Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?

1. When you buy a computer, many vendors place icons to selected products and services on your desktop, such as links to high-speed Internet Service Providers (ISPs) or add-on services vendors think you may need.

2. As you install software on your Windows machine, icons may appear, either to start the application or link to the manufacturer's website. Installing just one program could add three or more icons to your desktop!

3. It's easy to accidentally drag a Favorite, bookmark, text file, or other icon to your desktop, creating an icon.

Normally, it's easy to delete Windows desktop icons. Just place your mouse pointer on the offending icon, then right-click it and choose "Delete", clicking "Yes" to confirm if prompted.

However, what if the rogue icons are for adult websites, unfamiliar search engines, or other websites you don't recall visiting? You may try removing these icons but get an error, or after removal they still reappear again and again and again!

If so, then more than likely spyware, adware, or other malware has infected your machine. It may have been through file trading software, an inadvertent "yes" click when a popup window asked you to install software, 'freeware' that included adware, or other means. To remove the rogue icons, you need to remove the malware creating these icons.

Removing spyware and adware can be a time-consuming process, fraught with potential disaster as it is possible to accidentally remove files that render your operating system unusable. However, the following software products can help with this process as long as you read the instructions carefully, make backups, and get expert advice if you're not completely sure about removing what they ask you to do:

* Ad-Aware: http://www.lavasoft.com/

* Microsoft Windows AntiSpyware: http://www.microsoft.com/athome/security/spyware/software/

* Pest Patrol: http://www.pestpatrol.com/

* Spybot Search and Destroy: http://safer-networking.org/

* Spy Sweeper: http://www.webroot.com/

So, how can you prevent these icons from appearing in the first place? Practice safe computing.

* Backup your machine. If it does get infected to the point of being unusable, at least you won't lose all your important files.

* Install security-related operating system updates so spyware and adware cannot enter your system through well-known exploits.

* Download or buy a virus scanner, and keep it updated! Virus scanners cannot detect all spyware, but it doesn't hurt to have one. Check online or visit your local computer software store.

* Purchase a hardware or software firewall, and keep it updated! Firewalls help protect your computer from common exploits that spyware or adware can use to infect your machine.

* Consider using a different web browser. Though it is not perfect, Mozilla Firefox is currently less susceptible to spyware than Internet Explorer, mainly because it lacks certain technology (such as ActiveX) that is often exploited by malware writers. Note that depending on your web use, certain websites may not work correctly with other web browsers.

By practicing safe computing and using spyware-removal software, you can help remove rogue desktop icons from your desktop and keep others from appearing.

Andrew Malek is the owner of the MalekTips computer and technology help site. Visit his anti-spyware page for more advice on removing adware, spyware, and other malware.

In The News:


pen paper and inkwell


cat break through


The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More