rrt6 5 user manual en

Upload: sivabharath-bathalla

Post on 06-Apr-2018

232 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Rrt6 5 User Manual En

    1/28

    Probably you will not believe this, but many computer users do not have anantivirus program installed in their machines or the installed program is notupdated from the Internet on a regular basis, and they think they are immunefrom malware attacks. Even more dangerous, even with the presence of aneffective and updated antivirus, many users believe they are protected frommalware attacks!

    In fact, they are wrong, and the result is I receive a lot of machines that need to

    be fixed due to malware attacks, which cost the owners a lot of money theywould have avoided spending.

    As a daily routine, when I start fixing any machine, I used to do a full scan withthe latest and updated versions of Malware Removal Tools to eliminate malwarefirst, and then I reboot the machine, but every time I do that I find the same

    problem; the malware had applied many restrictions on the use of the machine tohide themselves from detection. These restrictions are usually the following:

    1 - Disable Folder OptionsSo the user cannot set the option to show hidden files!

    2 - Disable Registry ToolsSo the user cannot see what is going on during system startup!

    3 - Disable Ctrl+Alt+DelSo the user cannot see the virus and the other applications through Task

    Manager!

    4 - Disable Show hidden files & foldersSo the user cannot see the malware bodies which always come with hiddenattribute set to true!

    5 - Disable Run Command

    So the user cannot use it to run some tools to track the virus and remove it.

    6 - Disable Windows Firewall (SharedAccess)

    So the virus can send & receive any data through the network without theattention of the user!

    7 - Disable Windows Firewall (Wscsvc)So the virus can send & receive any data through the network without theattention of the user!

    8 - Disable Windows Firewall (Wuauserv)

    So the virus can send & receive any data through the network without theattention of the user!

  • 8/3/2019 Rrt6 5 User Manual En

    2/28

    9 Restrict Internet Explorer Home Page ChangingSo the user cannot change the malicious web page set as IE Home Page by themalware!

    10 Restrict Internet Explorer ClosingSo the user cannot close the popup windows that appear when visiting the

    malicious web page or any other website!

    11 Hide Internet OptionsSo the user cannot change any Internet setting set by the malware!

    12 Hide Internet Explorer Address BarSo the user cannot see what web page being visited and what scripts being

    executed!

    13 - Restrict Internet Explorer Right ClickSo the user cannot view the source of the page being visited.

    14 Hide Internet Explorer Navigation ButtonsSo the user will be forced to use the keyboard shortcuts to navigate through the

    web sites!

    15 - Hide Internet Explorer Context MenuSo the user cannot access this menu and change settings.

    16 - Hide Internet Explorer ToolbarSo the user cannot use it to remove malicious or unwanted toolbars installed bythe malware.

    17 - Disable Command Prompt (cmd.exe)

    So the user cannot run any console programs to remove the virus.

    18 - Disable Control PanelSo the user cannot use the control panel applets.

    19 - Hide system files/foldersSo the user cannot see the malware bodies which usually come with systemattribute set to true!

    20 - Change Show Hidden files option buttonSo even if the user selects "Show hidden files and folders from folder optionsthese files & folder will not be shown!

    21 - Disable Show System files check boxSo even if the user unchecked "Hide protected operating system files" these files& folders will not be shown!

    22 - Disable Show all files/folders checkSo changing this from Folder Options will be ignored!

    23 - Hide Desktop itemsTo prevent the user from accessing My Computer and other desktop shortcuts!

    24 Hide files extensions.This is commonly used by malware to trick the user. By hiding common file

    extensions and giving the malware executable a folder icon, a user will not knowhe/she is starting a malicious program not opening an ordinary folder.

  • 8/3/2019 Rrt6 5 User Manual En

    3/28

    25 Disable File Extensions CheckSo changing this from folder options will be ignored!

    26 Restrict Windows UpdateSo the user cannot download security patches from Microsoft website.

    27 Disable Shutdown CommandSo the user cannot shut down the system normally.

    28 Restrict Settings Folders

    Just imagine when all items under Start menu>Settings> do not run!

    29 Disable Taskbar context menu

    You right click your taskbar. Oops; nothing happens!

    30 Disable Logoff CommandSo the user cannot logoff current profile and use another profile.

    31 Hide Start Menu LogoffSo the user cannot use this shortcut to logoff!

    32 Restrict Add/Remove ProgramsSo the user cannot see what applications and windows components are installedor uninstall/reinstall any application.

    33 File Extension DefaultSo the user cannot select "Hide extensions for known file types".

    34 No Windows UpdateSo the user cannot download security updates and other fixes for windows.

    35 R-Media Malware (Removable Media Malware)This item is indicating that a malicious object is trying to attack your computerthrough removable media, please see the details below.

    36 Hidden DrivesSo the user cannot see any of the storage drives but they still can use RUNcommand to access and explore them.

    37 Restricted DrivesSo the user can see but cannot access the drives even by using RUN command.

    38 No SearchSo the user cannot search the file system using the start menu item.

    39 No Display

    So the user cannot access Display Control Panel to change the display settings.

    40 - Corrupted Safe Mode

    So the user be forced to start the computer in normal mode where the virusalways active.

    41 - Execution DebuggerCannot install or run specific security tools and antivirus software to get rid of thevirus.

  • 8/3/2019 Rrt6 5 User Manual En

    4/28

    42 - Windows Security CenterSo the user cannot access many security settings.

    Unfortunately, All Antivirus software do not care about these restrictions, theyonly delete the malware bodies, leaving the remnants of malware untouched,

    which was taking me a lot of time to remove manually (which is of coursetranslated into more money on the shoulders of the machine owner).

    Having long experience in computer maintenance and malware removing and

    with a good experience in programming and managing automated tasks, Ideveloped a little tool that removes all these restrictions simply with the click of abutton. It has helped me a lot and saved me a lot of time and effort. Then I

    wanted this tool to benefit the others so I published it on the Internet for free.Since then, the number of users who used the tool (at least once) all over theworld reached millions whether they were normal users or computer maintenanceexperts. You probably one of these millions, if you are not, this tool is:

    After that RRT had great success and had achieved wide fame until version 3.0, I

    decided to develop it and make it able to defend computers against malware andnot just remove the remnants of them; this is what actually happened.

    I developed version 4.0 of the tool and added new features to it, one of the mostnoticeable feature was ( emovable edia alware efender).

    Since I noticed that most oftodays malware spread via removable media (Flashdisks in specific), I implemented RRT with the ability of monitoring, blocking andremoving any type of malware that uses flash disks to spread.

    RRT with AutoRemove enabled will monitor your system in real time, detects anyflash disk as soon as it gets plugged into a USB port. The smart detectiontechnique will work in less than few milliseconds, if it detects any infection in theflash disk, it will block it and remove the infection before it makes any harm to

    your computer.

    Again, after that v4.0 had great success and had achieved wide fame, I decidedto add more features to it, so I merged it with other previous programs of mine,

    developed new programs and packaged all in one program and called it:

    ( )

    SAT can be obtained in many ways; the fastest and the easiest way is todownload it from the Internet. All you need is to visit Sergiwa.comor point your

    browser directly to the download page of the product at this link:

    http://www.sergiwa.com/modules/mydownloads/singlefile.php?cid=2&lid=1

    After the completion of the download, open the folder in which you downloadedthe file and you will find the main program icon as shown in the following image:

    http://www.sergiwa.com/http://www.sergiwa.com/http://www.sergiwa.com/modules/mydownloads/singlefile.php?cid=2&lid=1http://www.sergiwa.com/modules/mydownloads/singlefile.php?cid=2&lid=1http://www.sergiwa.com/modules/mydownloads/singlefile.php?cid=2&lid=1http://www.sergiwa.com/
  • 8/3/2019 Rrt6 5 User Manual En

    5/28

    Double click this icon to run the program, once you run the program the followingmessage box appears:

    This message box tells you that you are using the free demo version of theprogram. It is a limited version that removes the remnants of malware andrestrictions applied by them but it does not include the advanced features of thetoolkit.

    This screen gives you the serial number of your copy or so-called , andasks you -if you need the full version- to go to the purchase page and enter thisserial number in the specified field.

    Note:It should be noted that the serial number above should be copied and pasted and

    not written by hand in order to avoid errors, this is very important because if youenter the wrong number in the order form you will receive the wrong license.

    Once you complete your order of the program by one of the payment methods

    described later you will receive your license key which makes your copy of thesoftware runs in FULL mode and includes all the features.

    Note:

    It is noteworthy that after you purchase your copy of the full version it will belocked to your computer only, meaning it will not work on any other computer,which saves you your right if someone attempted to steal your license info. If youneed a copy that works on specific or unlimited number of computers, or worksas a shared application on your local network [email protected]

    Whereas you did not purchase the program yet, click .

    If you click and you are connected to the Internet, the program will run andtake you at the same time to the purchase page on our site in case you decided

    to buy the program and get the full version, if you didn't decide yet, simply close

    the purchase page and continue using the Limited Free Demo version.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/3/2019 Rrt6 5 User Manual En

    6/28

    Difference between the free DEMO version and the paid FULL version:

    In the program's interface there is no apparent difference except in the mainform caption, where in the free version it reads:

    Sergiwa Antiviral Toolkit v6.5.0.2 *DEMO*

    And in the full version it reads:

    Sergiwa Antiviral Toolkit v6.5.0.2

    By using the free limited version of the program you can remove the leftoversmalware leave behind and remove the restrictions applied by malware, either oneby one, or all altogether by one click.

    When you run the demo version of the program it notifies you as soon as itdetects a restriction on your computer and enables the corresponding check box

    for selecting with red color so that you can select it and click button to

    remove it. If the program did not find any restriction on your computer it does

    not enable any check box for selecting as doing so does not make any sense.

  • 8/3/2019 Rrt6 5 User Manual En

    7/28

    Example:If a virus that had infected your machine in a prior time applied a restriction onthe use of the system registry editor, when you try to access the Registry Editorby typing regedit in the command line, Windows will give out the followingmessage:

    This message means that there is a restriction on the use of Registry Editor and

    you cannot access it. In order to get rid of this problem, run and it will looklike this:

  • 8/3/2019 Rrt6 5 User Manual En

    8/28

    As you can see in the above image, detected that Registry Editor isrestricted, therefore, the corresponding check box goes enabled and flagged inred. In order to fix this problem all you need to do is to select the red check box

    and then press button to remove it. Once you press button

    you get the following message:

    Means that has successfully removed the restrictions on the use of RegistryEditor for the current user and all users who work on your computer, but you

    may need to restart your computer in order to complete the operation (Usuallynot required).

    Now as removed the restriction on registry editor you can type regeditin thecommand line to access the Registry Editor with full privileges. End of example.

    You can apply the above example to all the restrictions mentioned in the

    beginning of this document in the same way, and instead of removing the

    restrictions one by one, you can select all enabled check boxes by clicking onbutton and then click button and the program will remove

    all the restrictions it detects.

    In some cases, you may need to ignore some restrictions from being monitored,for example: Suppose you want the software to monitor your system but ignore

    Show hidden files and folders restriction. In this case, just click ignore optionbutton beside the specific restriction checkbox as shown in the following image:

  • 8/3/2019 Rrt6 5 User Manual En

    9/28

    You can do this with all restrictions you want to ignore. Also, you can do this withRemovable Media Malware detection by clicking R-Media Malware option Ignorebutton. In this case the software will no longer monitor your removable media formalware. (Not recommended)

    If all check boxes are disabled (grayed out) then this mean your computer is freeof restrictions. This is a good sign, you can then click on the standard box atthe top right of the program window to minimize the program and put it as anicon in the system tray next to the clock so that it appears as in the following

    image:

    Here, tells you that it is now monitoring your system and will notify youwhen any emergency occurs, whether it is an applying of a restriction or apresence of malware in a flash disk you have just plugged in.

    If a malicious program that uses the method of applying restrictions in order tohide itself from detection entered your system through the Internet or a CD-ROM

    drive (CD/DVD) or even was hidden in your file system before you run the toolkit,will notify you immediately.

    In the event of malware attack, the notification would be as follows:

    If there is a virus inside a flash drive or a memory card of a mobile phone youhave just inserted, the former warning accompanied by a human voice tells youabout the presence of the malware. It goes: "Virus Found!To respond to this

    alert, double click the program icon where you can remove the restrictions in thesame manner described earlier.

  • 8/3/2019 Rrt6 5 User Manual En

    10/28

    If the detected problem is a virus, it appears in the program interface as follows:

    Note the existence of the red circle next to the option of removable media

    malware ( ). There is also a red line warns you to NOT open

    the flash disk before pressing button.

    Needless to say that the free demo version of notifies you of the presence ofrestrictions and removes them, it also notifies you of the presence of viruses

    within flash disks, flash memory cards, digital cameras mobile phones but it doesNOTremove these viruses, if you press button the program shows you

    the following message:

  • 8/3/2019 Rrt6 5 User Manual En

    11/28

    This means that has found viruses but you cannot remove them because youare using the free demo version, therefore, all you can do is to thank forletting you know about the presence of the malware, and then do immediately

    remove the flash disk, otherwise your system will get infected. If you wantto defend your computer against these viruses and remove them you will need to

    buy the full version.

    When right-clicking the program icon, a context menu appears with several itemsas follows:

    Clicking on this option shows the program main window.

    This option can be enabled only in the full version (see full version specification

    later).

    This option enables/disables loading each time your system starts to ensurethat the program works automatically in case you forget to load it manually. Thisoption is enabled by default, once you run for the first time on yourcomputer it will start automatically every time you reboot your computer. You can

    disable this option by clicking it, in this case, will not work unless you run itmanually (not recommended).

    This option is enabled by default, but if you do not want to receive more

    notifications about emergency events taking place in your computer, you can

  • 8/3/2019 Rrt6 5 User Manual En

    12/28

    revoke the alarms by selecting from this list. If you

    want to re-activate the alerts you simply select .

    Warning:Disabling notifications is not recommended at all because it prevents fromnotifying you. Disabling notifications is only desirable when you are sure youreyour machine is free of malware. However, please note that disabling notificationsdoes not mean disabling protection, will remain doing the job but it will notnotify you of what it is doing.

    This option takes you to our new software; . This software is

    still under developing and not published yet. For more information about thissoftware, please read the web page this option takes you to.

    Clicking on this item takes you to a web page that shows my point of view aboutsoftware piracy. If are not a software pirate do not click on this option! However,it is much appreciated that you spread the word;Say No to Piracy.

    Shows information about the program.

    Exits the program.

    The Full version of the SAT includes many great features, including:

    Defend your computer against removable media viruses, stop them and

    remove them before they enter your computer.Scan your removable media drives for suspicious components.Quarantine zone to save copies of suspicious components and viruses in an

    isolated environment.Removing viruses automatically as soon as they arise.Scanning your entire file system for viruses with a database that contains (up

    to this moment) more than 62,000 records of unique malware digital signatures.Heuristically scan your system for suspicious components, so viruses can be

    identified by its activities not by their digital signatures.The possibility of building up a database of malware digital signatures of your

    own.

    These features are available only in the full version. If you try to use one of themin the demo version it shows you the following message:

    http://www.facebook.com/pages/la-llqrsnt/173831502630692?v=wallhttp://www.facebook.com/pages/la-llqrsnt/173831502630692?v=wallhttp://www.facebook.com/pages/la-llqrsnt/173831502630692?v=wallhttp://www.facebook.com/pages/la-llqrsnt/173831502630692?v=wall
  • 8/3/2019 Rrt6 5 User Manual En

    13/28

    1. Defend your computer against removable media malware, stop themand remove them before they enter your computer:

    This feature is powerful, new, unique and it is the first of its kind. Some giantsecurity companies copied this feature later. It allows you to make sure viruseswill not attack your computer through removable media drives; Pen drives, flashmemory cards, digital cameras and mobile phones. Removable storage media are

    widely used today and are considered as one of the largest means of spreadingviruses between computers.

    This feature works in real time, once you insert any storage media the programalerts you of the presence of malware or suspicious files and gives you the optionto remove them immediately before they cause any damage to your computer.

    When gives out such an alert, you should follow the instructions on screen.

    You should select check box then click button. The red alert

    line in the bottom of the tool will turn to green and the alarm sound will stop.

    2. Scan your removable media drives for suspicious components:

    After you remove the viruses, you should click on button to bring the

    following form:

  • 8/3/2019 Rrt6 5 User Manual En

    14/28

    Click on button to start scanning the removable media, the program will

    scan all removable media and shows you a list of all suspicious components found

    and gives you the option to delete some and keep others, or delete all.

    To delete one single object, select the name of the object, and then click

    button, to delete all objects, click button.

    Click to abort the scanning process at any time. Click button to

    reset the display.

    CAUTION:

    Not all the objects this feature detects are necessarily viruses, so be careful whenyou delete them. However, even if you deleted an object by mistake it can be

    restored by clicking button at the bottom left of the main program

    window and follow the instructions on screen as described later.

    To return to the main program window press button as shown in thefollowing image:

    3. Quarantine zone to save copies of suspicious components and virusesin an isolated environment.

    When you press button the following dialog box appears:

    is a secure place where in keeps backup copy of every object it

    removes. In the event of false positive alarms or you just want to restore a

  • 8/3/2019 Rrt6 5 User Manual En

    15/28

    particular file you can simply restore it from there. saves a backup copy ofevery object it removes in a folder named RRTVAULT under the root folder ofyour system drive (usually C:) by adding random numbers to the end of the filename. If you want to restore a file, all you need to do is to rename the file backto its original name by deleting these random numbers.

    The above dialog box asks you to do one of two things: Either press button

    to open the quarantine folder to review the files in case you want to restore one

    of them. Or press button to delete all the backup files in it.

    Warning:It is not recommended to delete all files in the quarantine folder before reviewing

    them. It is recommended to keep these files, zip them and send the zipped file [email protected] analysis.

    4. Removing viruses automatically as soon as they arise (AutoRemove):

    This great feature automatically removes all restrictions and removable media

    malware as soon as they are detected and only notify you that the work is done,and if you prefer, you can as described above, so the

    program silently and efficiently defend your computer against all types of virusesthat spread through such media.

    This option can be selected from the context menu mentioned above. It is thesecond option from the top as shown in the following image:

    Once selected, the program red icon turns to green as the follows:

    Important Notes:

    1.In order for to remove viruses, all removable media drives must be write

    enabled. Some USB drives come with the possibility to be locked (WriteProtected), in this case, once detects a write protected USB drive it notifiesyou in two ways:

    mailto:[email protected]:[email protected]:[email protected]
  • 8/3/2019 Rrt6 5 User Manual En

    16/28

    If the program is minimized, the notification goes as follows:

    If the program is maximized, the notification goes as follows:

    2. If you are using an Antivirus software, and theres a virus that is detected byboth and your Antivirus, a conflict will take place when tries to remove

    the virus. In such case, it is highly recommended leaving the initiative to theAntivirus software to delete the virus. If the virus is not detected by yourAntivirus, SAT will take care of it.

    If you are using Kaspersky Antivirus and you encountered this conflict during theremoval of a virus, the following message appears:

    3. When a new virus is active (running) and is undetected by your AV softwareand you try to remove it with , an access violation error will arise. You stillcan use smart detection technique to identify it. Reading the following

    message will tell you how:

  • 8/3/2019 Rrt6 5 User Manual En

    17/28

    To be able to remove this virus you have two options:

    a. Send this file to [email protected] analysis so that I can add it to the

    database and you can then update the program and use to remove

    the virus easily as described later in this document.

    b. Use as described later in this document.

    5. Scanning your entire file system for viruses with a database thatcontains more than 62,000 records of unique malware digital signatures.

    This feature is based on the traditional scanning technology which is based ondigital signatures of malware used in most of antivirus software. The database of

    contains 62,000 records up to the date of writing this document. Most ofthese records are for todays malware because we focus mainly on theeffectiveness. There is no meaning to overburden the program database withsignatures of extinct malware.

    Start this feature by clicking button as shown in the picture below:

    Once you click on the button, the program interface turns as follows:

    mailto:[email protected]:[email protected]:[email protected]
  • 8/3/2019 Rrt6 5 User Manual En

    18/28

    Scan process can be started directly by pressing button. The program

    scans all files on all disk drives, whether they are internal or external hard drivesor CD or floppy or flash or any type of storage media. If a virus detected, it is

    immediately deleted and moved to quarantine folder.

    If you want to scan specific files or folders or disk drives you can do so by clicking

    on button and the following message shows up:

    This message tells you that the program has been linked to your Windows

    Explorer successfully. From now on, whenever you want to scan a folder or a diskdrive you just right click it then select:

  • 8/3/2019 Rrt6 5 User Manual En

    19/28

    As shown in the following image:

    If you want to know the names and the number of viruses in the programs

    database you can do so by clicking on button so a list of the databasecontents appear as in the following image:

    Note:Malware whose names appear in the image above are not really found in yourmachine, they are just the main program databases contents, just the names of

    viruses that can be removed by .

  • 8/3/2019 Rrt6 5 User Manual En

    20/28

    6. Heuristically scans your system for suspicious objects, so viruses canbe identified by their activities not by their digital signatures:

    In the case the did not find any malware but you suspect that your

    computer is infected, you still can use ; a great feature that scans

    your system for any viruses or suspicious objects and add them to a database ofyour own so that you can get rid of them even if they were not included in themain program database.

    Click button and the following screen appears:

    Since your custom malware database is empty now, you cannot start scanning of

    course, if you click button now, the following message will appear:

  • 8/3/2019 Rrt6 5 User Manual En

    21/28

    This message box tells you that your custom database is empty and asks you to

    press button to start filling it up with the malware signatures. Click

    button and the following screen appears:

    Notice the four buttons, namely:

    It allows you to check the file system.

    It allows you to check the running processes and services.

    It allows you to examine the startup programs that run automatically when youstart Windows.

    It allows you to generate a log file about your computer status.

    When you press button you see the following buttons:

    | | | | | | |

    | | |

  • 8/3/2019 Rrt6 5 User Manual En

    22/28

    The buttons above represent the critical locations and targets malware usuallyattack. Click on each button of the buttons above and the program will check ifthere are any suspicious objects in there. If any, it will be shown in the whitespace as shown in the following image:

    If you double-click on any item, the program will show its properties as shown inthe following image:

    If you click on it when you are using the DEMO version you will not be able toknow its properties and you'll see the following message:

  • 8/3/2019 Rrt6 5 User Manual En

    23/28

    The message box above tells you that you cannot view the path or the file name

    or its properties or add it to your custom database because you are using thedemo version. You have two options: Either you buy the full version, or uncheck

    check box to show all files as it appears in the following image:

    When you uncheck this box, you no longer use RRT and all files

    under the current location will be shown as follows:

    With OFF, you are on your own; you have to decide by yourself

    which of these files are malware and which are clean. Since this is too difficult fornormal users, the only real option available is to buy the full version of theprogram, which will decide on behalf of you and show you only the names of thesuspicious files and their full paths and gives you the ability to add them to yourcustom database and remove them from your system.

    Warning:

    When working with OFF, you should be very careful. Removing

    clean files will result in system instability, installed application corruption or even

    complete unrestored damage.

    After you decide which of the objects are malware either by yourself or by the

    help of , you can drag any file you see in the space and drop it into

    the small box on the top left labeled as shown in the following

    image:

  • 8/3/2019 Rrt6 5 User Manual En

    24/28

    By dragging and dropping it, the following message box appears:

    Answer if you want to add this file to your custom database and followingmessage appears:

    This means that you have dropped a single file and it will be removed from yoursystem and added to your custom database. Click , and the following message

    appears:

    This means that one file has been removed from your system and added to yourcustom database. From now on, you are immune to this virus; the program willdetect and remove this virus if it tried to infect your computer in the future.

    You can follow this method with all the files in the areas targeted by viruses as

    described previously under button.

    In case you want to check other folders, click button as shown in the

    following image:

  • 8/3/2019 Rrt6 5 User Manual En

    25/28

    When you press this button the following window appears:

    You can select any folder to be analyzed by RRT and then apply

    the same steps above.

    In addition to button, theres button. It lets

    you check the running processes in real time. RRT can determine

    which process is suspicious where you can add these processes to your custom

    database.

    Theres another button called . It lets you check the programs

    that start automatically when you start Windows. RRT can

    determine which are suspicious and show them in the white space where you canadd these items to your custom database.

    The last button is as you can see in the following image:

    By clicking this button, generates a report about the status of your entiresystem as shown in the following image:

  • 8/3/2019 Rrt6 5 User Manual En

    26/28

    This feature is very important, in the case you was unable to determine what youshould do, all you need to do is to send this log file via email [email protected] and I will analyze your log and determine whether yourcomputer is infected or not and give you the appropriate instructions and guideyou step by step to get rid of the viruses. This service is free for licensed usersonly.

    Uninstalling the software is very easy, just click button then clickbutton and follow the instructions on screen.

    1. A PC with Pentium 500 MHz and 128 MB RAM or above.2. Windows XP or Windows Vista or Windows 7.

    3. A user profile with administrator rights (Administrator).4. In Windows Vista you will need to turn off UAC as shown in the followingimage:

    mailto:[email protected]:[email protected]:[email protected]
  • 8/3/2019 Rrt6 5 User Manual En

    27/28

    5. In Windows 7 you will need to set the UAC to the lowest level (Never Notify) asshown in the following image:

    6. In general, since this product is security software that deals with file system,system registry and running processes, it MUST be given all the rights it demands

    in order for it to do its job. Some other security software will try to block thetoolkit and prevent it from doing its job; some other will mistakenly flag thesoftware itself as malware. Please make sure that it's not blocked by your firewalland there's no other program blocking it. Before running this toolkit, we

    recommend you to add it to the whitelist of other security solution you arerunning such as Antivirus, Firewall, monitoring tools...etc.

    1. By using , you acknowledge that you are solely responsible for anydamage inflicted on your computer as a result of inappropriate use of theprogram and do not bear Sergiwa Software any responsibility towards this. We

    strongly advise you to read this manual very carefully.

    2. The demo version of this software is for FREE for Personal use only. If you

    would like to use the demo version in a business environment or you want toenjoy the advanced features of it you are required to license it. Licensing is quick,and the pricing is flexible.

    3. Licensed users can upgrade to minor versions of the purchased software forfree. For example, when you buy version 6.0 you will have the right to upgrade toall minor updates of version 6.x for free, while the upgrade to version 7.0

    requires an upgrade fee.

    4. Sergiwa Antiviral Toolkit price paid once for lifetime, no annual fees required.Licensed users enjoy free technical support for one year (including answering

    questions and queries, resolving the program's issues if any, explaining themethods of using, analyzing the logsetc.), after the end of the year, the freetechnical support expires and a user must renew the support subscription.

    5. If you have the desire to become an authorized distributor for Sergiwa

    Software and get a commission on the distribution of up to 25% please contact [email protected]

    http://www.sergiwa.com/http://www.sergiwa.com/mailto:[email protected]:[email protected]:[email protected]:[email protected]://www.sergiwa.com/
  • 8/3/2019 Rrt6 5 User Manual En

    28/28

    1. If you have a credit card or PayPal account or you can use any other onlinepayment method, you can purchase the software by following this link:

    https://www.plimus.com/jsp/buynow.jsp?contractId=2012988

    2. If cannot use any online payment method, you can purchase via WesternUnion or MoneyGram. Send the payment to the following address:

    Name: Issam SergiwaCity: DernaCountry: Libya

    Once we receive your payment, we will immediately send you the license key.License key is a file named regkey.dat. All you have to do when you receive it is

    to do the following:

    1. Make a folder under C:\ and name it say RRTPE2. Transfer both "RRT.exe" and "regkey.dat" to that folder.

    3. Run the software and it will be activated.

    Please note that the software will run in FULL mode as long as you have thelicense file (regkey.dat) in the same folder where the executable file (RRT.exe) is.Once you delete the license file (regkey.dat) or move it to another folder thesoftware will get back to DEMO mode.

    End of Document.For v6.5.0.2

    Issam Sergiwa (SAT Author).CEO & Founder of Sergiwa SoftwareSergiwa.comJune 6, 2011

    https://www.plimus.com/jsp/buynow.jsp?contractId=2012988https://www.plimus.com/jsp/buynow.jsp?contractId=2012988http://www.sergiwa.com/http://www.sergiwa.com/http://www.sergiwa.com/https://www.plimus.com/jsp/buynow.jsp?contractId=2012988