
Spyware Nuker XT, the fourth generation of anti-spyware software produced by Trek Blue, represents hundreds of person hours of hard work by our development and quality assurance team to bring you the latest features and anti-spyware protection available.
Spyware Nuker XT includes a streamlined and easier-to-user interface. Commonly used scan options are now present on the first screen rather than buried in the Options dialog, the scan results are easier to manage, and an easy-to-read HTML scan report is available.

Active Protection
The most significant new feature of Spyware Nuker XT is Active Protection. This feature tracks execution of every program in the system at the kernel-level, the lowest level possible, and notifies you if a program being started is a potential threat. If a threat is detected, Spyware Nuker XT with Active Protection will pop up a message offering an option to prevent suspicious from running or to allow it to run. This is a critical method of protection and prevents your system from even becoming infected by spyware or adware.
SpyShield
The creators of malicious applications employ ever changing methods to infect computers and to thwart detection and removal. Spyware Nuker XT users can play an important role in staying one step ahead of a new adware and spyware by voluntarily participating in 'SpyShield'. Users that join SpyShield help identify new threats by submitting anonymous scan results. Review of this data directly results in improvements to the Spyware Nuker XT database signatures which in turn helps to better protect all of Spyware Nuker XT users.
Once you install Spyware Nuker XT the software will ask you if you want to join the SpyShield. The software performance will not suffer either way, but all of the Spyware Nuker XT users will benefit from every single SpyShield member.
Integrated support form
Included in Spyware Nuker XT is an integrated support form available from the Help menu. This streamlines submitting support requests, particularly for those users experiencing unresolved threats. Fill out the simple form, opt to submit a diagnostic log (default), and submit and one of our technical support agents should contact you quickly.