyware, making it effective and simple to use.', 'duration': 28.812, 'max_score': 1991.468, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1991468.jpg'}, {'end': 2065.907, 'src': 'embed', 'start': 2039.006, 'weight': 4, 'content': [{'end': 2044.912, 'text': "what you're going to do is first, you're going to do a basic tune-up of your computer using something like CC Cleaner.", 'start': 2039.006, 'duration': 5.906}, {'end': 2046.573, 'text': "So you're going to clean out the temporary files.", 'start': 2044.972, 'duration': 1.601}, {'end': 2049.376, 'text': "You're going to uninstall the crapware, the toolbars, et cetera.", 'start': 2046.593, 'duration': 2.783}, {'end': 2050.838, 'text': "You're going to disable startup items.", 'start': 2049.396, 'duration': 1.442}, {'end': 2053.179, 'text': 'Make sure that antivirus is installed.', 'start': 2051.297, 'duration': 1.882}, {'end': 2056.301, 'text': "Although we're dealing with spyware, you can also have viruses.", 'start': 2053.359, 'duration': 2.942}, {'end': 2061.464, 'text': 'Not only that, but the antivirus software can detect POPs, potentially unwanted programs.', 'start': 2056.681, 'duration': 4.783}, {'end': 2065.907, 'text': 'These are almost always unwanted programs, so you just want to be able to get rid of them.', 'start': 2062.004, 'duration': 3.903}], 'summary': 'Perform computer tune-up: clean files, uninstall crapware, disable startup items, ensure antivirus.', 'duration': 26.901, 'max_score': 2039.006, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2039006.jpg'}, {'end': 2104.462, 'src': 'embed', 'start': 2072.25, 'weight': 0, 'content': [{'end': 2076.393, 'text': 'Internet Explorer is the main weakness on your computer for all the spyware and malware.', 'start': 2072.25, 'duration': 4.143}, {'end': 2085.902, 'text': 'So, by simply updating it to the latest updates, you know, IE 9 currently or IE 8 on Windows XP, this can solve a lot of problems.', 'start': 2076.833, 'duration': 9.069}, {'end': 2090.748, 'text': 'Beyond that, you want to make sure you get the latest Adobe Reader, Adobe Flash, and Java.', 'start': 2086.143, 'duration': 4.605}, {'end': 2097.636, 'text': 'These are also other weaknesses that malware and spy working can try to get in there and mess with your system.', 'start': 2090.768, 'duration': 6.868}, {'end': 2104.462, 'text': 'When you go to download Spybot Search and Destroy, you can just do a Google, download it.', 'start': 2099.017, 'duration': 5.445}], 'summary': 'Updating internet explorer to ie 9 or ie 8 on windows xp, along with the latest adobe reader, adobe flash, and java, can solve many malware and spyware problems.', 'duration': 32.212, 'max_score': 2072.25, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2072250.jpg'}, {'end': 2179.68, 'src': 'embed', 'start': 2152.169, 'weight': 6, 'content': [{'end': 2155.99, 'text': "the more phone calls you're going to get for them and the more miserable everybody is going to be.", 'start': 2152.169, 'duration': 3.821}, {'end': 2160.052, 'text': "I'm not saying T-Timer is not a fine product.", 'start': 2156.73, 'duration': 3.322}, {'end': 2163.693, 'text': "I just think it is completely more trouble than it's worth.", 'start': 2160.572, 'duration': 3.121}, {'end': 2166.655, 'text': 'So I would say do not use T-Timer.', 'start': 2163.993, 'duration': 2.662}, {'end': 2168.215, 'text': "So you're going to install it.", 'start': 2167.115, 'duration': 1.1}, {'end': 2169.816, 'text': "You're going to do the run the updates.", 'start': 2168.475, 'duration': 1.341}, {'end': 2172.697, 'text': "Make sure you're updated with the latest updates just like anything else.", 'start': 2169.856, 'duration': 2.841}, {'end': 2174.958, 'text': "It's going to ask you if you want to back up the registry.", 'start': 2172.757, 'duration': 2.201}, {'end': 2176.559, 'text': 'You can.', 'start': 2175.899, 'duration': 0.66}, {'end': 2179.68, 'text': 'I guess the technical thing to say is that you should.', 'start': 2176.579, 'duration': 3.101}], 'summary': "T-timer is more trouble than it's worth, avoid using it to prevent phone calls and misery.", 'duration': 27.511, 'max_score': 2152.169, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2152169.jpg'}], 'start': 1789.619, 'title': 'Using spybot search and destroy', 'summary': 'Explains the process of using spybot search and destroy to remove malware and spyware from a computer, including basic computer tune-up steps and the importance of updating vulnerable software, taking around 15 minutes to complete, with the tool identifying and fixing tracking cookies on the system.', 'chapters': [{'end': 1968.965, 'start': 1789.619, 'title': 'Spybot search and destroy', 'summary': 'Explains how spybot search and destroy redirects harmful domain names to prevent infections and demonstrates the process of checking for and fixing problems, which took around 15 minutes to complete, with the tool identifying and fixing tracking cookies on the system.', 'duration': 179.346, 'highlights': ['Spybot redirects harmful domain names to prevent infections', 'Process of checking for and fixing problems with Spybot', 'Immunization and scanning with Spybot']}, {'end': 2172.697, 'start': 1969.225, 'title': 'Using spybot search and destroy', 'summary': 'Demonstrates the process of using spybot search and destroy to remove malware and spyware from a computer, including basic computer tune-up steps and the importance of updating internet explorer and other vulnerable software.', 'duration': 203.472, 'highlights': ['The chapter emphasizes the effectiveness of Spybot in immunizing and removing spyware from a computer, cautioning against meddling with advanced options in the software.', 'It is recommended to perform a basic tune-up of the computer using CC Cleaner, including cleaning out temporary files, uninstalling unwanted software, and disabling startup items.', 'The importance of updating Internet Explorer and other vulnerable software like Adobe Reader, Adobe Flash, and Java is stressed to mitigate the risk of malware and spyware.', 'The chapter advises against using T-Timer during the installation of Spybot, especially for clients, as it may lead to pop-ups and cause more problems.']}], 'duration': 383.078, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q1789619.jpg', 'highlights': ['The importance of updating vulnerable software like Internet Explorer, Adobe Reader, Adobe Flash, and Java is stressed', 'Process of checking for and fixing problems with Spybot', 'Immunization and scanning with Spybot', 'Spybot redirects harmful domain names to prevent infections', 'It is recommended to perform a basic tune-up of the computer using CC Cleaner', 'The chapter emphasizes the effectiveness of Spybot in immunizing and removing spyware from a computer', 'The chapter advises against using T-Timer during the installation of Spybot, especially for clients']}, {'end': 2633.757, 'segs': [{'end': 2201.088, 'src': 'embed', 'start': 2172.757, 'weight': 3, 'content': [{'end': 2174.958, 'text': "It's going to ask you if you want to back up the registry.", 'start': 2172.757, 'duration': 2.201}, {'end': 2176.559, 'text': 'You can.', 'start': 2175.899, 'duration': 0.66}, {'end': 2179.68, 'text': 'I guess the technical thing to say is that you should.', 'start': 2176.579, 'duration': 3.101}, {'end': 2182.782, 'text': 'I never do and it has never caused me a problem.', 'start': 2179.7, 'duration': 3.082}, {'end': 2186.984, 'text': "Once you do that, then you're going to immunize the system.", 'start': 2183.903, 'duration': 3.081}, {'end': 2192.465, 'text': 'So immunizing the system, as I showed you, it goes in, it changes the host file, it locks the host file, it does some other stuff,', 'start': 2187.004, 'duration': 5.461}, {'end': 2193.966, 'text': 'just basically to protect your system.', 'start': 2192.465, 'duration': 1.501}, {'end': 2198.307, 'text': 'And then you are going to scan for spyware, which is pretty simple.', 'start': 2194.306, 'duration': 4.001}, {'end': 2201.088, 'text': "You just hit scan, and then you hit fix, and then it's all good to go.", 'start': 2198.327, 'duration': 2.761}], 'summary': 'Immunize system, scan for spyware, and fix - all good to go.', 'duration': 28.331, 'max_score': 2172.757, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2172757.jpg'}, {'end': 2263.118, 'src': 'embed', 'start': 2215.666, 'weight': 1, 'content': [{'end': 2216.867, 'text': "It's not that it doesn't work.", 'start': 2215.666, 'duration': 1.201}, {'end': 2222.288, 'text': "It just doesn't quite work perfectly, work good.", 'start': 2218.347, 'duration': 3.941}, {'end': 2230.17, 'text': "So just when you're going to run Spybot Search and Destroy with Windows 7 or Vista, make sure to right-click and do Run as Administrator.", 'start': 2222.648, 'duration': 7.522}, {'end': 2231.711, 'text': "Yeah, and that'll.", 'start': 2230.19, 'duration': 1.521}, {'end': 2234.966, 'text': 'properly for you.', 'start': 2234.326, 'duration': 0.64}, {'end': 2237.307, 'text': 'Now this should get rid of the spyware, this should get rid of the malware.', 'start': 2235.006, 'duration': 2.301}, {'end': 2240.929, 'text': 'If you are certain, all you have is spyware and malware in your computer.', 'start': 2237.707, 'duration': 3.222}, {'end': 2244.37, 'text': "you don't think it's a virus infection and this doesn't get rid of it.", 'start': 2240.929, 'duration': 3.441}, {'end': 2248.972, 'text': 'you can use other anti-malware, other anti-spyware software now.', 'start': 2244.37, 'duration': 4.602}, {'end': 2253.193, 'text': 'Things such as ComboFix, Malwarebytes, etc.', 'start': 2249.372, 'duration': 3.821}, {'end': 2263.118, 'text': 'Remember, with virus software, anti-virus software, you never want to use more than one antivirus software on your computer one time.', 'start': 2253.473, 'duration': 9.645}], 'summary': 'For spybot search and destroy on windows 7 or vista, run as administrator. use other anti-malware tools if needed.', 'duration': 47.452, 'max_score': 2215.666, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2215666.jpg'}, {'end': 2399.667, 'src': 'embed', 'start': 2371.023, 'weight': 0, 'content': [{'end': 2374.448, 'text': "if you don't want to deal with virus or malware and spyware,", 'start': 2371.023, 'duration': 3.425}, {'end': 2382.094, 'text': 'the best thing to do is is have you or your clients not use Internet Explorer as your primary web browser.', 'start': 2374.448, 'duration': 7.646}, {'end': 2387.138, 'text': 'Internet Explorer is full of holes and vulnerabilities.', 'start': 2382.514, 'duration': 4.624}, {'end': 2393.302, 'text': 'The reason for this is because, way back in the day, back when they came out with Windows 95,', 'start': 2387.618, 'duration': 5.684}, {'end': 2399.667, 'text': 'they decided that Internet Explorer was going to become part of the Windows operating system.', 'start': 2393.302, 'duration': 6.365}], 'summary': 'Internet explorer is not recommended due to security vulnerabilities and integration with windows 95.', 'duration': 28.644, 'max_score': 2371.023, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2371023.jpg'}, {'end': 2619.536, 'src': 'embed', 'start': 2592.804, 'weight': 5, 'content': [{'end': 2596.506, 'text': "So if you don't want to be dealing with malware and spyware, etc.", 'start': 2592.804, 'duration': 3.702}, {'end': 2601.508, 'text': ', use Firefox, use Chrome, use Safari, or hell, use a Mac.', 'start': 2596.506, 'duration': 5.002}, {'end': 2603.608, 'text': 'Use a Mac or use Linux.', 'start': 2602.548, 'duration': 1.06}, {'end': 2608.31, 'text': "When we're talking about spyware and malware, we really are only talking about Windows PCs.", 'start': 2604.189, 'duration': 4.121}, {'end': 2611.852, 'text': "You don't really have this problem with Mac and you don't really have this problem with Linux.", 'start': 2608.71, 'duration': 3.142}, {'end': 2614.192, 'text': "It's all a Windows thing.", 'start': 2612.292, 'duration': 1.9}, {'end': 2617.874, 'text': "And beyond being a Windows thing, it's an Internet Explorer thing on Windows.", 'start': 2614.253, 'duration': 3.621}, {'end': 2619.536, 'text': 'Really, at the end of the day.', 'start': 2618.254, 'duration': 1.282}], 'summary': 'Use firefox, chrome, safari, or mac/linux to avoid spyware/malware. windows/ie are vulnerable.', 'duration': 26.732, 'max_score': 2592.804, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2592804.jpg'}], 'start': 2172.757, 'title': 'Spyware removal and internet explorer security risks', 'summary': 'Covers spyware removal techniques, including immunizing the system, scanning for spyware, and using anti-spyware software. it also discusses the security risks of internet explorer due to its integration with windows, emphasizing the recommendation to use alternative web browsers or operating systems to mitigate malware and spyware threats.', 'chapters': [{'end': 2371.023, 'start': 2172.757, 'title': 'Spyware removal techniques', 'summary': 'Discusses the process of immunizing the system, scanning for spyware, and using multiple anti-spyware software to protect the system, emphasizing the importance of running spybot search and destroy as an administrator and avoiding multiple antivirus software.', 'duration': 198.266, 'highlights': ['Immunizing the system involves changing and locking the host file to protect the system, followed by scanning for spyware and fixing any issues.', 'Running SpyBot Search and Destroy as an administrator is crucial for its proper functioning, as it may half-fail if not run as an administrator.', 'Using multiple pieces of anti-spyware software such as Malwarebytes, ComboFix, Adaware, and SpywareDoctor is recommended if SpyBot Search and Destroy does not resolve the issue.']}, {'end': 2633.757, 'start': 2371.023, 'title': 'Security risks of internet explorer', 'summary': "Explains the vulnerabilities of internet explorer due to its integration with the windows operating system, its additional functionality, and the recommendation to use alternative web browsers or operating systems to mitigate malware and spyware threats. internet explorer's vulnerabilities stem from its integration with the windows os, exposing it to a high risk of malware and spyware, making it essential to consider using alternative web browsers or operating systems to mitigate these threats.", 'duration': 262.734, 'highlights': ["Internet Explorer's integration with the Windows operating system and its additional functionality, such as ActiveX controls and FTP control, make it more vulnerable to malware and spyware compared to other web browsers.", 'Recommendation to use alternative web browsers such as Google Chrome, Firefox, or Safari, or alternative operating systems like Mac or Linux to avoid malware and spyware threats, particularly on Windows PCs.', 'Windows PCs are more susceptible to spyware and malware compared to Mac and Linux systems, with Internet Explorer being a significant contributing factor to the vulnerabilities on Windows.']}], 'duration': 461, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/FbzIGFayQ_Q/pics/FbzIGFayQ_Q2172757.jpg', 'highlights': ['Recommend using alternative web browsers or operating systems to mitigate malware and spyware threats', 'Using multiple anti-spyware software if SpyBot Search and Destroy does not resolve the issue', 'Running SpyBot Search and Destroy as an administrator is crucial for proper functioning', 'Immunizing the system involves changing and locking the host file to protect the system, followed by scanning for spyware and fixing any issues', "Internet Explorer's integration with Windows OS makes it more vulnerable to malware and spyware compared to other web browsers", 'Windows PCs are more susceptible to spyware and malware compared to Mac and Linux systems']}], 'highlights': ['Spybot Search and Destroy consistently ranks among the top security software, detecting and immunizing systems against spyware and malware.', 'Before using Spybot Search and Destroy, perform a PC tune-up by cleaning temporary files, uninstalling toolbars, disabling unnecessary startup items, installing antivirus, getting rid of potentially unwanted programs, and updating the system.', 'The importance of updating vulnerable software like Internet Explorer, Adobe Reader, Adobe Flash, and Java is stressed', 'Immunizing the system locks down holes in the Windows operating system to prevent undesirable activities by malware or spyware, with the host file being a critical target for manipulation by spyware, as it can redirect legitimate domains to harmful websites.', 'The recommendation to wipe and reload the system is emphasized when dealing with viruses.', 'Using Spybot Search and Destroy to remove spyware and malware from a computer is legal and generally successful 99% of the time.', 'Installing both antivirus and anti-spyware software, and ensuring they are up to date, is crucial for detecting and eliminating viruses, spyware, and potentially unwanted programs.', 'The importance of discerning between viruses and spyware/malware when deciding which tool to use for removal.', 'The importance of updating for security software', 'The chapter emphasizes the effectiveness of Spybot in immunizing and removing spyware from a computer']}