Download.it search icon
Advertisement

Find and eliminate all types of online PC threats

Find and eliminate all types of online PC threats

Vote: (142 votes)

Program license: Trial version

Developer: Webroot Software

Version: 6.1.0.145

Works under: Windows

Vote:

Program license

(142 votes)

Trial version

Developer

Version

Webroot Software

6.1.0.145

Works under:

Windows

Pros

  • Comprehensive security with customizable shields
  • Extensive threat database with over 375,000 entries
  • Various scan types to suit different user needs
  • Quarantine system for managing detected threats
  • Ability to schedule automatic system scans
  • Improved user interface for better navigation

Cons

  • Scans can be time-consuming
  • Not suited for those requiring instant scanning results

Advanced Spyware Detection and Removal

Spy Sweeper 2011 stands as a comprehensive solution for safeguarding your computer against various cyber threats, including spyware, Trojans, and other malicious software. With cyber security being a major concern for many users, Spy Sweeper 2011 seeks to offer peace of mind by shielding your system through multifaceted protective measures.

Customizable Protection Shields

This cleaning utility boasts a range of "shields," which are security layers tailor-made for protecting different segments of your computer's ecosystem. These segments include web browsers, network connections, the core Windows system, programs launching at startup, and even email attachments. The ability to customize these shields based on individual user needs enhances the versatility of Spy Sweeper 2011 and ensures a targeted approach to system security.

Detailed Threat Analysis

Leveraging a robust and frequently updated database with over 375,000 threat definitions, Spy Sweeper 2011 stands ready to thoroughly analyze your system. Users are presented with the flexibility to conduct three distinct types of scans: full, quick, or custom. A full scan offers a comprehensive system examination, while a quick scan serves as a rapid checkup and the custom scan allows for pinpointed scrutiny of specific areas.

Scan Duration

Scan durations are a point of consideration with Spy Sweeper 2011. Despite the variance in scan types, users should anticipate a similar timeframe for each scan to complete. This may not be the quickest solution, with scans ranging from fifteen to thirty minutes depending on various system factors, such as hard drive size and data volume. Users seeking immediate results might find this aspect less accommodating, suggesting that scans would be most conveniently run during periods of minimal computer usage.

Quarantine and File Management

Upon completion of a scan, Spy Sweeper 2011 sequesters any suspicious files into a quarantine zone. Here, you have the discretion to review and determine the fate of these files. While elimination is often the most prudent action, having alternative options allows for a tailored response to potential threats.

Scheduling and User Interface Improvements

The application allows for the scheduling of regular scans, ensuring consistency in system protection without requiring manual initiation. This feature is particularly beneficial for maintaining routine checks without impinging on your workflow. Additionally, Spy Sweeper 2011 has been praised for its improved user interface, providing a more intuitive experience that simplifies navigation and enhances usability.

Updates and Support

The utility introduces preemptive blocking using FlexDefs, comprehensive removal technology (CRT), and the deployment of new Smart Shields. The speed of automated definition downloads has also been increased, reinforcing the system's defense capabilities and ensuring that protection is up-to-date.

Overall Impression

Spy Sweeper 2011 offers an expansive set of tools for fortifying your PC against intrusions and ensuring your private data remains secure. Its comprehensive approach to spyware removal and preemptive blocking makes it a worthy contender in the arsenal of any user serious about cybersecurity.

Pros

  • Comprehensive security with customizable shields
  • Extensive threat database with over 375,000 entries
  • Various scan types to suit different user needs
  • Quarantine system for managing detected threats
  • Ability to schedule automatic system scans
  • Improved user interface for better navigation

Cons

  • Scans can be time-consuming
  • Not suited for those requiring instant scanning results