My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.
After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.
It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.
The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.
The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.
To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.
If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.
If you need any other HijackThis help then read the previous link.
Kevin Souter is a full time computer repair technician. He also operates a
![]() |
|
![]() |
|
![]() |
|
![]() |
Over the past few years as the internet has become... Read More
Having a good Spyware eliminator on your computer is vital... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Imagine this ? you open up your email box and... Read More
Did you know...? 1 in 5 children who use computer... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Well, this is an article I never thought I would... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The words Corporate Security may conjure up images of a... Read More
There has not been a time in the history of... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
If you use emails actively in your communication, you must... Read More
The top five online scams on the Internet hit nearly... Read More
While clicking from site to site on the internet you... Read More
First the basic definition of Spyware: It is a type... Read More
Have been an Internet user for more than 9 years,... Read More
Let us take the example of scrambling an egg. First,... Read More
When we think of adware, what comes to mind are... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
There is nothing more important that password security in world... Read More
You may not realize it, but as you are surfing... Read More
Huge number of spyware software applications are available in the... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
This is the second in a series of articles highlighting... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Whether we like it or not, we are all living... Read More
Have you ever had to call Symantec or McAfee to... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Computer infections can be broken up into 4 main categories... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Have you ever bought a product or service from the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
They're out there. Individuals trying to make a quick buck... Read More
At this point, if you've got the whole "turning the... Read More
So called phishers try to catch the information about the... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Do you really have to know how feeds work? Not... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
I am the victim of an internet scam. It is... Read More
There has not been a time in the history of... Read More
Only the top spyware removers are successful at detecting and... Read More
The top five online scams on the Internet hit nearly... Read More
A little bit of time invested into learning about internet... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Well, if that would have been said to me by... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
With the Internet entering our lives in such an explosive... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Some months ago, before there was much publicity regarding phishing... Read More
My first experience with a spyware BHO based infection was... Read More
Long gone are the days that we could feel secure... Read More
While clicking from site to site on the internet you... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Internet Security |