Tech PC Repair Registry Repair & Registry Cleaner Specialists
Home | Anti-Virus | Anti-Spyware | Registry-Cleaner | Data-Recovery | FAQ | Contact Us
Frequently Asked Questions
Friday August 17, 2018           

  General FAQ's  |  Anti-Spyware FAQ's |  Anti-Virus FAQ's  |  RegCure FAQ's

GENERAL FAQ

WHAT IS YOUR SATISFACTION GUARANTEE POLICY?

If we have been unable to assist you or if you are not 100% satisfied with our software, Paretologic offers a 60-day money back satisfaction guarantee.

WHAT IS SPYWARE?

Spyware can infect home and business computers unknowingly when you surf the Internet or share files. Difficult to find and hard to remove without the proper tools, spyware can steal confidential information resulting in identity theft and credit card fraud. The term "malware", derived from the words "malicious" and "software", is also used to describe these computer threats.

Spyware symptoms and characteristics include the following:

  • Popup ads - displays advertisements intrusively
  • Keyloggers - records your personal data
  • Browser hijackers - changes your web browser settings
  • Remote influence - influences or controls your computer remotely
  • Unsolicited files - makes attempts to download and install files on your computer
  • Shutdown or disable - disables programs or processes
  • Unauthorized phone calls - makes calls via the phone modem
  • Security flaw exploits - takes advantage of system or network flaws for remote access
  • Internet connection floods - interrupts or temporarily disables an Internet connection
  • Threat proliferation - spreads quickly and easily from computer to computer
  • Tracking - tracks your Internet activity and can send this information remotely
  • Installation - installs software on your machine without your consent
  • Uninstallation - makes uninstalling and removing the item difficult
  • Privacy and Consent - fails to properly disclose potential privacy risks

Along with fraudulent, unethical, and illegal activities, there are other common effects that are a result of malware activities. These can include reoccurring system errors and program failures. In many cases, spyware programs hog system resources and monopolize processing time. Results can include poor computer performance, system non-responsiveness, unexpected behaviour and abrupt program termination.

WHAT IS ADWARE, MALWARE, TRACKWARE, ETC.?

Some consider Adware to be distinct from Spyware, but more and more it is considered a sub-category of Spyware. Adware is "advertising software," any software that displays ads or facilitates the display of ads on a user's computer. Often Adware is difficult to remove and may continue to display ads even after it has been uninstalled. Often free downloadable applications like Kazaa, Grokster, and a number of media players are ad-supported, earning revenue by installing Adware on a user's computer. Malware is any program that is used with the express intent of damaging a PC or network and has no measurable benefits. Trackware, including cookies and data miners, tracks a user's computer usage and/or Web-searching habits. New "-ware" words are occasionally invented to describe sub-categories of Spyware.

HOW IS SPYWARE DIFFERENT FROM A VIRUS?

Unlike Spyware, viruses self-replicate and attempt to infect as many computers as possible. Viruses attempt to spread from one computer to another, while Spyware usually spreads over the Internet and not directly between home computers. Viruses usually carry a "payload," some kind of function or assault meant to damage a computer, open it to remote intrusion, or otherwise compromise a computer system. Spyware can do just as much damage, but more frequently causes slowdown, pop-up ads, browser instability, and other annoyances. Spyware programs range from innocuous data collectors to dangerous Remote Administration Tools (RATs). Viruses are more consistently and obviously harmful, but do not present the same surveillance, advertising and data mining threats.

HOW DO I FIND OUT IF MY COMPUTER HAS SPYWARE?

Tell-tale signs of Spyware presence are computer slowdown, pop-up ads, erratic mouse behaviour, and problems with a Web browser-like browser instability, strange homepages and confusing search results. To determine if your computer is infected with Spyware, you will need to download a Spyware detection tool. Most respected anti-spyware companies offer a free scan or free trial version of their software. ParetoLogic is pleased to offer a free scan to anyone concerned that their computer is infected with spyware. Should the scan result in the detection of spyware, we recommend that you employ the full version of our software to remove the spyware and secure your computer.

I'VE USED A REPUTABLE ANTI-SPYWARE TOOL, WHY AM I STILL HAVING PROBLEMS?

Sometimes a single scan with a good anti-spyware tool won't be enough to rid your computer of unwanted software. It may require a few scans, or even a second program to completely remove all Spyware and Adware. All anti-spyware programs have a built-in list of threats that they can recognize and attack, but every program has a slightly different list, and no one anti-spyware tool can address every threat. For that reason, it may require two distinct anti-spyware tools to completely clean a PC heavily infested with unwanted software.

PARETOLOGIC ANTI-SPYWARE FAQ

WHAT ARE THE SYSTEM REQUIREMENTS FOR PARETOLOGIC ANTI-SPYWARE?

Minimum System Requirements

The following are the minimum levels required. For improved responsiveness we recommend higher system specifications than those presented here.

Hardware Requirements:

  • Intel Pentium II or compatible processor
  • At least 64 Megabytes (MB) of RAM
  • 20 MB of hard disk space
  • Internet connection

Operating System requirements:

  • Microsoft Windows XP Service Pack 2
  • Microsoft Windows 2000 Service Pack 4
  • Operating privileges: Logged on as administrator

Note: All operating systems refer to 32-bit versions.

Recommendations

To use ParetoLogic Anti-Spyware, the following is recommended:

  • 128 MB of RAM - for better performance
  • 1280 x 1024 monitor resolution
  • Familiarity with Microsoft Windows

HOW OFTEN SHOULD I SCAN MY COMPUTER FOR SPYWARE?

Routine scanning for spyware threats is essential. You can determine how frequently you scan and remove spyware based on how much you use your system. Typically, if you have Active Protection running at a medium or higher level of protection, you can perform a thorough computer scan once a week. If you have turned off Active Protection or have it running at a low setting, we would recommend scanning whenever you start up your computer for the day.

We also suggest that you run a scan after removing programs or if system performance seems slow.

CAN PARETOLOGIC ANTI-SPYWARE RUN AUTOMATICALLY?

You can use the Schedule feature so that your computer is scanned automatically on a regular basis. By default, ParetoLogic Anti-Spyware is set to scan once a week. You can adjust the settings and you can create more than one schedule.

WHAT ARE ALERTS?

An Alert notification refers to a popup alert window.

Popup Alerts
An Active Protection Alert is a window that pops up above your Taskbar Notification Area when a potential malware threat is detected. The alert is based on your Active Protection settings and can be changed according to your needs.

HOW DOES ACTIVE PROTECTION WORK?

Active Protection is a proactive shield that silently monitors your system and alerts you of any activities that could be harmful to your computer or result in performance loss. An alert notification pops up while you are on your computer - this happens in real-time. There are various settings so you can choose to have ParetoLogic Anti-Spyware perform automatic blocking without notification or you can enable notification so as to allow only the software you want to be downloaded on your system.

How Active Protection works:

Each of the ParetoLogic Anti-Spyware monitors can be set to determine what actions you would like taken when a spyware threat is detected. You can set the Active Protection levels of all the monitors or customize each one individually.

In the lower half of the window, a summary of the Active Protection level is displayed. The individual monitors are grouped in two categories, Internet and Windows:

INTERNET MONITORS

The monitor names and descriptions are as follows:

Browser Hijack:
Monitors your web browser settings to prevent spyware from hijacking your home page and other settings.

Browser Helper Object:
Prevents spyware from installing browser helper objects.

Browser Modification:
Prevents spyware from modifying your web browser menus, toolbars, and other settings.

Network:
Monitors your web browser settings to prevent spyware from hijacking your home page and other settings.

WINDOWS MONITORS

The Windows monitors and descriptions are as follows:

Windows Startup
Monitors your system's startup settings to prevent spyware from starting up when you restart your computer; detects Startup programs that are installed.

Windows Shell
Monitors the Windows Shell to prevent spyware from hijacking your computer including the launching of applications, the winlogon key in the registry, shell execute hooks, and monitoring for the Explorer Trojan

To set the Protection Level for the monitor, do the following:

1. Click the Monitor name listed in the left column of the Main window.
2. In the Options section, click the drop-down arrow and select the level.

Each monitor includes the following:

  • A link to the custom settings.
  • The Protection level.
  • A description of what is being monitored.

You can choose to set all the monitors so they are at the same Active Protection Level.

XoftSpyYSE FAQ

WHAT ARE THE MINIMUM SYSTEM REQUIREMENTS FOR XOFTSPYSE?

    Minimum System Requirements

  • Intel Pentium II processor (or equivalent)
  • 64 MB RAM
  • 2.5 MB of hard disk space free (an initial 16 MB required temporarily during installation)
  • Internet Explorer 5.5
  • Windows 98, ME, 2000 or XP

PARETOLOGIC ANTIVIRUS FAQ

WHAT ARE THE SYSTEM REQUIREMENTS FOR PARETOLOGIC ANTI-VIRUS PLUS?

Hardware Requirements:

  • Intel Pentium III or compatible processor
  • At least 256 Megabytes (MB) of RAM
  • 100 MB of hard disk space
  • Internet connection
  • Microsoft Internet Explorer 6.0 and above

Operating System requirements:

  • Microsoft Windows Vista
  • Microsoft Windows XP Service Pack 2
  • Microsoft Windows 2000 Service Pack 4
  • Operating privileges: logged on as administrator to install or uninstall

Note: All operating systems refer to 32-bit versions.

Spam Controls Requirements:

  • Windows Mail, Outlook 2003 and above, or Outlook Express 6.0 and above

Recommendations

The following is recommended for better performance:

  • 512 MB of RAM
  • 1024 x 768 monitor resolution
  • Familiarity with Microsoft Windows

HOW OFTEN SHOULD I SCAN MY COMPUTER FOR VIRUSES?

Routine scanning for malware threats is essential. You can determine how frequently you need to scan and remove malware based on how much you use your system. Typically, if you have Active Protection running at a medium or higher level of protection, you can perform a thorough computer scan once a week. If you have turned off Active Protection or have it running at a low setting, we would recommend scanning whenever you start up your computer for the day.

We also suggest that you run a scan after removing programs or if system performance seems slow.

CAN PARETOLOGIC ANTI-VIRUS PLUS RUN AUTOMATICALLY?

You can use the Schedule feature so that your computer is scanned automatically on a regular basis. By default, ParetoLogic Anti-Virus PLUS is set to scan once a day. You can adjust the settings and you can create more than one schedule.

WHAT ARE ALERTS?

An Alert notification refers to a popup alert window.

Popup Alerts
An Active Protection alert is a window that pops up above your Taskbar Notification area when a potential malware threat is detected. The alert is based on your Active Protection settings and can be changed according to your needs.

HOW DOES ACTIVE PROTECTION WORK?

Active Protection is a proactive shield that silently monitors your system and alerts you of any activities that can be harmful to your computer or modify system settings. An alert notification pops up while you are on your computer in real-time. There are various settings so you can choose to have ParetoLogic Anti-Virus PLUS block potential malware threats automatically without notification. Alternatively, you can enable notification so you know when a monitor is triggered and you can choose to allow the change or to have it blocked.

How Active Protection works:
Each of the ParetoLogic Anti-Virus PLUS monitors can be set to determine what actions you would like taken when a threat is detected. You can set the Active Protection levels of all the monitors or customize each one individually.

In the lower half of the window, a summary of the Active Protection level is displayed. The individual monitors are grouped in two categories, Internet and Windows.

INTERNET MONITORS

Internet Monitor names and descriptions are as follows:

Browser Hijack
Monitors your web browser settings to prevent malware from hijacking your home page and other settings.

Browser Helper Object
Prevents malware from installing browser helper objects (also known as Internet browser (ìadd-ons").

Browser Modification
Prevents malware from modifying your web browser menus, toolbars, and other settings.

Network
Monitors the network settings to prevent malicious software from hijacking your network connection.

HTTP Filter
Monitors HTTP requests and prevents malicious URLs from loading. You can block or allow additional URLs.

WINDOWS MONITORS

The Windows Monitor names and descriptions are as follows:

Windows Startup
Monitors your system's startup settings to prevent malware from starting up when you restart your computer; detects Startup programs that are installed.

Windows Shell
Monitors the Windows shell to prevent malware from hijacking your computer including the launching of applications, the winlogon key in the registry, shell execute hooks, and monitoring for the Explorer Trojan.

Windows File System
Monitors your file system settings to prevent malicious software from being written to the hard disk.

Why are the scanning times for ParetoLogic Anti-Virus PLUS longer than XoftSpySE or ParetoLogic Anti-Spyware?

The scanning system in Anti-Virus PLUS is capable of detecting a far greater variety of malware, than XoftSpySE or ParetoLogic Anti-Spyware. The scanning methodology for Anti-Virus is also far more comprehensive. Essentially, the scan times are longer, because the scans are more effective.

REGCURE FAQ

WHAT ARE THE SYSTEM REQUIREMENTS FOR REGCURE?

Minimum system requirements:

  • 128 MB RAM
  • 10 MB Hard drive space

Supported operating system:

  • Microsoft Windows Vista ready
  • Microsoft Windows XP (SP1 and SP2)
  • Microsoft Windows 2000 (SP4)
  • Microsoft Windows 98 SE
  • Microsoft Windows ME

Note: All Operating Systems refer to 32-bit versions.

HOW OFTEN SHOULD I SCAN MY REGISTRY?

Scheduling a scan is dependant upon the usage of your system. We suggest scheduling a scan every week to two weeks if you are very active on your system.

We also suggest that you run a scan after removing programs or if your system's performance seems slow.

CAN REGCURE RUN AUTOMATICALLY?

You can schedule RegCure to run automatically at any time that is convenient including times when you are not heavily taxing system resources.

GENERAL SAFETY TIPS

For basic security, all you need is a little quality time with your PC and a few megabytes of hard drive space. Follow these steps to keep yourself safe from the majority of malicious spyware.

KEEP WINDOWS UP TO DATE

Since spyware almost exclusively affects Windows-based PCs, it's important to make sure that you keep your operating system up to date. Microsoft Windows Update is the semi-automated system that keeps Windows secure by providing critical patches and security updates, which address vulnerabilities. Get those critical updates installed, one way or another, then you can move on to more advanced security.

FIREWALL: MORE THAN A REALLY COOL WORD

A firewall is a piece of hardware or software that hides your PC from the prying eyes of the Internet. All Internet-enabled PCs have something called an IP (Internet Protocol) address; a unique number that designates through which channels your PC is accessing the Internet. It is very easy for any other Internet user to discover your IP, but your firewall will determine just how much they can do once they've got it. Use Windowsí built-in security features, like its firewall and Internet Security and Privacy settings. Delete your Temporary Internet Files regularly. Turn your computer off when itís not being used.

ANTI-VIRUS IS NON-NEGOTIABLE

Another reality of modern computing: anti-virus software is absolutely, positively necessary. Using e-mail or the Internet without a good anti-virus program running is just too risky. Imagine accidentally clicking on one unwanted spam e-mail and having your computer continually restart itself every 30 seconds, making it impossible to connect to the Internet long enough to download a fix. Powerful, free anti-virus tools are available from Avast.com and Grisoft.com. Both programs are reliable

Before downloading a free program, like a file-sharing client or media player, make sure itís coming from a reputable source. Look for the word ìad-supportedî or anything in the programís Terms of Use documentation that mentions data collection for marketing purposes. A quick Web search with the search terms ì[product name] spywareî may help you determine if the program has any Spyware associations.

DON'T DOWNLOAD RIPPED MOVIES, CDS, PC GAMES, ETC.

No, this isn't some ethical tirade against piracy. Rather, pirated games, crack files, and even movies can be easily packaged or archived with Spyware, viruses and worms. Downloading illicit files, particularly over peer-to-peer (P2P) networks like Kazaa or Gnutella, is a risky business.

STAY INFORMED

Even with an anti-virus/firewall combination protecting your PC, there's no substitute for knowledge. Understanding spyware and learning about the latest and most dangerous threats is the key to staying protected. Spend some time surfing the Web and keep all your software patched and up to date.

WHAT IS THE WINDOWS REGISTRY?

The Windows registry is one of the central components of the Windows operating system. It is required for Microsoft Windows to be able to operate. The registry was developed to provide a central location for computer hardware and software data that had previously been scattered throughout the Windows system, primarily as INI (.ini) files. The Registry replaces most of the .ini files that were used in Windows 3.x and MS-DOS configuration files, e.g., Autoexec.bat and Config.sys.

WHAT ARE THE SYMPTOMS OF REGISTRY PROBLEMS?

Symptoms of problems in the Windows registry include system crashes, sluggish performance, computer freezes, dll errors, the "blue screen of death", frequent error messages, slow computer start-up, shut down problems, unstable software programs, frequent need to reboot, application error messages and crashes, missing file notices, inability to remove software using add/remove program, and Windows startup problems.

CAN I FIX REGISTRY PROBLEMS MYSELF?

Many registry problems can be repaired (edited) manually by using the regedit utility built into Windows. However, for the vast majority of computer users, this is not really a safe or effective way of resolving registry issues.

Making modifications to the registry can cause significant damage. Most experts recommend that you only modify the registry yourself if you really understand what you are doing. If you plan to edit the registry yourself, ALWAYS back up the registry first so it can be returned to a previous working condition should something go wrong.

For most of us, the better solution is to use a good quality registry repair software program, also known as a registry cleaner. A quality registry repair program will automatically back up the registry and the best ones give you the option to restore the registry incrementally, so you can restore only those parts in the Windows registry that are causing the problems.

Registry cleaner software makes the laborious procedure of cleaning your Windows registry relatively simple. It typically includes applications that not only help you resolve existing registry issues, but can help stop problems from taking place in the first place.

WILL A REGISTRY CLEANER FIX SPYWARE OR VIRUS PROBLEMS?

Registry cleaner software will not typically remove Spyware or repair and remove viruses. However, Spyware, viruses and Adware programs frequently alter or damage your Windows registry and a good registry cleaner will help repair this damage and remove unwanted registry entries.

WHAT'S THE FASTEST WAY TO FIX REGISTRY PROBLEMS?

A good registry cleaner is the fastest and easiest way to fix registry problems. It will optimize your Windows registry by locating invalid paths, invalid file types, obsolete start menu order, invalid shared programs, invalid startup programs, invalid fonts, obsolete software entries, invalid application paths, dead file extensions, Adwares and Spywares that use the registry, invalid help paths, and all other bad entries within the Windows registry.

Using a Windows registry cleaner tool as a part of your regular pc maintenance is not only easy, but will help stop Windows error messages, prevent system crashes, resolve hidden problems, and really optimize your computer's speed and performance.

 

Windows 7 Compatible 32 Bit and 64 Bit

Windows XP,  Vista, 2000, Windows 98 & ME Ready


Softpedia Certified No Spyware, Adware, or Viruses


Satisfaction Guarantee 100% Safe



Download the Top Rated Registry Repair Scan Tool-FREE Download!

"We highly recommend this scan. Our research team has concluded that RegCure is the most powerful (and easiest) way to fix your PC registry errors.."

- Tech PC Repair.com

"RegCure made my machine run like new again. You guys are amazing!"

Josh R.
San Dimas, California

"Great software – Great customer service! It’s nice to deal with a company that knows what they’re doing."

Greg M.
Palo Alto, CA

Normally I’m pretty picky about what applications I put on my PC, but I am glad I took the chance on this one. Keep up the good work."

Rebecca L.

"Thanks very much for your fast reply and for your great customer service. You can be sure I will keep coming back as a very satisfied customer."

Rich S.



Home | Anti-Virus | Anti-Spyware | Registry-Cleaner | Data-Recovery | FAQ | Contact Us
Related Resources | Privacy Policy | Disclaimer

Tech PC Repair.com © 2007-2015 - ALL RIGHTS RESERVED

All referenced trademarks or product names are the property of their respective owners. Windows Vista and the Windows Vista Start button are registered trademarks of Microsoft Corporation.

Tech PC Repair.com is not a direct publisher of software products.