Anti-Spyware Software Sucks

from the so-much-for-that-plan dept

As spyware becomes a bigger and bigger issue for users, it's becoming clear that the current crop of anti-spyware tools is, in no way, keeping up with the spyware writers. A test of a variety of different anti-spyware tools shows that none of them work particularly well, and most do an awful job protecting your computer. In fact, it appears that some of the fee-based anti-spyware tools do even worse than the free ones. Still, even the best tool missed quite a bit. Considering the amount of spyware out there, and the overwhelming nuisance it causes, it's about time someone tried to take a much more holistic approach to stopping spyware, rather than simply trying to solve each case on a one-by-one basis.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymous Coward, 24 Nov 2004 @ 10:54am

    Shoot the messenger

    Thats right.
    Lets bitch & piss & moan about the anti-spyware guys that are TRYING to fix something that they never fucked up to begin with.
    Thats so fashionable nowdays. Don't bitch & piss & moan about the spyware companies ... nope, complain that the free tools don't work well enough.

    Whaaa ...

    In fact, I think we should have a class action lawsuit started against all these evil anti-spyware companies.

    link to this | view in chronology ]

    • icon
      Mike (profile), 24 Nov 2004 @ 11:29am

      Re: Shoot the messenger

      Uh... it wasn't shooting the messenger. It wasn't blaming the companies. The point was just to show that the tools aren't that effective which *is* important for people who think they're protecting themsevles, when they may not be.

      If you read this site, you know that we constantly write about the companies distributing spyware, but that doesn't mean weak tools should get a free pass.

      link to this | view in chronology ]

    • identicon
      Bryan, 25 Nov 2004 @ 4:09pm

      Re: Shoot the messenger

      WTF are you talking about? That was not a stab at the tools, you ignorant turd, it was simply a (correct) statement that the current selection of tools and their abilities is inadequate. Everyone knows the spyware writers/companies are to blame. Got any other painfully obvious views to share?

      link to this | view in chronology ]

  • icon
    Thomas Hawk (profile), 24 Nov 2004 @ 11:10am

    spyware

    Uhhhh can anyone say Firefox?

    link to this | view in chronology ]

    • identicon
      SkyeFox, 24 Nov 2004 @ 12:15pm

      Re: spyware

      You gotta love Firefox. I purposly went to a site that I knew from past experience would install a trojan (iwantsearch toolbar) on my computer. With Firefox it had no chance!

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 24 Nov 2004 @ 11:45am

    No Subject Given

    none of them works (plural) very well. None = not + one; singular

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 26 Nov 2004 @ 8:24am

    No Subject Given

    true. i found the best tool to be a registry guard. it keeps an eye on the registry keys used to run applications on system startup. this freeware tool name is winpatrol found at www.winpatrol.com

    link to this | view in chronology ]

  • identicon
    jeremiah, 28 Nov 2004 @ 2:47pm

    How-TO

    As an aside, I received a smart tip from a tech-saavy friend regarding the removal of mal/spyware.

    He uses two products: Spybot S&D and AdAware. The "trick" is to disable System Restore (on XP systems), and run the spyware removal stuff in Safe Mode (with network support for updates). Four passes and two reboots later, clean as a whistle.

    Oh, and tell your friends: DON'T INSTALL KAZAA.

    link to this | view in chronology ]

  • identicon
    Steve Mueller, 28 Nov 2004 @ 5:54pm

    Holistic?

    Considering the amount of spyware out there, and the overwhelming nuisance it causes, it's about time someone tried to take a much more holistic approach to stopping spyware, rather than simply trying to solve each case on a one-by-one basis.
    That's easy to say, but how do you actually do it? At least some people are trying to do something, even if they don't work perfectly. Some protection is better than none, as long as users realize that it's not perfect.

    Any holistic approach probably has to start with Microsoft, and SP2 may be a good start (preventing Browser Helper Objects from being installed, for example).

    Fortunately, I use Mozilla and don't have to worry as much about this.

    link to this | view in chronology ]

  • identicon
    True Orient, 8 Dec 2004 @ 4:16pm

    Disgusting Anti-spyware Methods!

    Disgusting Spyware Methods! Disgusting Anti-spyware Methods!

    DiamondCS is a reputable software firm that developed one of the best Anti-tojan applications I have seen, TDS-3. Unfortunately, DCS employs a hardcode technique that redirects the user to its site with numeric IP 64.91.255.87 upon pressing the F5 function key. Of course there is nothing wrong with this process. This fact could have remained unnoticed had it not been for a spate of really nasty IGN/CWS infections that showed the DCS redirects along with the nasties in hijacked Host files and shown below:
    O1 - Hosts: 69.20.16.183 auto.search.msn.com
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 64.91.255.87 www.dcsresearch.com
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch

    A quick google search of "O1 - Hosts: 64.91.255.87 www.dcsresearch.com" will provide at least 1,500 links (Yup! that many!). It should be noted that an HJT 01 entry will only appear if a Hostfile hijack is involved. Redirecting to the local host to will not appear in the HJT log. When asked about this, representatives of DCS at Wilders Security Forum replied that this is perfectly normal since it simply redirects from an alleged "bad site" to the legitimate DCS IP.

    If such were the intention, a simple redirect to the local host would have sufficed as this blocking technique is acceptable. However, redirecting to a preferred website is in any laguage, a hijack. This type of redirect is the method used by hijackers with the same objectives: redirecting to the chosen website. DCS cannot claim that since they are reputable, a redirect to their site is acceptable. No one has nor can given them that status. A hijack is a hijack is a hijack.... The method is absolutely wrong!

    Now comes an interesting scenario.

    Quote:
    "It’s becoming such a sizeable problem in the US that the Government voted unanimously in Spring 2004 to approve the first-ever anti-spyware bill. The Securely Protect Yourself Against Cyber Trespass (Spy Act), approved by the US House of Representatives, would levy fines up to $3 million for those who illegally collect personal information, change a browser's default home page or bookmarks, log keystrokes, or steal identities "

    Quoted from http://www.net-security.org/article.php?id=746

    Do you realize that if I invested in TDS3, bookmarked www.dcsresearch.com or set my homepage to www.dcsresearch.com, the chances are I will be redirected to DiamondCS? This can be documented and I can then sue DCS for illegally redirecting my browser, right? And all because DiamondCS has chosen to adopt a Trojan method instead of a Hostfile block or Help update? Think about it.

    Too, what are the chances of a crazy picking up this post and doing exactly the above? This is a possibility they brought upon themselves for insisting that what they were doing was simply protecting their interests. They chose the expedient/easier route now they are susceptible to para-legal issues.... Sooner or later, this will happen....

    Your thoughts?

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.