If you can open the TrueActive Monitor, you will find an uninstall button located on the left side of the program setup screen. With this you can uninstall it and, according to TrueActive Software, they will assist you in removing it if they agree that the software has been inappropriately installed. If you wish to remove TrueActive yourself, you should backup your system registry or create a Windows restoration point. According to the ParetoLogic Web site, makers of XoftSpy, you have to delete the winlogon.exe file located in the windows directory as part of the manual removal process. To find out more visit http://labs.paretologic.com/spyware.aspx?remove=Spyware.TrueActive. When I installed TrueActive I found no such file, so be careful that you do not delete the winlogon.exe file located in the system32 directory. This file is the Windows login manager. It handles the login and logout procedures on your system and is an essential part of your OS. TrueActive does not tamper with or corrupt this file.
You may be having difficulities removing TrueActive because your employers have installed it. Another reason could be that other antispyware programs you are running are resetting any registry changes made by XoftSpy. Finally, viruses and spyware can quickly reappear if you have not secured the route they are using to infect your system. I would ensure that your firewall and antivirus program is up to date and perhaps install another anti-spyware program to check and clean your computer.
Dig Deeper on Web application and API security best practices
Related Q&A from Michael Cobb
WhatsApp vulnerabilities can enable hackers to bypass end-to-end encryption and spoof messages. Expert Michael Cobb explains how these attacks work ... Continue Reading
Disabling Google location tracking involves more than turning off Location History. Learn how to manage your account settings to stop tracking ... Continue Reading
Compared to TLS 1.2, TLS 1.3 saw improvements in security, performance and privacy. Learn how TLS 1.3 eliminated vulnerabilities using cryptographic ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.