Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by any such license, no part of this guide may be reproduced, stored in a retrieval system, or transmitted, in any form or by any other means, electronic, mechanical, recording, or otherwise, without the prior written permission of Summitsoft Corporation. Please note that the content in this guide is protected under copyright law even if it is not distributed with the software that includes an end user agreement. The content of this guide is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Summitsoft Corporation. Summitsoft Corporation assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide. 2007 2009 Summitsoft Corporation. All rights reserved. SystemTech, SystemTech AntiSpyware, Summitsoft and the Summitsoft logo are either trademarks or registered trademarks of Summitsoft Corporation in the United States and/or other countries. Other product, font, and company names and logos may be trademarks or registered trademarks of their respective companies. Summitsoft Corporation, Omaha, Nebraska USA http://www.summitsoftcorp.com 1
TABLE OF CONTENTS INSTALLING THE PROGRAM... 3 REGISTRATION... 3 GETTING STARTED... 3 ONE CLICK OPTIMIZER... 3 RESCUE CLINIC... 3 SYSTEM CLEANER... 4 Junk File Cleaner... 4 Registry Cleaner... 4 Startup Cleaner... 4 SYSTEM OPTIMIZER... 5 Memory Optimizer... 5 Disk Care... 5 Windows Tweaker... 5 Power Optimizer... 5 PRIVACY & SECURITY... 6 Privacy Cleaner... 6 Spyware Cleaner... 6 Virus Cleaner... 6 Kids Control... 7 ADMINISTER & CONTROL... 7 SMARTDisk Checkup... 7 Uninstall Checkup... 7 Disk Defrag... 8 PC Info... 8 FILE UTILITIES... 8 File Shredder... 8 File Protector... 8 File Undelete... 9 File Splitter... 9 BACKUP & RESTORE... 9 File Backup... 9 Email Backup... 10 GETTING TECHNICAL SUPPORT... 10 2
INSTALLING THE PROGRAM Insert the SystemTech AntiSpyware CD ROM into your CD ROM drive. Once the auto run appears on your screen, click on Install to launch the installation program. If you have Auto Run disabled, Click on Start Run, and type in D:\Autorun.exe (Where D is the letter of your CD ROM Drive). REGISTRATION Registering SystemTech AntiSpyware is important. Registration provides you with timely access to the latest product updates, technical support, valuable information about new product releases, access to free download, articles, tips and hints, and special offers on Summitsoft products. Unlike other antispyware/antivirus software, you will never have to pay annual subscription fees to receive the latest antispyware and antivirus definition updates (you can update these at any time directly in the program). By registering your software, you will allow us to notify you when any program updates become available. You can register online at: http://www.summitsoftcorp.com/register.asp GETTING STARTED Before using SystemTech AntiSpyware, create a restore point to backup your system. This will protect your computer from any problems that might occur during use of this program. Each time you launch the program, you will be asked if you want to create a restore point; you can do so at this time. When you open SystemTech AntiSpyware you will see the main window. You can navigate through the utilities by choosing a category on the left and then clicking on the utility that interests you. ONE CLICK OPTIMIZER Quickly analyze critical areas of your system using the One Click Optimizer. For a quick analysis of your PC simply click Scan Now on the main program/home screen. This will give you an overview of any issues with your Registry, fragmented files, System Clutter, and User Privacy. After the analysis is complete, click the Fix Problems Now button to open the One Click Optimizer. Select the items you want to fix, and click the Optimize Now button. RESCUE CLINIC Open the Rescue Clinic by clicking Rescue at the top right of the main program window. Once the Rescue Clinic opens, you can create new System Restore points and restore to previous ones, or backup 3
and restore your system registry which is the heart of your computer. It is highly recommended you create a full registry backup and a system restore point prior to using any of the maintenance and repair features of SystemTech AntiSpyware to protect yourself in case you remove a critical file by mistake. SYSTEM CLEANER Junk File Cleaner Over time, your PC collects a ton of obsolete files that sit on your computer and take up space. Junk File Cleaner roots out these files and allows you to remove them from your system to recover your lost space and improve performance. When Junk File Cleaner first opens you will need to choose which disk or partition you want to clean up. Just select one and press Next. The next window will ask you what types of files you want System Scrubber to erase; you can even add or remove file types to fully customize your cleaning. After selecting what files you want to remove, click Next and then exclude any folders or file locations that you don t want touched by the cleaner. Clicking the Next button will now search for the selected files on your PC. Once the scan is complete a new window will appear showing statistics on how many junk files have been found and how much space you can recover. Click the Next button to now choose what to do with these files. Finally click the Next button once more to begin the cleaning process. You will be able to view a report that shows the results of the cleaning process. Registry Cleaner Unnecessary registry entries left from installing and uninstalling programs can threaten the stability of your system and slow down your PC. Registry Cleaner safely removes these entries, and allows you to selectively choose the locations you want to clean in your registry. Before using Registry Cleaner create a restore point to backup your system or create a registry backup. This will protect your computer from any problems that might occur during use of this program. Click the Next button to begin the registry scan. After viewing the scan report, click the Next button again to begin the cleaning process. Startup Cleaner Reduce the time it takes to start your PC by choosing what applications run during startup. Gain easy access to these applications in order to quickly edit, add, erase or modify the default startup list. Simply check any listed program that you want to start up with Windows, or uncheck the programs that you don t want to automatically start every time you start up your computer. 4
SYSTEM OPTIMIZER Memory Optimizer Your system has a set amount of memory and begins to slow as it juggles more tasks. Use Memory Optimizer to boost your system memory for critical applications, and recover leaked memory to improve the performance of your PC. Once launched, SystemTech Memory Optimizer will run in your system tray and display the available memory. You can perform a one time optimization or set the program to automatically optimize the memory once your available memory reaches a certain points. The Memory Optimizer window gives you three sections to work with: General This is the screen that shows after you load the program. It displays details about your current memory status. Manual Optimization This is where you can perform a one time optimization of your memory by clicking the Optimize Memory button. Options This is where you go to setup automatic memory optimization. Turn the option on and insert your desired settings. To access additional Free RAM options, right mouse click on the taskbar icon and a small menu will appear: Disk Care Get back system stability. When you start SystemTech Disk Care, you will be brought to the drive selection screen. This screen asks you to select the disk you want to be scanned for errors. Select a drive and click "Next". Then choose a Scan Type according to your needs. Then click "Next" to start the scan. Windows Tweaker Windows Tweaker consists of seven screens. Each screen contains customizations which can be toggled on or off. After you select options on any screen, click Apply. To turn an option off just uncheck the box and click Apply. Many of the customizations require you to restart your PC in order for the changes to take affect. Power Optimizer Once you open Power Optimizer, you will see the Scheduler areas on the left and the list area on the right. To schedule a new event, click "New Schedule". Then select the Name, action and Schedule of the event. Then click OK. The schedule will now appear in the list. You can click a schedule to highlight it, and then click "Edit Schedule" to edit the settings. Or you can select the schedule then click "Remove Schedule" to delete it. 5
PRIVACY & SECURITY Privacy Cleaner Every time you use your computer, you leave traces of your activity for others to see. Privacy Cleaner helps remove your online and offline tracks with a few simple tools. Before you begin cleaning, navigate to each of the six screens and check the boxes you want deleted on each screen. After you check all items you want deleted, click "Clean Now". Then choose the method you want to use to delete the items from the on screen list. Clean as often as you can in order to keep your PC activity private. Spyware Cleaner Quickly scan and remove spyware infections from your computer. The first window you seen when you open SystemTech Spyware Cleaner is the welcome screen. This window shows valuable information about your latest system scans, about your spyware definitions database file,and also shows the active monitoring status. You can see a list of options in the Control Panel to the left of the window. To scan your computer, first choose if you want a Quick, Full or Custom scan and then click the Begin Scan button at the bottom of the window. You can also go to Change Settings in order to choose more security options that will better protect you. Checking the Deep scan system registry box is highly recommended in order to root out spyware buried in your system settings. You should also make sure the Active monitoring is enabled. The active monitor will start the SystemTech Spyware Cleaner Activity Monitor system that completely monitors your system against viruses, trojans, worms, spyware and malware. Virus Cleaner Quickly scan and remove virus infections from your computer. The first window you seen when you open SystemTech Virus Cleaner is the welcome screen. This window shows valuable information about your latest system scans, about your virus definitions database file, and also shows the active monitoring status. You can see a list of options in the Control Panel to the left of the window. To scan your computer, first choose if you want a Quick, Full or Custom scan and then click the Begin Scan button at the bottom of the window. You can also go to Change Settings in order to choose more security options that will better protect you. 6
You should also make sure the Active monitoring is enabled. The active monitor will start the SystemTech Virus Cleaner Activity Monitor system that completely monitors your system against viruses, trojans, worms, spyware and malware. Kids Control Kids Control allows you to regain control of the computer. This simple program lets you setup specific times your kids can use the computer. The program can also block web sites or programs based on identifiers you specify. Another useful feature is the ability to actually record in detail what the child does online. The first thing you need to do when launching this tool is to create a unique password that you won t forget. You will need this password to open Kids Control and manage the different filters and settings. Once inside Kids Control you can add users and manage different settings for each user including creating a computer time schedule that limits the amount of time a user can be on your system; creating an Internet time schedule that limits the amount of time a user can be on the Internet; blocking specific applications so they cannot be opened by users; blocking specific websites by their URLs or keywords; and performing system tweaks. ADMINISTER & CONTROL SMARTDisk Checkup SMARTDisk Checkup uses Self Monitoring, Analysis and Reporting Technology (SMART) to actively monitor the temperature your compatible hard drive. The temperature is displayed in your tray and alerts can be displayed if your drive reaches a certain temperature. If you have a compatible SMART compatible hard drive, you will see your drive in the top section after the program loads. You can then navigate the four tabs Uninstall Checkup Removing unwanted programs can bring life back to your PC and space back to your hard drive. After you start the program you will see a list of the programs installed on your computer on the right side. By clicking an entry you will see the details of the entry in the Details box. You can then perform commands on the selected entry by clicking Uninstall Software, Remove Entry, or Properties. You can also remove invalid entries where the associated program is actually no longer there, but your PC is incorrectly showing it. By going to Tools > Remove Invalid Entries you can remove these entries from the list. 7
Disk Defrag Defragmentation of your disk drive is critical to optimum performance. Over time, your PC slows down as you create and delete files, install new software, and download files from the Internet. These actions fragment the files on your drive and make your PC unstable and slow. Just select your drive or partition, and then click the Next button to begin an analysis to see if your PC needs to be defragmented. After the analysis is complete you can view the results to see if your system needs to go through the defrag process. Click the Next button if you would like to defrag. Choosing to defragment your system may take a long time depending on your disk configuration and the fragmentation level of files. PC Info PC Info allows you to see every detail about your system. This simple tool displays everything you ever wanted to know about your PC's hardware configuration including information about the drivers for each component. The left column shows you areas of your system. You can double click entries to expand or collapse the tree based list. Then click an entry to view its hardware information. There may be a slight pause while your system locates the information. You can find further information about certain entries by clicking each entry in the top right box. The Resource Type and Description will then be listed in the information box at the bottom of the interface. FILE UTILITIES File Shredder Safely destroy all deleted documents and files using various methods including DoD 5220.22 M, Gutmann's method and more. Anything you wipe cannot be recovered. Read the information in the Welcome screen and then choose what you want to do. Follow the steps in the remaining windows to completely erase your selected files or folders, but keep in mind that you will not be able to recover these once the process has completed! File Protector File Protector allows you to completely hide any file or folder. You can even password protect the files before they can become visible. No other user will be able to see the file in any type of program or Windows Explorer. Only you will be able to access the files. After you start the program for the first time the hiding engine will be installed. Then you will receive a message stating to restart the program. After restarting the program you will see an empty list of hidden files or folders on the right. This is where the files or folders you hide will appear. 8
To Hide a file or folder, go to the File menu and click "Add Files" or "Add Folder". Then select the file or folder you wish to hide. The entry will then appear in the list of hidden files. Note: The file will appear in Windows Explorer until the view is refreshed or Explorer is restarted. To access a hidden file or folder you would need to start SystemTech File Protector, then click the file's entry and click "Disable Hiding". You can then access the file or folder as normal. When you are finished, simply click the file's entry and click Enable Hiding to re hide it. You can also remove an entry from the list by first un hiding the file or folder, then go to Edit > Delete. To make SystemTech File Protector password protected, go to Tools > Password and setup the password. Then the next time you restart the program it will require the password before it allows the user to access the interface. File Undelete Recover files that were removed or deleted from your computer. File Undelete is not supported on Windows Vista. When you start File Undelete, first select the drive you wish to recover files from. After you select the drive, click "Start". The program will then scan your drive for files which can be undeleted. After the scan is complete, click "Next" to view the results. After you click Next the screen will show the results of the scan. You can "Recover" or "Preview" any file in the list. Or you can "Filter" results to show only files which meet a certain criteria. File Splitter SystemTech File Splitter allows you to split any file into multiple smaller files. For example, split a 1000MB file into two 500MB files so it will fit onto two CDs. This simple tool safely splits the data into a number of files using a size you specify. The program consists of two functions: Splitting Files and Joining Files. BACKUP & RESTORE File Backup File Backup allows you to create regular backups of your system. It backs up any file(s) or folder(s) on your system. You can restore your system to a previous backup to make your computer's files return to exactly how they were at the time of the backup. This simple tool is the perfect daily backup solution. Once you are inside SystemTech File Backup, you will see the Task areas on the left and the two List areas on the right. By clicking on an entry in the Job list you will see the backups made for that job in the Backup List. To begin, click Create New Job and then follow the steps in the window that appears. 9
After you have a job in your Job List you can click its entry and perform any of the Job commands such as Edit or Delete. The same goes for the Backups List. You can create a new backup by clicking Start Backup. To restore a backup simply select the backup and click "Restore Backup". Email Backup Email Backup allows you to schedule regular backups of your email program. It backs up program settings, addresses and every email in every folder. Email Backup works for Outlook, Outlook Express, Windows Mail and many other email clients, and can also backup your Internet Explorer favorites. GETTING TECHNICAL SUPPORT Purchasing your Summitsoft program gives you free access to Summitsoft s online technical support. Many questions may be answered by checking our Frequently Asked Questions (FAQs) web page. If you cannot find your answer among the FAQs, you can email us for technical assistance with your problem. Online Support: http://www.summitsoftcorp.com/support.asp Email Technical Support: support@summitsoftcorp.com 10