PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews

Beginners Guides
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....  
 
Contact the Suite 66 Advertising Agency
Seagate Backup Plus Slim External USB 3.0 2TB Hard Drive Review

A Quick Guide for Eliminating Spyware and Hijacker Software

A Quick Guide for Eliminating Spyware and Hijacker Software - PCSTATS
Abstract: An unprotected computer used by a novice runs the risk of being infected mere minutes after a broadband connection to the Internet is formed.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Aug 06 2004   Mike Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Methods of Elimination, continued...

If you are still having issues after all of this, try running Autoruns. This nifty little program brings up a display of all the locations in the registry and file system where programs can be set to start automatically on boot up. Look though here for anything suspicious.

Suspicious files can be anything you don't recognize. In this case, experimenting by unchecking items will do no harm to your system, since these are only automatic startup settings, not vital system files.

The next utility we look will most certainly harm vital system files if used incorrectly. Hijack this is a utility designed to counter browser-hijacking programs. It displays several areas of the file system and registry related to the behaviour of Internet Explorer.

It's intended for advanced users, and simply displays the contents of these locations and allows users to delete entries they do not think should be there. It makes no attempt to distinguish vital system files from entries placed by browser hijackers and malware. For this reason, the best way to use Hijack This is to save a log file of the scan results and post them onto one of many helpful forums along with a description of your problem.

To do this:Run Hijack This and click 'scan.'

Scan through the results for any obviously suspicious entries (consult this tutorial for help). Now use the 'save log' button to save the results to a text file. Visit one of the following sites and post your log by copy and pasting it into a new topic with a description of your problems. You should soon get some good information on what to delete. Please be patient and polite and read the rules before posting.

Spywareinfo.com
Cexx.org
Computercops
Net-Integration
Spyware Warrior

If you've followed the directions above, chances are your PC is now free of its spyware problems. Continue on for a guide to protecting your PC from futurer infestation.

< Previous Page © 2017 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >

 

Contents of Article: PCSTATS
 Pg 1.  A Quick Guide for Eliminating Spyware and Hijacker Software
 Pg 2.  Fixing a tough spyware problem
 Pg 3.  — Methods of Elimination, continued...
 Pg 4.  Preventing spyware and browser hijacking
 Pg 5.  Prevention: Scanning and Security

SEARCH PCSTATS 
Use the power of Google to search all of PCSTATS and the PCSTATS Forums. Tell us what you think of this new feature - FEEDBACK?
   09 / 20 / 2017 | 7:04AM
Hardware Sections 


google
 
PCSTATS Network Features Information About Us Contact
FrostyTech
TransmetaZone
BeginnersPC
PCSTATS Newsletter
PCSTATS Forums
ShoppingList Assistance
Tech Glossary
Technology WebSite Listings
PermaLink News
Archived News
Submit News (Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Employment
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2017 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.