If you can open the TrueActive Monitor, you will find an uninstall button located on the left side of the program...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
setup screen. With this you can uninstall it and, according to TrueActive Software, they will assist you in removing it if they agree that the software has been inappropriately installed. If you wish to remove TrueActive yourself, you should backup your system registry or create a Windows restoration point. According to the ParetoLogic Web site, makers of XoftSpy, you have to delete the winlogon.exe file located in the windows directory as part of the manual removal process. To find out more visit http://labs.paretologic.com/spyware.aspx?remove=Spyware.TrueActive. When I installed TrueActive I found no such file, so be careful that you do not delete the winlogon.exe file located in the system32 directory. This file is the Windows login manager. It handles the login and logout procedures on your system and is an essential part of your OS. TrueActive does not tamper with or corrupt this file.
You may be having difficulities removing TrueActive because your employers have installed it. Another reason could be that other antispyware programs you are running are resetting any registry changes made by XoftSpy. Finally, viruses and spyware can quickly reappear if you have not secured the route they are using to infect your system. I would ensure that your firewall and antivirus program is up to date and perhaps install another anti-spyware program to check and clean your computer.
Dig Deeper on Web Application Security
Related Q&A from Michael Cobb
What is BGP hijacking or IP hijacking and how do cybercriminals pull off the attacks? Expert Michael Cobb explains how enterprises can mitigate these...continue reading
Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael...continue reading
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.