Tutorials

SpyHunter is a malware removal tool that will detect and remove thousands of hazardous threats such as malware, spyware, trojans, viruses, worms, and rootkits and other threats from your PC. If you've already downloaded SpyHunter's Spyware Scanner (free version) and wish to download the full-featured version of SpyHunter, follow the instructions on how to download the full version of SpyHunter on your PC provided on this article.
Please note: It's only after you activate the full version of SpyHunter that the program unlocks all its features such as the Spyware HelpDesk, daily definition updates, and free customer support. However, you can use SpyHunter's spyware scanner (free version) with its limited features without the activation.
Having problems downloading SpyHunter? If for any reason, you need to re-download SpyHunter, just follow the instructions below. You will not be charged any additional fees to re-download SpyHunter.
Two key points to be aware in order to download the full version of SpyHunter:

  • Please make absolutely sure that all SpyHunter windows are closed, and then follow the instructions below very carefully.
  • Please make sure that any firewall software that you have running on your machine is disabled, as it may interfere with the download process.

To download SpyHunter, please follow the instructions below.

  1. Use your web browser to go to the Enigma Software site.
  2. Enter your email address and password into the "My Account" login box, located on the header of our website. (If you have forgotten your password, it can be found in the receipt/confirmation email that was emailed to you).
  3. You will be redirected to the "My Account" page. Click on the blue download button, located on the "Download Information" section, and save the file to your computer. Make sure to make a note of what folder you've saved the file in. Also, we strongly recommend that you save the installation file to your "Desktop" so that you can easily locate it for the installation. The installation file is usually called "SpyHunterS.exe", "spyhunterFULL.exe","spyhunterFULL_2U.exe" but it could also be under other variation of those names.
  4. After you download the file, double click it and go through the installation file, double click it and go through the installation process.
    For Windows Vista Customers Only: If you have Windows Vista, DO NOT double click SpyHunter's installation file. Instead, right-click the SpyHunter installation file and choose the option "RUN AS ADMINISTRATOR".
  5. After the installation is complete, you will see a SpyHunter shortcut on your Desktop, with a blue and gray icon with a picture of a face. Double-click this icon to launch the actual program.
    Note: After installing the SpyHunter program, please remember to delete the the installer program from your Desktop. It is very important that you delete it to avoid future confusions. After installing SpyHunter, the installation program becomes useless.
  6. After downloading and installing SpyHunter, please check for definition updates. Also, make sure you have entered your account information in "SpyHunter Settings" and activated SpyHunter. 
on Friday January 22 by Super User

The following steps explain how to install SpyHunter on your computer:

  1. If you wish to download SpyHunter's Spyware Scanner, click here to download.

    Please note: It's only after you activate the full version of SpyHunter that the program unlocks all its features such as the Spyware HelpDesk, daily definition updates, and free customer support. However, you can use SpyHunter's spyware scanner (free version) with its limited features without the activation.

  2. In the "File Download" dialog box, press "Save" to save SpyHunter file.
    Download and Save SpyHunter
  3. In the "Save As" dialog box, save the SpyHunter file on your Desktop.
    Save SpyHunter on Desktop
  4. Search for the installer you chose to download on your Desktop. When you find the file with an icon of a computer and a disc (as shown on image below), double click on that icon to run SpyHunter.
    SpyHunter Icon
  5. If you cannot find the SpyHunter file on your Desktop, click the "Start" button and click on "Find or Search". Then, type in "spyhunter" and click on "Search."
  6. Double click on the installation file and you will be prompted with a license agreement. Please read through the license agreement and check the box stating that you agree to the terms and click "Next."
  7. The next screen will ask for a "Destination Folder". You will be installing SpyHunter into "C:\Program Files\SpyHunter," which should already be selected.
  8. Click "Next". If a message appears stating that the folder specified already exists, click on "Yes".
  9. You are now ready to install, click on "Next."
  10. After the installation process is complete, a window should appear asking if you want to reboot.
  11. Click "YES, Reboot My Computer Now" and then click "Finish."
on Friday January 22 by Super User

Malware authors are constantly changing their malicious programs to avoid detection. This is why many computer users fall under the predicament of having an anti-spyware program that is not capable of detecting or removing a computer parasite.
With the help of SpyHunter’s Spyware HelpDesk, you have the opportunity to get personalized parasite detection and removal solutions to fit the issues occurring specifically on your PC. Spyware HelpDesk's Diagnostic Report (Support Log) takes snapshots of all the points of execution on your operating system, allowing our technical support team to precisely identify each and any problem within your PC. By simply clicking the "Spyware HelpDesk" tab within SpyHunter, you can generate a diagnostic report of your PC which you can then instantly send to our technical support team for analysis.
We encourage you to generate a diagnostic report when you encounter complications removing an infection so we can help you come up with a custom fix for it.
To use SpyHunter's Spyware HelpDesk to generate a custom fix for your issue, follow the instructions below:
Open "SpyHunter" > click on the "Spyware HelpDesk" tab > click on the "Generate Support Log" button to generate a diagnostic report which will be transmitted to our technical support team.

on Friday January 22 by Super User

A particularly effective trick employed by more sophisticated Trojan and malware organizations is to replace your legitimate DNS servers with their own rogue DNS servers.
When you attempt to connect to a URL, your PC will contact a DNS server to resolve the domain name (such as "www.enigmasoftware.com") to an IP address. This resolved IP address allows your computer to connect to the requested site.
If a malicious program inserts its own rogue DNS server into your registry, it can easily and transparently redirect you to a phishing or malware site. The address displayed in your browser will appear to be legitimate, but the site that you are actually browsing can be a fake! This leaves the door wide open for identity theft, credit card and banking fraud, password theft, and many other severe and dangerous privacy violations.
SpyHunter's Advanced DNS Protection feature monitors your DNS servers and notifies you if an unsolicited modification takes place. To activate this feature, simply check the "Activate Advanced DNS Protection" checkbox in the "Network Sentry" panel. For your convenience, your system's current DNS servers are displayed in the "Network Sentry" panel at all times.

 
 
 
on Friday January 22 by Super User

In isolated cases, SpyHunter may detect programs that you do not desire to remove. SpyHunter's Exclusions Manager will allow you to exclude individual programs from being identified in future SpyHunter scans.

To access the Exclusions Manager, just click on the "SpyHunter Scanner" drop-down menu when the "SpyHunter Scanner" tab is active and select "Exclusions Manager."

To add an item to your exclusions list, simply right-click on it in the "SpyHunter Scanner" results and select "Add Item to Exclusions."

In order to remove an item from your exclusions list, click the checkbox to the left of the item's name in the "Exclusions List" and then click the "Remove From Exclusions" button. The next time you scan with SpyHunter, this item will be detected and displayed in your results. You can also click the "Check All Items" checkbox to select all items in your exclusions list.

on Friday January 22 by Super User

SpyHunter includes advanced features to protect your Windows HOSTS file from unauthorized tampering.

The HOSTS file is used by Windows to map domain names to IP addresses. When resolving a domain name, the HOSTS file is checked before your service provider's DNS servers are queried.

A malicious object can surreptitiously write an entry to your HOSTS file to transparently point a trusted domain name (such as www.enigmasoftware.com) to a malicious server that is in no way affiliated with the actual domain name. This opens the door for phishing activities and other confidence scams and seriously compromises the security on your PC. Fortunately, SpyHunter 3.5 and later versions offer a tool to prevent this from occurring.

Within the Network Sentry panel, SpyHunter displays the contents of your Windows HOSTS file.

To turn HOSTS File Protection on, just check the "Activate HOSTS File Monitor" checkbox.

Once HOSTS File Protection is activated, SpyHunter will monitor your HOSTS file at a preset interval for any additions, deletions, or modifications. When SpyHunter discovers a change in the HOSTS file, it will alert you with a dialog window, displayed below.

The "Entries Removed" and "Entries Added" panels will show you anything that has been added to or removed from your HOSTS file.

If unauthorized changes have been made to your HOSTS file, you can cancel the changes by clicking the "Restore" button. If you actually intended to modify your HOSTS file (or gave an application permission to do so), click the "Ignore" button to allow the changes to remain in your HOSTS file.

If you would like to leave the changes in your HOSTS file for the present time, but would like to review them again later, just check the "Remind later" checkbox and then click the "Ignore" button. You will be reminded again in the future to verify the changes to your HOSTS file.

on Friday January 22 by Super User

SpyHunter's Internet Explorer Homepage Protection feature contains advanced functionality designed to prevent malware from hijacking your desired Internet Explorer homepage.
"Internet Explorer Homepage Protection" settings will generally be configured the first time that you run SpyHunter, but can be modified, activated, or deactivated at any time through SpyHunter's "Network Sentry" panel.
To activate or deactivate Internet Explorer Homepage Protection, just click the "Activate Internet Explorer Homepage Protection" checkbox. You can select between the three radio button options in the dialog to set your default homepage. The following radio button options are:

  • The "Use" radio button will allow you to type in (or copy and paste) the URL of any page to use as your default homepage. This box will be automatically pre-filled with whatever your Internet Explorer default homepage is currently set to. To set the default homepage in this manner, just click on the "Use" radio button to select it and type (or copy and paste) the desired URL into the box at the right.
  • The "Select homepage" radio button will allow you to quickly select MSN, Google, or Yahoo as your default homepage. Just click the "Select homepage" radio button to select it, and choose from one of the websites in the select list at the right.
  • Alternatively, you can simply set your default homepage to a default blank page. Do so by simply clicking the "Use Blank" radio button.

When you have selected a default homepage using one of the mechanisms above, simply click the "Apply" button (12) to save the settings!
Please note: Once Internet Explorer Homepage Protection is activated, SpyHunter will continue to enforce your IE homepage settings, based on the selection that you have made in SpyHunter. If you desire to change your homepage, you MUST change it within SpyHunter for it to be effectively applied. If you modify your IE homepage directly within Internet Explorer, SpyHunter will automatically reset it to the URL that you have previously specified.

on Friday January 22 by Super User

SpyHunter's Process Guard feature is designed to give you complete control over which processes are authorized to run on your system, and allowing you to identify and stop malicious processes before they are even executed.To activate the Process Guard, click on the "Process Guard" tab on the left side of the SpyHunter window and then check the "Activate Process Guard" checkbox. If you ever desire to turn Process Guard off, just uncheck this checkbox.

The Process Guard tab displays the following:

  1. Allowed items: (located on the left side of the window) Items that you have granted permission to run on your system.
  2. Blocked items: (on the right side of the window) Items that you have specifically blocked from running.

You can edit these lists at any time through the Process Guard interface.

To bring up additional properties of a process that is in either list, simply click on the filename to select it. Windows information related to the associated file will be displayed. Please note that, as this data is set by the publisher of the item and not by SpyHunter, this information may have been falsified. We recommend that you use the "More Info" feature to confirm any information. To use "More Info" to retrieve accurate, up-to-date information on a process, simply click on the process to select it and then click the "More Info" button on the bottom of the Process Guard window.

Please note that you must be connected to the Internet for this feature to work, as it requires a connection to our servers.

Please also note that More Info functionality is only offered to full, paying SpyHunter users.

SpyHunter's Process Guard is extremely intuitive when it creates and edits
the lists of blocked and allowed processes. When Process Guard is active, any process that attempts to launch will trigger an alert with a filename that is going to be executed.

If you do not recognize the filename (or did not deliberately launch the process), we recommend that you first click on the"More Info" button to get up-to-the-minute information on the process from the SpyHunter servers. If the filename comes back UNKNOWN, we highly recommend that either look at the Manufacture name or paste the filename on Google.com for reference. If the result is no match found or it indicates that the filename belongs to a Malware, we advise you to block the process.

If one of your applications do not work properly or stop working, it may be that you accidentally blocked the application. In this case, you can just go to the blocked list and remove the application from there.

To allow the process to execute, simply click the "Yes" button. To block the process, click "No". Make sure that the"Remember my answer" checkbox is checked if you want SpyHunter to remember your choice and add it to Process Guard's "Allowed/Blocked" lists.

If you block a process, you may receive a Windows error message that states: "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item." This error message is no cause for alarm! It simply means that SpyHunter has successfully blocked Windows from executing the process.

Make sure that the "Remember my answer" checkbox is checked if you want SpyHunter to remember your choice and add it to Process Guard's "Allowed/Blocked" lists.

How to Edit Blocked and Allowed Lists

As the editing features of blocked and allowed lists are identical in both the Process Guard and the Registry Guard, both will be explained here.

Add Items

SpyHunter gives you the ability to manually add an item to the "Allowed" or "Blocked' items list. To do so, please follow the instructions below:

  1. Click the "Add" button above the "Allowed" or the "Blocked" items list. An "Open" dialog will appear.
  2. Navigate through the dialog to select the executable file that you would like to add to the "Allowed" or "Blocked"items list.
  3. Click the "Open" button to add the file.

Remove Items

If you have accidentally added an item to either the "Allowed" or the "Blocked" items list, it is extremely easy to remove it. Just click on the item in either list to highlight it, and click the appropriate "Remove" button above the list that the highlighted item is in. It is as simple as that!

How to Move Items Between Lists

SpyHunter also allows you to quickly move an item from the "Allowed" list to the "Blocked" list, or vice versa. To do so, just click the item that you want to move, in order to highlight it.

  1. To move an item from "Allowed" items to "Blocked" items, click the right arrow button between the two lists.
  2. To move an item from "Blocked" items to "Allowed" items, click the left arrow button.
on Friday January 22 by Super User

SpyHunter's Registry Guard feature is designed to give you complete control over which processes are authorized to add auto-start entries to your Windows registry. This feature will identify and stop any processes that attempt to secretly auto-start malware by exploiting the Windows registry.

Please note that SpyHunter's Registry Guard will not block a program from all registry access. It will only block a process from being able to write to auto-start points of execution in the registry. Therefore, even blocked programs will generally be able to function on your computer (although they cannot write registry entries to automatically start themselves or other processes).

To activate SpyHunter's Registry Guard, click on the "Registry Guard" tab on the left side of the SpyHunter panel window and then check the "Activate Registry Guard" checkbox.

The "Registry Guard" tab displays the following list:

  1. Allowed items: (located on the left side of the window) Items that you have granted permission to write to your registry.
  2. Blocked items: (located on the right side of the window) Items that you have specifically blocked from writing to your registry.

You can edit these lists at any time through the Registry Guard interface.

To bring up additional properties of a process that is in either list, simply click on the filename to select it. Windows information related to the associated file will be displayed. Please note that, as this data is set by the publisher of the item and not by SpyHunter, this information may have been falsified. We recommend that you use the "More Info" feature to confirm any information. To use "More Info" to retrieve accurate, up-to-date information on a process, simply click on the process to select it and then click the "More Info" button.

Please note that you must be connected to the Internet for this feature to work, as it requires a connection to our servers.

Please also note that "More Info" functionality is only offered to full, paying SpyHunter users.

SpyHunter's Registry Guard is extremely intuitive when it creates and edits the lists of blocked and allowed processes. When Registry Guard is active, any process that attempts to write to an auto-start location in the registry will trigger an alert, displaying the processes that are going to be executed. Unless you specifically desire the program in question to automatically start when Windows starts, we recommend that you first click on the "More Info" button to get up-to-the-minute information on the process from the SpyHunter servers.

To block the process from writing to the registry, click "No". To allow the process to add an entry to the registry to automatically start itself or another (possibly malicious) process, click the "Yes" button.

We recommend that you are extremely careful when adding an item to the "Allowed" list, as relatively few processes require access to registry auto-start keys.

Make sure that the "Remember my answer" checkbox is checked if you want SpyHunter to remember your choice and add it to Registry Guard's "Allowed/Blocked" lists.

How to Edit Blocked and Allowed Lists

As the editing features of blocked and allowed lists are identical in both the Process Guard and the Registry Guard, both will be explained here.

Add Items

SpyHunter gives you the ability to manually add an item to the "Allowed" or "Blocked" items list. To do so, please follow the instructions below:

  1. Click the "Add" button above the "Allowed" or the "Blocked" items list. An "Open" dialog will appear.
  2. Navigate through the dialog to select the executable file that you would like to add to the "Allowed" or "Blocked"items list.
  3. Click the Open button to add the file.

Remove Items

If you have accidentally added an item to either the "Allowed" or the "Blocked" items list, it is extremely easy to remove it. Just click on the item in either list to highlight it, and click the appropriate "Remove" button above the list that the highlighted item is in. It is as simple as that!

Move Items Between Lists

SpyHunter also allows you to quickly move an item from the "Allowed" list to the "Blocked" list, or vice versa. To do so, just click the item that you want to move, in order to highlight it.

  1. To move an item from "Allowed" items to "Blocked" items, click the right arrow button between the two lists.
  2. To move an item from "Blocked" to "Allowed" items, click the left arrow button.
on Friday January 22 by Super User

When you remove items with SpyHunter, they are stored in a special quarantine area. If, for whatever reason, you would like to re-instate a previously removed item, you can do so through SpyHunter's Rollback Manager feature.To access SpyHunter's Rollback Manager, just click on the "SpyHunter Scanner" drop-down menu when the "SpyHunter Scanner'tab is active and select "Rollback Manager".

All previously removed items will be listed in the main view, along with the time and date that you removed them from your system. In order to restore items to your system, just check the checkboxes to the left of the items and click the "RollBack Selected" button. You can restore ALL previously removed items by clicking the "RollBack All" button.

on Friday January 22 by Super User

SpyHunter incorporates an advanced Scan Scheduler feature, which allows you to run a complete SpyHunter scan at a pre-set time, even if you are away from your computer.The operation of the Scan Scheduler is very intuitive. If the "Activate Scheduled Scan" checkbox is checked, this means that the SpyHunter's Scan Scheduler is currently active. If you have not modified any of the other settings in this window, the parameters of the currently active schedule will be automatically filled in to the appropriate fields. In order to activate the Scan Scheduler, just click on this checkbox to add a check. Likewise, to deactivate the Scan Scheduler, uncheck the box by clicking on it.

Use the "Run Scan at" drop-down to set a time of day at which your scheduled scan will run. Please note that the times are displayed in 24-hour format (so 03:00 is equivalent to 3:00 AM).

There are three primary schedule patterns available: Daily, Weekly and Monthly. The right side of the "Scheduled Pattern"frame will display different options, based on which pattern is selected. Use the radio boxes in this frame to select a primary schedule pattern.

Daily Scan Option - If you opt for a daily scan, you can choose to run the scan every day, every other day, every weekday, or at any interval of days that you choose. To set up SpyHunter to scan every day, click on the "Daily" radio button, and then click the "Every" button. Select "1" in the "Day(s)" select box. If you would like to schedule a scan for every other day, follow this same procedure, but select "2" in the "Day(s)" select box. You can use the "Day(s)" select box to setup a scan at any interval of days that you desire.

To configure SpyHunter to run a scan on every weekday, click on the "Daily" radio button, then the "Every weekday"button.

Weekly Scan Option - To setup weekly SpyHunter scans, click on the "Weekly" radio button. The right side of the panel will change, allowing you to select the day of the week that your scan will be scheduled for.

Monthly Scan Option - To setup monthly SpyHunter scans, click on the "Monthly" radio button. The right side of the panel will change, allowing you to select the day of the month that your scan will be scheduled for.

Please note: Your computer must be powered on at the time that your scan is scheduled to run. If the computer is not turned on, the scan cannot execute!

on Friday January 22 by Super User

SpyHunter offers the 'System File Protection' option which protects other Windows system files from unauthorized modification.To activate 'System File Protection,' just check the 'Activate System File Monitor' checkbox. SpyHunter will now protect key system files, such as win.ini and system.ini, from unauthorized tampering. When SpyHunter discovers a modification in a protected system file, it will alert you with a dialog window. On the 'Entries Added' and "Entries Removed" panels, you will see anything that has been added to or removed from the file in question.

If the modifications made to the file are unauthorized, you can cancel the changes by clicking the 'Restore' button. If you actually intended to modify the file (or give an application permission to do so), click the 'Ignore' button to allow the changes to remain.

SpyHunter can also be configured to guard your system's Microsoft Layered Service Provider (LSP) chain. The LSP chain is a series of DLLs that all network traffic to or from your computer passes through. The LSP chain is typically populated by Microsoft DLLs, as well as legitimate third party antivirus and/or firewall DLLs. Malware will also commonly embed itself within the LSP chain, and an LSP chain infection can lead to tremendous numbers of pop-up advertisements, as well as compromise of confidential personal data.

If activated, SpyHunter's LSP Chain Protection feature will continuously monitor your LSP chain for unauthorized modification. To activate this protection, check the 'Activate LSP Chain Protection' checkbox in the Network Sentry panel. SpyHunter will request your confirmation of any modifications to the LSP chain.

on Friday January 22 by Super User

You can't simply rely on an anti-malware or anti-virus program. You also need to adopt a good malware prevention and handling policy to prevent malware attacks from entering in the first place. The following steps provide important security measures to prevent malware attacks.

Prevention Step #1

Please make sure you have an updated anti-virus software running and re-scan your system.

Prevention Step #2

It is important to clean up your browser every time after removing malware using SpyHunter Program.

To clean up you IE browser:

  1. Click the "Tools" menu, and then click the "Internet Options" menu item.
  2. On "General," change the "Home page" (the default home page) to your desired home page.
  3. Then click "Delete cookies," "Delete files," and "Delete history." Click "OK" button.

You may also want to increase the security settings on your browser to block potential spyware and adware as you browse the Internet. To increase the security settings on the IE browser, click the "Security" tab, and customize the settings so that it prompts you before saving files and installing programs to your computer. You don't have to disable them, or change them all, but we recommend you set all ActiveX content at least to prompt, since ActiveX tends to take the most liberties if you enable it. With a high security setting on your browser, you may lose the functionality of some sites, so it is recommend that you adjust it to suit your needs.

Prevention Step #3

You must uninstall unwanted programs that come bundled with malware. Do you have any program that you do not use or that you cannot identify or freeware, shareware, or file-sharing programs (example: Screensavers Programs, Search Bars, Kazaa, Limewire, Morpheus, iMesh, etc.)? Most freeware, shareware, free screensavers, search bars and file-sharing programs may have spyware built into their programs. One of the reasons you may still be getting popups is because when you download a free product onto your machine you may usually get massive annoying advertisements in form of pop-ups or your machine may become damaged from a program that was not fully tested.

To uninstall unwanted programs that come bundled with malware, go into your "Control Panel", select "Add/Remove Programs", and uninstall any programs that you don't recognize or don't use. You may have to go into Safe Mode to delete some of these.

Prevention Step #4:

Run SpyHunter regularly. If your bad web surfing habits continue to lead you into getting infected with malware, then you will need to run SpyHunter on a regular basis (for convenience, you can schedule scans with SpyHunter's Scan Scheduler) to detect and remove any new malware in your machine. It is also advised to practice good web browsing habits. Bad web browsing habits is one of the main reasons that users get continuously infected with malware.

on Friday January 22 by Super User
Go to top
JSN Boot template designed by JoomlaShine.com