Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.

After extensive testing and no further symptoms I returned the computer to my client's home. I hooked it back up, and dialed the internet. Everything so far was progressing smoothly. But, as SOON as I loaded Internet Explorer: BAM the same pop-up advertisements and other annoying things started happening again. With much embarrassment I had to take the computer back to my office and try again.

It was all Internet Explorers fault. Microsoft Internet Explorer comes with a feature that is designed to add third-party functionality to their browser. It's actually a very good idea. Unfortunately, it now gets taken advantage of.

The producers of spyware know that many people now have spyware removers installed on their computers. They also know that quite a few people have the ability to check what is in their start-up. Because of this, BHO's are crafted so that the spyware lies dormant until Internet Explorer is opened. Then it can start its dirty work.

The best program to remove an errant Browser Help Object is HijackThis. This program was originally designed to remove homepage hijackers and gradually morphed into an all-around removal tool for everything. If there's any one tool that I couldn't part with it's HJT.

To start, download HijackThis 1991. Once you've got it, open it. Click the button that says "Do a system scan only". Following that, scroll down to the items labeled 02 ? BHO. Remove anything here that looks suspicious. Internet Explorer does not require any BHO's to run. Just keep an eye on the path that it loads from, and the name of the file. A legitimate one will be fairly easy to spot, as it'll have a legit title and OK looking path.

If the filename looks like it was randomly made, like ASGSRT32.DLL or whatnot then there's a good 90% chance that it's bad. Even if you do remove one that's good, you can always use the restore feature of HJT to bring it back.

If you need any other HijackThis help then read the previous link.

Kevin Souter is a full time computer repair technician. He also operates a

In The News:

A game changer in IT security  MIT Technology Review

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More