AntiSpyware 2009
Home | Worldwide Support    
Home AntiSpyware
   Download AntiSpyware
   AntiSpyware 2009
Spyware info:
   Spyware Questions
   Detection Criteria
   Spyware Behavior
   Types of Spyware
   Spyware Tips
   Spyware Symptoms
Glossary / Definitions :
   Browse By Name
   Browse By Category
Worldwide Support :
   Support Section
   Live Support!
   Contact us
Fast Free Anti Spyware Scan
AntiSpyware Free Sysytem Resouces
Anti-Spyware Free

AntiSpyware? 2009 Detection Criteria:

AntiSpyware? 2009, 2Squared Technologies' flagship software product, provides computer users across the globe with the industry's most advanced anti-spyware technology. Rather than taking a "one-category-fits-all" approach like many of the other inferior anti-spyware applications available on the market, AntiSpyware? 2009 implements a set standard of detection criteria as well as additional tools that allow you to see the details of each and every file and program recommended for deletion.


Understanding AntiSpyware? 2009's Detection Criteria
Top of page

While all spyware is not created equal, most of them do tend to have some traits and characteristics in common. When selecting a file for possible deletion, AntiSpyware? 2009 looks for specific red flags. These red flags include:

Licensing Flags

  • Unusual or unreasonable licensing requirements including the right to disable, block or remove other software programs (especially anti-virus and anti-spyware programs);

  • A license that grants the right to install other, unrelated software applications without the user's consent; and/or

  • A license that restricts removal of the software product.

Agreement Flags

  • Agreements that do not give a detailed account of what you are consenting to;

  • Programs that do not provide you with a user agreement in language that is easy to understand;

  • Agreements that have conflicting provisions within the agreement, have vague or misleading provisions, requires acceptance of terms that are not shown, do not provide value equal to the level of consent being provided or does not offer any way to save and/or print the user agreement.

Installation Flags

  • Questionable installation practices including no notice or need of consent for installation of the software;

  • Installation without notice of the purpose of the software;

  • Installation via security loopholes;

  • Installation of unrequested software that has been bundled with requested software; and/or

  • Installation from a questionable source, software installed due to misleading marketing techniques.

Configuration Flags

  • Programs that result in system configuration changes such as changes to your browser settings, homepage preferences, and default search settings as well as restriction of your ability to change these settings.

Internet Flags

  • Programs that affect your Internet experience such as programs that install unrequested toolbars, re-route your Internet path, block websites without user consent and change your privacy and security settings without your knowledge.

Dialer Flags

  • Programs that require dial-in to pay-per-minute or international phone numbers or programs that dial-up without a user's knowledge or consent.

Privacy Flags

  • Programs that put a user's privacy at risk including programs that collect your personal information;

  • Programs that collect and/or distribute information regarding your computer use and Internet activity; and/or

  • Programs that require breaking of encrypted files and/or programs that use questionable methods of data collection.

Performance Flags

  • Applications that cause performance issues including those that have unusually large bandwidth requirements; and/or

  • Programs that cause frequent system crashes and adversely affect your other software products.

Malware Flags

  • Programs that can cause significant harm to your hard drive including those that install Trojans and/or worms;

  • Programs that allow an unauthorized party to remotely control your computer;

  • Programs that can spread to other computers without authorization and can infect data and other programs; and/or

  • Programs that can destroy or delete other programs or data files.

Advertising Flags
  • Applications that create pop-up advertisements or display full-screen ads;

  • Programs that do not offer a direct way to remove the advertisements they display;

  • Applications that open up one window after another when you try to close the ad; and/or

  • Programs that place third-party advertisements on the desktop or within the start-up menu without authorization.

Removal Flags

  • Programs that do not offer an un-install application or do not clearly display their un-install features; and/or

  • Applications that require a live Internet connection for the un-install process or require a separate download for the un-install option or make un-installing the program unreasonably difficult or inconvenient.

Ever-Evolving Protection
Top of page

In addition to providing the most comprehensive spyware criteria in the industry, we also evaluate all spyware threats on a regular basis. Because the creators of software change their practices on occasion, we stop evaluating a software product as spyware if the creator ceases their questionable activities for a period of at least 12 months. This prevents you from being inundated with spyware alerts for products that pose no actual spyware threat.

Our Policy on Cookies
Top of page

AntiSpyware? 2009 will only detect and report a specific category of Internet cookies. Contrary to what many people believe, not all computer cookies are a threat. The only cookies you really need to concern yourself with are tracking cookies. These cookies track a user's Internet activity and put your privacy at risk. These are the cookies that AntiSpyware? 2009 will detect and remove.

Beyond The Security of Our Criteria Standards
Top of page

While it is true that AntiSpyware? 2009's criteria standards offer you an unsurpassed level of protection, we take it a step further by adding automatic screening to our features, giving you the ability to prevent the installation of future spyware in addition to removing spyware that is currently on your hard drive.

Why Use AntiSpyware?
Protect Your Data
Defeat Hackers
Protect Your Privacy
Eliminate Pop-Ups
Protect Your Identity
What's Lurking On Your PC?
Do you surf the Web?
Do you get bombarded by annoying pop-up advertisements?
Has your system's speed decreased significantly?

If the answer to all of these questions is yes, your computer could be harboring dangerous Trojans, worms and dialers and you will remain at risk without AntiSpyware protection.

Find out what's lurking on your PC Now with AntiSpyware Free Scan!
Threat Categories

Browser Helper Object
Rogue Antispyware
Key Logger
Commercial RAT
Firewall Killer
Data Miner


  Home | Contact Us

Copyright ? 2009 All rights Reserved. EULA | Privacy Statement
*Windows Vista and the Windows Vista Start button are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.

More Tags: reg sweep - reverse mobile - reverse phone detective - richard mackenzie direct - rocket piano - rocket spanish - satellite tv to pc - smtp 2 go - spam bully - spyware nuker - the bad breath report - thedietsolutionprogram - the diet solution program - the stop snoring exercise program - the super mind evolution system - trading stock indices - truth about abs - turbulencetraining - turbulence training - twitter annihilation - twitter rockstar - twitter traffic machine - ultimate content creator - ultimate font download - ultimate wow guide - video piggy - vincedelmontefitness - vince del monte fitness - warp speed fat loss - web investigator - win clear - win spy - yeast infection no more - 3d covers - 500 scrapbooking sketches - acid alkaline diet - acne free in 3 days - advanced pc tweaker - apple patch diet - art of approaching -