A quick look at the company's officers gives an indication that they
are qualified to successfully hide a program and circumvent the security built into your computer.
They came from some of the the various companies that developed that security!
Quick Notes on WebWatcher |
It is as invisible as a program can get. |
It plays the limitations of the Windows Registry very well. |
If you go to a subdirectory where a file is, it moves. |
Replaces the shell program your computer uses. |
No Uninstall Program listed |
No named entries in the Registry |
No indication it is installed. |
Disables your security program. |
Once security is disabled, you are completely exposed to all viruses/spyware. |
Program files hide in the subdirectories of programs you are not likely to delete. |
Program reinstall hooks are embedded inside pictures. |
It would appear one place they embed their reinstall code is inside the
security pictures in your security programs. |
Installed Via Email - It wasn't necessary to open the email, the install
routine launched on delivery to my machine from the mail server. It
crashed the Windows Mail program and indicated to contact Microsoft to check
for an available fix. After it hung for a bit longer than I expected,
I crashed the laptop, pulled the plug and battery. On Reboot, it had
been downloading the executable file and setting it to run on reboot. |
If you suspect it is installed they will deny it. |
If you are certain it is installed they will deny it. |
When you purchase the program yourself and it tells you that it is
already installed on your computer, they will deny it... and become hostile. |
When you attempt to reason with them and you answer all of their
questions about how you detected their program, they will deny it. AND
THEN, they will update the program so the methods you discussed will no
longer work. |
If you eventually get to someone there who confirms what you are
reporting and wants to help you, she will be fired. |
If you post anything about the program on a forum, someone will follow
behind you and either delete your entry (they have every one of your
passwords) or post an accusation that you are a child trying to get around
his parents protections. A very effective method, because no one will
assist a child trying to get around their parent's protection. It
doesn't matter that your parents are in their 70's, they are protecting you
from the evil things on the internet. Well all but one of the evil
things because they didn;t protect you from WebWatcher. |
McAfee does not detect it. Their EMPROXY program will run all the
time, as the program thinks the outgoing data is email or instant messages
and it is scanning them. |
Symantec does not detect it. ( BUT trust them to secure the data
as it is stolen from your computer and delivered to the servers where it is
being illegally stored. ) |
Kaspersky does not detect it, BUT the tools available provide
the indication that data is being transmitted. |
ZoneAlarm does not detect it, but it does have methods to slow
the transmission of data down. |
WebWatcher has routines that DISABLE your
anti-virus/anti-spyware programs - without those programs even
noticing they have been disabled. |
Once your anti-virus/anti-spyware programs are disabled, you are
more likely to get infected with a virus. The program hides
among the viruses, and your computer appears to be infected with a
virus. Should you remove that virus, you may not notice
WebWatcher is still there. |
The program files are hidden among your security program
files. If you change security programs, the files are renamed
to your new one, or any of about a dozen other popular program
naming conventions. |
You may notice that Java updates are running fairly often, it is
part of the update/reinfect routine. |
|
|