Think you are infected by a nastie (Spyware, Virus, Rootkit, Trojan Horses, Adware, Worm, AKA Malware)? If you can, remove your hard drive and scan it from a non-infected computer (booting from the non-infected computers hard drive). This is your best bet, otherwise, boot into safe mode and scan. For the online scans, you will need safe mode with networking support.
Run as many different programs as you can! Many computers, once infected, get infected by more than one nasty, and no single program detects all nasties! Sometimes I scan a hard drive with 10 different programs, and each program will find Malware-related files that the previous programs missed!
  Pretty basic - Rocket science degree not essential - Highly Recommended   Some advanced knowledge can help with use.   Caution! Use with care!   Specialty Items
  Preventative program - Install these to protect you from Malware
CCleaner Cleans Internet Explorer Cache, History, Cookies, Index.dat. Recycle Bin, Temporary files and Log files. Recently opened URLs and files. Third-party application temp files and recent file lists (MRUs). This software is completely free. Run this first! Link
AVG Anti-Virus An excellent Anti-Virus program. Firewall also available. Low CPU/storage usage. Free and paid (Pro) versions available. If you are interested in buying the pro version at a discount, email me. I am a gold-level authorized reseller. Link
Clam AV Free Anti-Virus program. Includes scheduler, Virus database updates, standalone scanner, context menu integration to MS Windows Explorer and Add-in to MS Outlook. Also features easy setup program. Link
Housecall AV Free online Malware scan. Link
Bitdefender AV Free online Virus scan. Link
SpyBot S & D Detects and removes Spyware and some general Malware. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. Link
SmitRem SmitRem is a tool created to remove the Trojan-Spy.HTML.Smitfraud.c malware infection and itís variants, AlfaCleaner, AntiVirusGold, BraveSentry, PSGuard, Search Maid, Security IGuard, Security Toolbar, SpyAxe, SpyFalcon, SpyHeal. SpySheriff, SpyTrooper, SpywareQuake, SpywareSheriff, SpywareStrike. Trust Cleaner, Virtual Maid, VirusBurst and Winhound. These infections are known as Desktop Hijackers and make many unwanted changes to a userís computer. Link
Trojan Remover Aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it. Link
Stinger Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist in dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations. Link
Spy Sweeper Great anti-malware Program. Rootkit detection. Real-time scanning engine. Free trial detects only. Link
CWShredder The premier tool to find and remove traces of CoolWebSearch Ė the name for a wide range of insidious browser hijackers Ė from your PC. Link
SpywareBlaster Great Free program that will stop many Malware programs from being installed onto your computer. Install this, update and apply protection once you have cleaned your computer. Link
OpenDNS DNS Service that stops websites from being served at the DNS Level, by subject matter. HIGHLY Recommended! Great if you have kids too! Link
Hosts Protection The Hosts file contains the mappings of IP addresses to host names. This file is loaded into memory (cache) at startup, then Windows checks the Hosts file before it queries any DNS servers, which enables it to override addresses in the DNS. This prevents access to the listed sites by redirecting any connection attempts back to the local machine. Another feature of the HOSTS file is its ability to block other applications from connecting to the Internet, providing the entry exists. You can use a HOSTS file to block ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and even most hijackers. This is accomplished by blocking the connection(s) that supplies these little gems. Link
RootKit Revealer RootkitRevealer is an advanced rootkit detection utility. It runs on Windows 2K/XP/Vista and its output lists discrepancies that may indicate the presence of a rootkit. RootkitRevealer successfully detects all persistent rootkits published at All items found by this program are not necessarily bad. Link
Hijack This! MSConfig on Crack. You can usually use this without fear of screwing up a computer. Submit scan results HERE for help. Link
ADS Spy A small tool to list, view or delete Alternate Data Streams (ADS) on Windows 2000/XP with NTFS file systems. ADS are a way of storing meta-information about files, without actually storing the information in the file it belongs to. This meta-information is not visible in Windows Explorer. Use with caution, Windows and several antivirus programs also store (temporary) information in ADS.
Compatible with: Windows NT/2000/XP/2003
Autoruns Similar to Hijack this!, but displays startup objects from more/different locations. This tool is more advanced, and you can majorly screw up a computer if you don't know what you are doing. Link
Winsock XP Fix Can't connect to the internet? Try this to rebuild various components of Windows 2K/XP networking. 1.4 MB
The Unlocker Having a problem deleting a file (even after resetting file permissions)? Try this. Link
All these program links/info files are part of my Service CD, a more comprehensive service solution for folks who run into this stuff often.

Last Updated: 07 Apr 2012