The distinction between adware and spyware is usually not very clear since they are both quite similar, although spyware is usually much more aggressive and better disguised. While adware usually appears hidden in the app and program overview, and can be uninstalled, spyware is more hidden and runs in the background. Keyloggers, which record users’ keyboard entries, also fall under this term: this is where PINs, passwords, e-mail addresses, and other sensitive information are stolen. You usually notice this malicious software when the virus scanner or the firewall detect it. If this is not the case, for example, because you haven’t updated your virus scanner, or if there isn’t one installed, you will not notice the intruder until your computer starts running unusually slowly.
If you are suspicious, you can check the CPU utilization in the Task Manager (press Ctrl+Alt+Del and then 'Start Task Manager') and search for unfamiliar processes. Some trojans disguise themselves as supposedly known processes. For example, if the browser isn’t open, but an overview of the active processes is still displayed, it could mean that a trojan is at work. You can also get an overview of the network usage under the 'network' tab. If there are any unusual activities here, this could also be an indication of snooping software in action.
Here, the most important protective measure is installing anti-virus software and making sure it’s up-to-date. The programs detect malware and render them harmless. Even free virus protection is better than nothing! In addition to the aforementioned AdwCleaner, the following programs are available for Windows systems and each come with free versions:
- Antivir: Avira Free Antivirus
- AVG Antivirus Free
- Kaspersky Free Antivirus
- Malwarebytes Anti-Malware
As with the removal of ransomware, rescue disks can help in particularly tough cases – if disinfecting the computer is no longer possible using functions of the operating system and an installed anti-virus software. An example is the Kaspersky Rescue Disk, which can be downloaded via the manufacturer’s support page. You must then burn a CD or DVD from the downloaded ISO image file. You can choose which burning program to use (e.g. Nero Burning ROM). Now you only have to change the boot order in the BIOS ('basic input/output system') and specify that the computer should boot from the CD or DVD the next time it’s switched on.
You can reach the BIOS via one of the function buttons, depending on which mainboard is installed on the computer, since the computer shows the correct one when switched on. In the BIOS, you can change the corresponding settings under the 'Boot' menu item. Save them, restart the computer, and press any key when a screen prompts you to do so. You can now choose between a pure text representation of the rescue program and a graphical interface. Now, the system will be trawled for any kind of malware and cleaned up.