If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?
1. When you buy a computer, many vendors place icons to selected products and services on your desktop, such as links to high-speed Internet Service Providers (ISPs) or add-on services vendors think you may need.
2. As you install software on your Windows machine, icons may appear, either to start the application or link to the manufacturer's website. Installing just one program could add three or more icons to your desktop!
3. It's easy to accidentally drag a Favorite, bookmark, text file, or other icon to your desktop, creating an icon.
Normally, it's easy to delete Windows desktop icons. Just place your mouse pointer on the offending icon, then right-click it and choose "Delete", clicking "Yes" to confirm if prompted.
However, what if the rogue icons are for adult websites, unfamiliar search engines, or other websites you don't recall visiting? You may try removing these icons but get an error, or after removal they still reappear again and again and again!
If so, then more than likely spyware, adware, or other malware has infected your machine. It may have been through file trading software, an inadvertent "yes" click when a popup window asked you to install software, 'freeware' that included adware, or other means. To remove the rogue icons, you need to remove the malware creating these icons.
Removing spyware and adware can be a time-consuming process, fraught with potential disaster as it is possible to accidentally remove files that render your operating system unusable. However, the following software products can help with this process as long as you read the instructions carefully, make backups, and get expert advice if you're not completely sure about removing what they ask you to do:
* Ad-Aware: http://www.lavasoft.com/
* Microsoft Windows AntiSpyware: http://www.microsoft.com/athome/security/spyware/software/
* Pest Patrol: http://www.pestpatrol.com/
* Spybot Search and Destroy: http://safer-networking.org/
* Spy Sweeper: http://www.webroot.com/
So, how can you prevent these icons from appearing in the first place? Practice safe computing.
* Backup your machine. If it does get infected to the point of being unusable, at least you won't lose all your important files.
* Install security-related operating system updates so spyware and adware cannot enter your system through well-known exploits.
* Download or buy a virus scanner, and keep it updated! Virus scanners cannot detect all spyware, but it doesn't hurt to have one. Check online or visit your local computer software store.
* Purchase a hardware or software firewall, and keep it updated! Firewalls help protect your computer from common exploits that spyware or adware can use to infect your machine.
* Consider using a different web browser. Though it is not perfect, Mozilla Firefox is currently less susceptible to spyware than Internet Explorer, mainly because it lacks certain technology (such as ActiveX) that is often exploited by malware writers. Note that depending on your web use, certain websites may not work correctly with other web browsers.
By practicing safe computing and using spyware-removal software, you can help remove rogue desktop icons from your desktop and keep others from appearing.
Andrew Malek is the owner of the MalekTips computer and technology help site. Visit his anti-spyware page for more advice on removing adware, spyware, and other malware.
In the past I've never really paid much attention to... Read More
Every day millions of people go online to find information,... Read More
If you are wondering how to fight spyware for safe... Read More
The money being spent online is steadily growing. With billions... Read More
So you want to know who your kids are chatting... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
These six ways to prevent identity theft offer you valuable... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Sooner or later everyone with an email account will receive... Read More
Nowadays more and more people are using a computer. A... Read More
If you run any type of Internet business, Adware and... Read More
When surfing the Internet you probably take your anonymity for... Read More
First the basic definition of Spyware: It is a type... Read More
Watching how the traditional media covers the latest virus or... Read More
To blog or not to blog? Well, why not? Lots... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
A little bit of time invested into learning about internet... Read More
During the release of a new software product specialized to... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
The Message Must Get Through The year is 300A.D.,... Read More
While clicking from site to site on the internet you... Read More
Paypal is a great site and is used by many... Read More
You'd better learn news from media, not from emails, security... Read More
Well, this is an article I never thought I would... Read More
Let us take the example of scrambling an egg. First,... Read More
Spyware is the most troublesome software to appear on the... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
As you know, this time the virus under the name... Read More
Today,on most internet user's computers, we have the ability to... Read More
When we think of adware, what comes to mind are... Read More
So called phishers try to catch the information about the... Read More
The first thing people think about when defending their computers... Read More
Many of us have run into an annoying and time-consuming... Read More
First the basic definition of Spyware: It is a type... Read More
What is computer security? Computer security is the process of... Read More
Imagine my surprise when I received a phone call from... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
When surfing the Internet you probably take your anonymity for... Read More
A few nights ago I received an email from "2CO"... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Every now and then you can read about a new... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
I got a virus the other day, Thursday I believe... Read More
Let us take the example of scrambling an egg. First,... Read More
Imagine this ? you open up your email box and... Read More
Ok, ok, I know you've seen them. All those pop... Read More
At this point, if you've got the whole "turning the... Read More
First, let's do a little recap'. As I stated in... Read More
Long gone are the days that we could feel secure... Read More
Identity theft is one of the most common criminal acts... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
You've seen it in the news - 40 million credit... Read More
Working from home has its advantages, including no commute, a... Read More
Well, if that would have been said to me by... Read More
During the release of a new software product specialized to... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Over the past few years as the internet has become... Read More
Over £5 billion pounds was spent on online shopping in... Read More
A friend called me one day and asked if I... Read More
Be careful of sites that promise to send you "instant... Read More
Internet Security |