Anti-Spyware Strategies, Part 1: Clean Out Your System
Do you suspect that your system is infected with adware, spyware, or other malware? Here's how to get rid of it.
Step One: Back Up Your Data
Before trying to clean up a spyware infestation, you should always back up important data. Some spyware makes extremely invasive changes to system settings, and performing a cleanup may cause problems. The best course is to get a full backup of all the data on the drive, using a program like Norton Ghost or Acronis True Image. At a minimum, make copies of the files in your My Documents folder. Some programs like Spybot Search & Destroy will do some limited backups before starting, but making your own backup is a step you shouldn't skip.
Don't depend on Windows XP's System Restore feature, which allows system recovery it can be a double-edged sword. System Restore may allow you to jump back to a point before the spyware was installed. However, if you perform a spyware cleanup and then use System Restore, you could end up putting the spyware back onto the system.
If you believe that spyware has been on your system for several weeks, it is probably better to clear out any restore points because they will also be infected. Some virus and spyware scanners may detect these infected restore points, but most will be unable to clean them.
It's a simple process to clear all your restore points:
Right-click My Computer.
Click Properties, and select the System Restore tab.
Check the box that says "Turn off System Restore on all drives" and click Apply. It may take several seconds for Windows to remove all the restore points, so expect a delay and some disk activity.
Once you have finished cleaning up the system, go back to this dialog and clear the "Turn off System Restore" check box. That will enable System
Restore but start with an empty slate of restore points.
To be sure that you have a good starting point should anything happen in the future, you should create a new restore point. Click Start, Help, and
Support, and "Undo changes to your computer with System Restore." The System Restore utility will start and give you the option to create a new restore point.
(For a visual step-by-step explanation of how to clear your restore points, visit our Image Gallery.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.