logo
Home -> Pestpatrol
#1 Spyware Killer & Detector--Pestpartrol


PestPatrol is a powerful security and personal privacy tool that detects and eliminates destructive pests like trojans, spyware, adware and hacker tools. It complements your anti-virus and firewall software, extending your protection against non-viral malicious software that can evade your existing security and invade your personal privacy.

These pests often lurk silently on your computer until something – or someone – sets them off. When that happens, you could lose passwords, personal data, credit card numbers, and - if you telecommute and connect to your office via a VPN - open up a back door for the hacker into your entire company network.

 

Buy Now And Get Instant Download ($39.95)


Executive summary

Pests is the collective term we use to describe non-viral malicious code - trojans, remote administration tools, hacker tools, and spyware. Such code can stealthily gain access to and hide on computer systems, bypassing traditional security measures such as anti-virus, firewalls, and intrusion detection systems.

Pests can allow unauthorized users to breach firewalls and access sensitive data by assuming the identity of authorized users. Pests can then allow unauthorized third parties and disgruntled insiders to access electronic assets (customer database, financial records, intellectual property, trade secrets), compromise existing security, destroy customer confidence, and expose individuals and organizations to litigation.

Pests are fundamentally different from viruses, in that they are self-contained programs rather than code fragments, and so the technology required to detect and remove them is also fundamentally different from anti-virus software. All pests share these common characteristics: most people don't know anything about them, didn't invite them in, don't know they are present, and don't want them in their system. That is the heart of the problem. With thousands of files in today's computers, no one could be expected to know what every single one does. And, without the technology to help find pests, they can live and thrive in your system for a long time before anyone finds out they're there - by which time it may be too late.

Pests have the potential to create even greater damage than viruses - including significant loss of business, legal liability, and public relations nightmares

Protecting your systems against pests

PestPatrol picks up on the protection of your network where current products leave off. It is designed to be used in conjunction with anti-virus software, and has little to no impact on system performance. PestPatrol, used in conjunction with an anti-virus product, offers comprehensive and reliable protection against stealthy malicious code that can result in downtime, loss of employee productivity and legal liability.

A recent example of why additional protection beyond anti-virus was the December 2001 outbreak of BadTrans B. Every anti-virus company came out with a 'quick fix' to detect and remove the worm itself, but did you know that the worm left behind a key logger that may still be hidden on systems you thought were clean? PestPatrol would have found and removed it.

Pest behavior and impact

Pests can do anything that software can do. Here are just a few examples:

  • If your PC has ever locked up for no reason, the CD-ROM drive has started to turn, or you've mysteriously lost files, you could unknowingly have downloaded a RAT (remote administration tool), enabling a hacker to control your machine without you ever knowing. Back Orifice and Sub Seven are well known RATs.
  • If a disgruntled ex-employee plants a key logger on critical systems before he's terminated, he can access confidential data long after he's gone by capturing keystrokes for passwords. This is what the key logger left behind by the trojan incorporated into the BadTrans.B worm was programmed to do.
  • And, how would you like to discover that some company has secretly planted spyware on your machine and has been following your surfing habits and transmitting this information to an outside source?

No network administrator would be happy to find out that intellectual property, customer data or even ownership of the corporate web site has fallen into someone else's (unauthorized) hands.

Unlike viruses, however, there can be 'good' pests. That is to say, tools such as password cracking programs are an important part of the system administrator's toolkit, but in the wrong hands, password crackers can allow unauthorized individuals to access confidential data unchallenged. PestPatrol deals with this "gray area" by enabling you to detect the presence of such a tool only if it's on a PC where you would not expect to find it - in the accounting or sales departments, for example

Why are pests on the rise?

Many factors conspire to make today's computer systems a fertile environment for pest growth.

  • Users have changed. A decade ago, it seemed that many users were fascinated by the details of their computer's operation. Many knew that the size of COMMAND.COM in DOS 5.0 was 47,485 bytes. But today's users tend to regard computers as just another tool to help them do their job, so there is less interest in the details of what is going on behind the scenes. This simply means that, should problem software be inadvertently introduced to a machine, the number of users that are equipped to realize what has happened and deal with it is a much smaller proportion of the total user population.
  • Operating systems are more complex. A decade ago, DOS consisted of COMMAND.COM and two hidden system files, and could fit on a low-capacity floppy. Today, the Windows directory on a typical Windows 98 machine is likely to have 200 or more directories, 4,500 or more files, and use 600 Mb or more. Today, no user could be expected to know what every file in their computer does, where it came from, or if it is even needed.
  • New software cannot be readily inspected prior to installation. A decade ago, nearly all software introduced to a machine was installed from a floppy disk. It was a simple matter to determine the immediate source of that software, and to scan it for viruses. Today, nearly all software is introduced to a machine via the Internet. The transfer process might reveal the overall setup package, but not its components. Even the size of the basic component often cannot be determined with precision. And any kind of security check of the installation package cannot usually be done prior to installation.
  • Software is installed in obscure ways. A decade ago, software installations involved little more than creating a directory and copying some files. Not until DOS 6 were operating system files even compressed. Today, the exact process followed by an installer is hidden by both the installation package (often a single file contains dozens or hundreds of individual files) and installation procedure (an installer may or may not enumerate files as they are extracted.) Sometimes, as in the case of an ActiveX, Javascript, or VBScript component on a web page, there is no evident installation process at all: the software is simply transferred, installed and run, sometimes without any user interaction at all.
  • Trusted sources can no longer be determined. A decade ago, users were counseled to avoid viruses by only installing software from trusted sources, and to not accept software from untrusted sources. Users of a decade ago might call local Bulletin Boards (BBSs), but would rarely make long distance calls to BBSs across the country, or make international calls. And at 2400 baud, users spent some time judging the potential value of software before downloading. Today, all of the world's software is a local call away, via the Internet, and can be accessed 30 to 1,000 times faster than it was a decade ago.
  • There is more problem software. Problem software, such as viruses, does not become extinct just because it is hunted. Every piece of malicious code that has ever been distributed probably still lives, somewhere. In short, the evil that men do lives long after they are gone.

The real problem is that the rate of emergence of pests is increasing. The table and graph below report on the growth of pests in both number of megabytes of pests and total number, by creation date. These values come from the PestPatrol database, available for examination at  http://pestpatrol.com/products/pestpatrol/pestdatabase.asp.

Figure 1: The number of pests has increased rapidly over the past few years.

Anti-virus (AV) requires a different approach
Anti-virus vendors have added detection capabilities for some high-profile pests. They just haven't added it very well or with any degree of thoroughness or consistency. There are two main reasons for this:

There have been many pests in the news recently. In fact, they sometimes seem to be "stealing the show" from viruses. For example, the "SubSeven Defcon8 2.1 backdoor trojan" is a trojan, not a virus.

Anti-virus is not enough
Anti-virus software detects some pests, particularly those that have made the news. But generally, the pest detection rates of anti-virus software are pretty low. To illustrate this, we asked the National Software Testing Laboratory (NSTL) to test PestPatrol's pest detection capabilities against the three major anti-virus software packages - Norton AntiVirus, McAfee, and PC-Cillin. Here is a summary of their findings:

"PestPatrol clearly detects more pests in every category than any other product tested by finding 86% of the pests. PC-Cillin 2000 came in a distant second, finding 55%. Although no product, in its default state, detected every available pest, it is clear which product provides the better protection.

"Our testing indicates that pest detection, unlike virus detection, has not been given strong enough attention by the computer industry. This may be due to the fact that pests tend to run silently, and users often don't even know that their systems are infected. So there is no big outcry by infected owners for remediation or prevention. As more people become aware of pests and see the damage that they can do, there should be increased demand for effective products to detect and clean pests.

"Currently, products tend to do their best detection with trojan-type pests - detecting a larger percentage of them. Pests used for hacking or performing Denial of Service attacks were only modestly detected by the majority of products. Only PestPatrol was able to detect any spyware pests."

Use of anti-virus software is not enough, as many experts have recently argued. "Antivirus software still does an excellent job of protecting against viruses in the wild; however, other products, in association with corporate security policy, are now becoming increasingly important to safeguard the network and critically sensitive corporate data." - Datapro

Anti-virus technology is not well-suited for detecting pests
Viruses do not "install" themselves in a machine. They do not normally examine the registry, nor do they make changes to it. They do not reconfigure the machine to ensure that they run at next boot. The challenge with a virus is to remove it from the objects it has infected, returning them to a fully functional state.

Trojans usually do install themselves in a machine. They frequently modify the registry, and sometimes also modify .ini files, such as win.ini. Deleting a trojan will cause a problem if the registry calls for a missing file to be run. Unlike virus removal, removing a trojan may require editing the registry.

Because a trojan appears to all intents and purposes to be a normal uninfected program, and lacks jumps, there is no convenient section of a few thousand bytes from which a detection scan string might be extracted. To detect a trojan with a scan string is not difficult. To do so without false alarming on non-trojans is a great deal more difficult

The PestPatrol approach

PestPatrol scans your system, looking specifically for malicious code. It currently can detect some 32,000 pests, and the database continues to grow. PestPatrol is designed to be very fast and can scan 33,000 files per minute.

How does PestPatrol differ from anti-virus software?
PestPatrol is not an anti-virus product and it will not remove viruses. PestPatrol looks for and detects other malicious code, including trojans, hacker tools, Denial-of-Service attack agents, and spyware. Since anti-virus products focus on viruses, PestPatrol used in conjunction with an anti-virus product offers complete and reliable protection from the full complement of malicious code that might result in downtime, loss of employee productivity and dissemination of dangerous code.

How does PestPatrol stay current?
We have created a number of tools that automatically manage the PestPatrol database, trapping new malicious code and constantly updating the database. Such new files are downloaded and automatically analyzed.

Information on how to remove this malicious code from the registry, from ini files, and from the file system is automatically added to our PestPatrol.dat database. The database is automatically posted to the web site so that users of PestPatrol have access to the latest strings; the product looks for updates and downloads them automatically, too. The result: PestPatrol can detect a pest within a few minutes of its availability on the Internet and have the necessary removal information immediately available.

Compatibility with anti-virus
PestPatrol is designed to work with anti-virus software, not instead of it. This design required that several conditions be met:

  • the scanning time for PestPatrol needed to be lightning fast;
  • the product needed to be "lightweight", taking little machine overhead;
  • the product needed to detect problems that the anti-virus software missed, with little overlap.

PestPatrol benefits
PestPatrol is fast because its detection algorithms are specifically built for pest detection. At the time of writing, the database contains 11 different pieces of information on each of 32,000 different pests - over 350,000 information elements.

PestPatrol is flexible, with powerful command line capabilities to facilitate scheduling, network-wide scanning (including systems connecting to corporate servers via VPN), reporting, and updating.

 Buy Now And Get Instant Download ($39.95)

 

                                                             

Useful Link
Why choose Tracks Eraser
Online FAQ
Screenshots
Client Testimonials
Privacy Policy
License Agreement
 
 
Home       Download       Purchase       Support      Plugins      Affiliate     About      

Copyright © 2001-2012 Acesoft All Rights Reserved          
Privacy Statement