My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.
After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.
It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.
The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.
The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.
To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.
If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.
If you need any other HijackThis help then read the previous link.
Kevin Souter is a full time computer repair technician. He also operates a
![]() |
|
![]() |
|
![]() |
|
![]() |
It's been with us since 1993, it's gotten more intrusive,... Read More
Every single time you access a website, you leave tracks.... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
If you use emails actively in your communication, you must... Read More
Spyware is software that runs on a personal computer without... Read More
If you run any type of Internet business, Adware and... Read More
Whether we like it or not, we are all living... Read More
If you are a parent, you have probably wondered at... Read More
Much has been said on the theory of password protection... Read More
First of all we need to get some terms stated.... Read More
The Internet is a vast International Network of people and... Read More
P C. owners are constantly at risk from attacks by... Read More
If spyware were a person and he set himself up... Read More
Viruses are, however, not the only malicious software programs out... Read More
Imagine this ? you open up your email box and... Read More
If you are a parent, as am I, I think... Read More
You can detect spyware online using free spyware cleaners and... Read More
They're out there. Individuals trying to make a quick buck... Read More
If you are wondering how to fight spyware for safe... Read More
Every now and then you can read about a new... Read More
I got a virus the other day, Thursday I believe... Read More
So you want to know who your kids are chatting... Read More
When we think of adware, what comes to mind are... Read More
The money being spent online is steadily growing. With billions... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Well, this is an article I never thought I would... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
If you have used a Windows machine for a while,... Read More
Before you enter your name, address or any other data... Read More
It's late. You've been scouring the web for that perfect... Read More
The trash folder in my main inbox hit 4000 today.... Read More
In the past I've never really paid much attention to... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
With the Internet entering our lives in such an explosive... Read More
The average computer is packed with hidden software that can... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
The Internet is a vast International Network of people and... Read More
Did you know...? 1 in 5 children who use computer... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Much has been said on the theory of password protection... Read More
Sooner or later everyone with an email account will receive... Read More
Credit card fraud is a growing problem for online businesses... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Let us take the example of scrambling an egg. First,... Read More
Many of us have run into an annoying and time-consuming... Read More
Every now and then you can read about a new... Read More
History and BackgroundThe virus was one of the first ever... Read More
First of all we need to get some terms stated.... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Ebay is a great site and is used by many... Read More
Over £5 billion pounds was spent on online shopping in... Read More
You'd better learn news from media, not from emails, security... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Working from home has its advantages, including no commute, a... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Internet Security |