How to Use a McAfee Stinger

Written by david gitonga
  • Share
  • Tweet
  • Share
  • Pin
  • Email
How to Use a McAfee Stinger
The McAfee Labs Stinger protects against a large number of malware types. (monitor with padlock image by patrimonio designs from

The McAfee Stinger is a stand-alone utility that assists administrators as well as users to detect and remove specific viruses on a system. Using scan engine technology, digitally signed DAT files, process scanning and performance optimisations, McAfee Labs Stinger is able to deal with infected systems by detecting a large number of Trojans, viruses and their variants. In addition to known threats, McAfee Stinger can target scareware or fake alert threats. Although not developed to be a substitute for a full antivirus program, this portable free utility is a powerful addition to your computer protection toolkit.

Skill level:

Other People Are Reading


  1. 1

    Download the McAfee Labs Stinger utility (see Resources).

  2. 2

    Select the location where you want to save the download when prompted. When the download is complete, navigate to the folder where the Stinger executable file has been saved and run it.

  3. 3

    Click on the "Add" or "Browse" button to include additional drives or directories that you want scanned in addition to the default C: drive.

  4. 4

    Click on "Scan Now" to begin the scanning process. Any infected files will be repaired automatically without user intervention. You can select "Preferences" and set the required sensitivity level. This feature uses the Artemis Technology.

  5. 5

    Use the command line interface to have more access to the McAfee Labs Stinger features. The parameters below can be used when running the Stinger on the command line:

    /ADL--Scan all local drives

    /LOG--Save scan logs

    /SILENT--Run Stinger without the graphical interface

Tips and warnings

  • It is advisable to disable the System Restore utility before running the Stinger application. This allows the utility to perform scans on backups that may have infected files. If the System Restore feature is not disabled, any backed up infected files will not be detected and may well reinfect the system after a system restore.
  • The Artemis Technology uses real-time up-to-date malware detection by detecting damage and data theft before even the signature update has been made available. Certain endpoint identifiers are used to determine malware characteristics of a program even when the program does not trigger existing signature files. Once the database server at McAfee Avert Labs receives the request, it takes the necessary action to avert further damage. Artemis will continue to function even when it cannot contact the McAfee Avert Labs Server. It will use the standard DAT files stored locally for detection and removal.

Don't Miss

  • All types
  • Articles
  • Slideshows
  • Videos
  • Most relevant
  • Most popular
  • Most recent

No articles available

No slideshows available

No videos available

By using the site, you consent to the use of cookies. For more information, please see our Cookie policy.