My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.
After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.
It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.
The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.
The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.
To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.
If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.
If you need any other HijackThis help then read the previous link.
Kevin Souter is a full time computer repair technician. He also operates a
The menacing campaigns that drive the corporate spyware and adware... Read More
Many of us have run into an annoying and time-consuming... Read More
There you are busily typing away on your PC or... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Do you really have to know how feeds work? Not... Read More
In the past I've never really paid much attention to... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
When the Internet first came about, it was realized it... Read More
A new variation of the Nigerian Scam theme ... Read More
Paypal is a great site and is used by many... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Only the top spyware removers are successful at detecting and... Read More
As soon as almost all computer users already got used... Read More
It's late. You've been scouring the web for that perfect... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Long gone are the days that we could feel secure... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Ok, ok, I know you've seen them. All those pop... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
The Message Must Get Through The year is 300A.D.,... Read More
If you have used a Windows machine for a while,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
This is not some new fangled techno-speak, it is a... Read More
Spyware and adware are becoming major problems for online surfers... Read More
I am the victim of an internet scam. It is... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
A couple of days ago, I was searching for a... Read More
There are several basic concepts to keep in mind when... Read More
So you want to know who your kids are chatting... Read More
A couple of years back, I paid my dues the... Read More
History and BackgroundThe virus was one of the first ever... Read More
What is computer security? Computer security is the process of... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
In today's times spyware is a very serious issue and... Read More
I am the victim of an internet scam. It is... Read More
There are folks out there who use their powers for... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
You can detect spyware online using free spyware cleaners and... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Every day millions of people go online to find information,... Read More
When the Internet first came about, it was realized it... Read More
Identity Theft is one of the most serious problems facing... Read More
As the number of people using the Internet as an... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The Threat10 years ago you could probably have run no... Read More
If you have used a Windows machine for a while,... Read More
When it comes to a secure website and passwords it... Read More
Ok, you've got a computer, and you get online. You... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Many of us have run into an annoying and time-consuming... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
File sharing on p2p is soaring despite the music and... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
As soon as almost all computer users already got used... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Well, this is an article I never thought I would... Read More
It's late. You've been scouring the web for that perfect... Read More
Only the top spyware removers are successful at detecting and... Read More
In 1997, I decided after 15 years as a practicing... Read More
Internet Security |