{"id":169,"date":"2017-08-15T15:04:55","date_gmt":"2017-08-15T15:04:55","guid":{"rendered":"http:\/\/wcsusupport.wpengine.com\/?post_type=ht_kb&#038;p=169"},"modified":"2024-08-02T14:59:58","modified_gmt":"2024-08-02T14:59:58","slug":"what-are-some-anti-spyware-resources","status":"publish","type":"ht_kb","link":"https:\/\/support.wcsu.edu\/?ht_kb=what-are-some-anti-spyware-resources","title":{"rendered":"What are some anti-spyware resources?"},"content":{"rendered":"<p>Many security products available combine anti-virus and anti-spyware abilities into a singular package. Below are common anti-spyware tools.<\/p>\n<h3><b>Spyware Removal Tools<\/b><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a><\/li>\n<li><a href=\"https:\/\/www.safer-networking.org\/\" target=\"_blank\" rel=\"noopener\" data-cke-saved-href=\"http:\/\/spybot.safer-networking.org\/en\/download\/index.html\">Spybot Search Destroy<\/a><\/li>\n<li><a href=\"http:\/\/www.brightfort.com\/spywareblaster.html\" target=\"_blank\" rel=\"noopener\" data-cke-saved-href=\"http:\/\/www.javacoolsoftware.com\/spywareblaster.html\">Spywareblaster<\/a><\/li>\n<li><a href=\"http:\/\/www.superantispyware.com\/\" target=\"_blank\" rel=\"noopener\">SuperAntiSpyware<\/a><\/li>\n<\/ul>\n<h3><b>Spyware Resources<\/b><\/h3>\n<ul>\n<li><a href=\"https:\/\/forums.majorgeeks.com\/threads\/read-run-me-first-malware-removal-guide-incl-spyware-virus-trojan-hijacker.35407\/\" target=\"_blank\" rel=\"noopener\">Major Geeks<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Many security products available combine anti-virus and anti-spyware abilities into a singular package. Below are common anti-spyware tools. Spyware Removal Tools Malwarebytes Spybot Search Destroy Spywareblaster SuperAntiSpyware Spyware Resources Major Geeks<\/p>\n","protected":false},"author":4,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[19],"ht-kb-tag":[],"class_list":["post-169","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-security"],"_links":{"self":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=169"}],"version-history":[{"count":0,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb\/169\/revisions"}],"wp:attachment":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=169"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fht-kb-category&post=169"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fht-kb-tag&post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}