Documente Academic
Documente Profesional
Documente Cultură
MacScan uses advanced detection methods to detect, isolate, and remove Spyware, keystroke loggers, and Trojan horses from your system. It alerts you to remote administration programs that may have been maliciously installed on your Macintosh. When MacScan detects spyware, it generates a report which allows the user to isolate the components. MacScan will move all selected spyware programs, extensions, preferences, and log files to a single and secured location.
Page 3 of 16
This section highlights the options that are found on the Preferences screen in MacScan. To change the preferences, select Preferences under the MacScan menu, or click the Prefs icon in the MacScan toolbar.
Page 4 of 16
No Click the No button if you do not want to run MacScan in authenticated mode. Yes Click the Yes button if you want to run MacScan in authenticated mode.
Page 5 of 16
Name Enter the username of the Administrator account in the Name field. By default, the account created after installing OS X is an administrator account. Password Enter the password for the account in the password field. OK Click the OK button to proceed after entering the username and password of an Administrator account. Cancel Click the Cancel button to close the Authenticate screen if you choose not to run MacScan in authenticated mode.
After successfully authenticating, or if running MacScan in Normal Mode, MacScan will display the main window:
Page 6 of 16
MacScan's intuitive interface makes it easy to start scanning your computer for spyware. When MacScan starts up, the status screen displays statistics about spyware scans performed by MacScan as well as information about the version of MacScan currently running. The spyware statistics are automatically updated after each spyware scan and include the date and time of the last spyware scan, the number of spyware components detected on the last scan, the total number spyware scans that have been run, and the number of spyware components detected overall. Below the scan statistics are internal details about the current version of MacScan, which includes the scan engine version, the Spyware Definitions version, and the creation date of the current definitions. The status screen also includes information on the Cookie Blacklist, a list of known cookies that can track your internet surfing habits. The Cookie Blacklist Version and creation date are also displayed.
Page 7 of 16
To view the different types of scans, click on the scan icon located in the MacScan toolbar, or click on the scan button located on the status screen.
The scan screen contains information on each type of scan. To choose a scan type, select the appropriate tab. MacScan offers three different types of spyware scans: quick scan, full scan, and custom scan.
Page 8 of 16
4.1.1.1 Running a Quick Scan To perform a Quick Scan, click the Quick Scan tab on the Scan Screen, and then click on the Scan button in the lower right corner. You can then view the scan status as MacScan scans your hard drive. Quick Scans should be performed frequently (daily or weekly). The scans are short but ensure protection of your computer and your privacy. However, running a Full Scan upon installation of MacScan is strongly recommended.
Page 9 of 16
4.1.2.1 Running a Full Scan Click on the Scan button to run a Full Scan on your hard drive.
Note: Running MacScan in authenticated mode allows Full Scan to run at full capability.
Page 10 of 16
Select the folder or drive to be scanned from the window that appears, and click Select. MacScan will start scanning the specified folder or drive for spyware.
Page 11 of 16
Done Click the Done button when the scan is over. Cancel Click the Cancel button at any time during a scan to end the current scan. Any spyware detected by that point will be displayed. Threat Each piece of spyware detected by MacScan is assigned a threat level to indicate the impact on your operating system.
Trojan horses and keystroke loggers are the biggest threats to your system security and are visually represented by a red triangle.
Tracking cookies are medium level threats and are represented by a yellow triangle.
Remote administration programs that are not necessarily spyware but can be used to compromise your system security are represented by a green triangle. Spyware Name The spyware applications that have been detected will be displayed in the column labeled Spyware Name. Page 12 of 16
Spyware Type The classification of spyware applications that have been detected (Trojan horse, Keylogger, or Remote Administration Program) will be displayed in the column labeled Spyware Type. As with all of the scan types, Custom Scan will only be able to scan folders and files that you can access with your user account. If you are unable to scan a specific location with Custom Scan, run MacScan in Authenticated Mode. If you do not have administrator access to run in Authenticated Mode, contact the administrator and ask for assistance. If spyware is found, the following screen will be displayed:
Select which spyware to isolate, and click the "Isolate" button. Spyware such as Trojan horses and Keyloggers will be isolated to the folder MacScan Isolated Spyware on the Desktop. Tracking cookies will be removed immediately.
Page 13 of 16
You can select specific web browsers and specific files you want to clean. To clean Internet/Web files, you must select at least one browser and at least one file type to clean. Web Browsers to clean: Indicate the web browsers to be cleaned by clicking on the Select box next to the name of the desired browser. Web browsers not installed on the computer will be grayed out and not selectable. You can select more than one web browser to clean at a time. Files to clean: Indicate the files to be cleaned by clicking on the Select box next to the name of the file you want to clean.
Page 14 of 16
You can select more than one file to clean at a time. Cookies Select this box to clear cookies from your computer. History Select this box to clear History files. Downloaded Files List Select this box to clear the Downloaded Files list. Temporary Cache Files Select this box to clear Temporary Cache files.
Page 15 of 16
6.1.1.1 Keyloggers Select Keyloggers to get information about Keyloggers. 6.1.1.2 Trojan Horses Select Trojan Horses to get information about Trojan Horses. 6.1.1.3 Spyware Select Spyware to get information about Spyware. 6.1.1.4 Remote Administration Programs Select Remote Administration Programs to get information about Remote Administration programs.
Page 16 of 16