I'm in the battle of my life,
If you can help in any way, please get in touch with me.

phone (215) 262-0938
Terance@Work2BDone.com

Computers are not safe from WebWatcher by Awareness Technologies

I am still updating the Computer and Cell phone pages. I spent Friday April 18, 2008 in the county jail. Based on mockery and lies. Updates will be here soon.

A quick look at the company's officers gives an indication that they are qualified to successfully hide a program and circumvent the security built into your computer. They came from some of the the various companies that developed that security!  

Who better to subvert your computer's security?

Verisign

Search Engine Optimization

Search Engine Optimization

 

Internet Searches

 

Quick Notes on WebWatcher
It is as invisible as a program can get.
It plays the limitations of the Windows Registry very well.
If you go to a subdirectory where a file is, it moves.
Replaces the shell program your computer uses.
No Uninstall Program listed
No named entries in the Registry
No indication it is installed.
Disables your security program.
Once security is disabled, you are completely exposed to all viruses/spyware.
Program files hide in the subdirectories of programs you are not likely to delete.
Program reinstall hooks are embedded inside pictures.
It would appear one place they embed their reinstall code is inside the security pictures in your security programs.
Installed Via Email - It wasn't necessary to open the email, the install routine launched on delivery to my machine from the mail server.  It crashed the Windows Mail program and indicated to contact Microsoft to check for an available fix.  After it hung for a bit longer than I expected, I crashed the laptop, pulled the plug and battery.  On Reboot, it had been downloading the executable file and setting it to run on reboot.
If you suspect it is installed they will deny it.
If you are certain it is installed they will deny it.
When you purchase the program yourself and it tells you that it is already installed on your computer, they will deny it... and become hostile.
When you attempt to reason with them and you answer all of their questions about how you detected their program, they will deny it.  AND THEN, they will update the program so the methods you discussed will no longer work.
If you eventually get to someone there who confirms what you are reporting and wants to help you, she will be fired.
If you post anything about the program on a forum, someone will follow behind you and either delete your entry (they have every one of your passwords) or post an accusation that you are a child trying to get around his parents protections.  A very effective method, because no one will assist a child trying to get around their parent's protection.  It doesn't matter that your parents are in their 70's, they are protecting you from the evil things on the internet.  Well all but one of the evil things because they didn;t protect you from WebWatcher.
McAfee does not detect it.  Their EMPROXY program will run all the time, as the program thinks the outgoing data is email or instant messages and it is scanning them.
Symantec does not detect it.  ( BUT trust them to secure the data as it is stolen from your computer and delivered to the servers where it is being illegally stored. )
Kaspersky does not detect it, BUT the tools available provide the indication that data is being transmitted.
ZoneAlarm does not detect it, but it does have methods to slow the transmission of data down.
WebWatcher has routines that DISABLE your anti-virus/anti-spyware programs - without those programs even noticing they have been disabled.
Once your anti-virus/anti-spyware programs are disabled, you are more likely to get infected with a virus.  The program hides among the viruses, and your computer appears to be infected with a virus.  Should you remove that virus, you may not notice WebWatcher is still there.
The program files are hidden among your security  program files.  If you change security programs, the files are renamed to your new one, or any of about a dozen other popular program naming conventions.
You may notice that Java updates are running fairly often, it is part of the update/reinfect routine.
 
 
The Electronic Privacy Information Center filed this document with the Federal Trade Commission describing how this program can ruin the people it is sold to, and their victims.  READ IT HERE