As a general rule
, using more than one anti-spyware program like Malwarebytes' Anti-Malware, SuperAntispyware, Windows Defender, Spybot S&D, Ad-Aware, Spyware Terminator, etc. will not conflict with each other or your anti-virus if using only one
of them for real-time protection and others as stand-alone scanners. In fact, doing so increases your protection coverage without
causing the same kind of conflicts or affecting the stability of your system that can occur when using more than one anti-virus. The overlap of protection from using different signature databases will aid in detection and removal of more threats when scanning your system for malware. However, competing tools may provide redundant alerts which can be annoying and/or confusing as a result of the overlap in protection.
If using multiple real-time resident shields (TeaTimer, Ad-Watch, MBAM Protection Module, Spyware Terminator Shields, etc.) together at the same time, there can be conflicts
when each application tries to compete for resources and exclusive rights to perform an action. They may identify the activity of each other as suspicious and produce alerts. Further, your anti-virus may detect suspicious activity while these programs are scanning (reading) files, especially if it uses a heuristic scanning
engine, regardless if they are running in real-time or on demand. The anti-virus may even detect as threats, any malware removed by these programs and placed into quarantined areas. This can lead to a repetitive cycle of endless alerts or false alarms that continually warn a threat has been found if the contents of the quarantine folder are not removed before beginning a new security scan.
I recommend taking advantage of the Malwarebytes Anti-Malware (Pro) Protection Module
in the full version which uses advanced heuristic scanning technology
to monitor your system and provide real-time protection to prevent
the installation of most new malware. This technology runs at startup where it monitors every process and helps stop malicious processes before they can infect your computer
. The database that defines the heuristics is updated as often as there is something to add to it. Keep in mind that Malwarebytes does not act as a real-time protection scanner for every file like an anti-virus program so it is intended to be a supplement, not a substitute
. Enabling the Protection Module
feature requires registration and purchase of a license key
that includes free lifetime upgrades and support. After activation, Malwarebytes can be set to update itself and schedule scans automatically on a daily basis. The Protection Module is not intrusive as the program utilizes few system resources and should not conflict with other scanners or anti-virus programs.
If any conflicts between Malwarebytes' and another security program are reported, suggested solutions are usually provided in the Common Issues, Questions, and their Solutions, FAQs
thread. I know and have worked with some members of the research team so I can attest that they make every effort to resolve issues as quickly as possible.
If you are not sure about the settings in Malwarebytes' or how to perform a scan, follow these instructions
I recommend using SUPERAntiSpyware Free
as a separate stand-alone on-demand scanner
. The free version does not provide real-time protection or scheduled scanning so there is no need for it to run at startup and waste system resources. You can always update the database definitions through the program's interface or manually download them from here
. If you are not sure about the settings in SUPERAntiSpyware or how to perform a scan, follow these instructions
.-- Note: With some browsers links to SUPERAntispyware redirect to their home page. If that occurs just click the link under Definitiion Database that says Click here for more information.
I recommend using SpywareBlaster
, program that restricts the actions of potentially dangerous sites
by adding a list of sites and domains associated with known spyware, advertisers and marketers to the browser's "Restricted Sites Zone". SpywareBlaster also prevents the installation of ActiveX
-based malware, browser hijackers, dialers, and other potentially unwanted software amd blocks tracking cookies
in Internet Explorer and any browsers that use the Internet Explorer engine such as AOL web browser, Avant Browser, Slim Browser and Maxthon (formerly MyIE2) and provides protection for Mozilla Firefox, Netscape, Seamonkey, and Flock.mvps.org
is no longer recommending
Spybot S&D or Ad-Aware due to poor testing results. See here
- (scroll down and read under Freeware Antispyware Products)
. Ad-Aware has even been placed into the Installers Hall of Shame
for bundling and pre-checking Google Chrome during the installation. Also read Lavasoft Turning to the Dark Side?
writtne by a former volunteer (now a MVP) who provided support for Ad-Aware but no longer uses the program.
is safe and useful for removing temporary and junk files, I do not recommend using the built-in registry cleaner unless you have a good understanding of the registry
. In fact, I don't recommend using registry cleaners/optimizers for several reasons: Registry cleaners are extremely powerful applications that can damage the registry by using aggressive cleaning routines and cause your computer to become unbootable
The Windows registry
is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component
because it is where Windows "remembers
" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable
. For a more detailed explanation, read Understanding The Registry
. Not all registry cleaners are created equal
. There are a number of them available but they do not all work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad entry
". One cleaner may find entries on your system that will not cause problems when removed, another may not find the same entries, and still another may want to remove entries required for a program to work. Not all registry cleaners create a backup of the registry before making changes
. If the changes prevent the system from booting up, then there is no backup available to restore it in order to regain functionality. A backup of the registry is essential BEFORE
making any changes to the registry. Improperly removing registry entries can hamper malware disinfection
and make the removal process more difficult if your computer becomes infected. For example, removing malware related registry entries before the infection is properly identified can contribute to system instability and even make the malware undetectable
to removal tools. The usefulness of cleaning the registry is highly overrated and can be dangerous
. In most cases, using a cleaner to remove obsolete, invalid, and erroneous entries does not affect system performance but it can result in "unpredictable results
Unless you have a particular problem that requires a registry edit to correct it, I would suggest you leave the registry alone. Using registry cleaning tools unnecessarily
could lead to disastrous effects on your operating system such as preventing it from ever starting again. For routine use, the benefits to your computer are negligible while the potential risks are great