My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.
After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.
It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.
The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.
The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.
To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.
If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.
If you need any other HijackThis help then read the previous link.
Kevin Souter is a full time computer repair technician. He also operates a
While clicking from site to site on the internet you... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
I am the victim of an internet scam. It is... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Spyware is software that runs on a personal computer without... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
There are folks out there who use their powers for... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Today the internet is a mine field of malicious code... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Security leaks can be a big problem for any site... Read More
You may not realize it, but as you are surfing... Read More
Over the past few years as the internet has become... Read More
Identity theft is one of the most common criminal acts... Read More
Pharming is one of the latest online scams and rapidly... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
This is the second in a series of articles highlighting... Read More
The trash folder in my main inbox hit 4000 today.... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Computer infections can be broken up into 4 main categories... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
It has been said that with the wealth of information,... Read More
As you know, this time the virus under the name... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Can you protect your computer from all possible viruses and... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
As soon as almost all computer users already got used... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Spyware is software or hardware installed on a computer without... Read More
When it comes to reporting Internet scams most of us... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Computer infections can be broken up into 4 main categories... Read More
If you run any type of Internet business, Adware and... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Threats we ordinary Web users face online leave us no... Read More
In 1997, I decided after 15 years as a practicing... Read More
The Message Must Get Through The year is 300A.D.,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
There is no doubt that "how-to articles" have become a... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
This is not some new fangled techno-speak, it is a... Read More
Phishing is a relatively new form of online fraud that... Read More
You can detect spyware online using free spyware cleaners and... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Before we start, I want to make it clear that... Read More
In today's times spyware is a very serious issue and... Read More
Security leaks can be a big problem for any site... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Many of us have run into an annoying and time-consuming... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Have you ever got an email asking you to confirm... Read More
Long gone are the days that we could feel secure... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Internet Security |