Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.

After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.

It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.

The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.

The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.

To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.

If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.

If you need any other HijackThis help then read the previous link.

Kevin Souter is a full time computer repair technician. He also operates a

In The News:


pen paper and inkwell


cat break through


The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More