Skip to main content

ESET Releases Rogue Application Remover

Antivirus software vendor ESET has just released a new malware scanner designed to detect and remove different types of rogue applications from your computer. Rogue applications are those programs that are malicious in nature but pretend to be harmless or even useful, such as fake anti virus programs (that deceives unsuspecting users into paying for fake or simulated removal of malware), and scareware (software products that produce frivolous and alarming warnings or threat notices for fictitious or useless commercial firewall and registry cleaner software).

Aside from detecting and cleaning rogue software, ESET Rogue Application Remover is also capable of reverting changes made by the rogue applications in Windows registry. By design, ERAR focuses mostly on rogue applications that affect the operating system in a negative way and that are difficult to remove by our products. ESET Rogue Application Remover, however, should not be considered a substitute for regular antivirus and antimalware software.

eset-rogue-app-remover

ESET Rogue Application Remover is a small program, less than 3MB in size, which is impressive. ERAR must be run with elevated administrator rights either in normal or safe mode. Just right click on the executable file and choose “Run as Adminisrator”. Internet connection is recommended for better detection efficiency and accuracy but also for automatic submission of detected files to ESET's viruslab when approved by the user.

Upon running, ERAR will scan your running processes and kill any that it perceives to be a malware. I use a program called Shutdown Guard to prevent programs from unceremoniously shutting down Windows. ERAR perceived it as a threat and killed the program without warning. However, it was decent enough to ask before trying to delete the program. ERAR will ask your permission before each clean operation, so make sure you are there. Scanning is very fast, so you don’t have to wait too long.

ERAR also supports restoration of quarantined objects using the /r switch. For a complete list of supported options, run it with the /? switch.

Unlike ESET’s other products, ESET Rogue Application Remover is free.

[via Wilders Security and JKwebtalks]

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: