PCSTATS     
[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Browser Hijacking & How to Stop It
Beginners Guides: Browser Hijacking & How to Stop It - PCSTATS
If you though Pop-ups were annoying, just wait until your web browser is hijacked! In this guide, PCstats shows you how to regain control and kick out the hijackers, kung-fu style...
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS May 10 2004   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Use Anti-virus programs regularly

Many browser hijackers are also identified and stopped by anti-virus software packages. Running Norton Antivirus with 'auto-protect' enabled is a good idea as a security measure, and there are many other equivalent antivirus programs that can help.

Use antivirus 'auto protection'

Many AV programs come with a program that constantly scans information entering and leaving your computer for viruses and malware. Norton's 'auto-protect' is one example of this. While they can occasionally cause trouble with installing and running software, these programs are your friends when it comes to protecting your PC from browser hijackers and Trojan horse viruses contracted from websites. Make sure your antivirus package has an equivalent feature up and running.

Keep an anti-hijack 'toolkit' for emergencies

There are several free programs available which will help you recover your system in the event of a hijacked browser. Ad-aware and Spybot, which we covered above, are two of them. In addition, download and store Hijackthis and CWShredder (google search for these, the old URLs are no longer valid). Both of these programs can help you recover in the case of an emergency. We will detail their use in the second part of this article. A reputable Antivirus program like those provided by Norton, MacAfee or Panda is also essential, as many browser hijackers are considered to be 'Trojan horse' viruses and can be detected and removed by antivirus software.

Change your Internet Explorer security settings

IE contains some security features which can be used to ward off annoying malware like browser hijackers. Open Internet Explorer, go to the 'tools' menu and select 'Internet options.'

Now select the 'security' tab.

If you want the highest degree of protection against browser hijackers and other malicious online code, set your Internet zone to the 'high' security setting. This will ensure that IE does not run activeX instructions, the means by which most browser hijackers get access to your computer.

Note that this may also cause problems and missing content in some legitimate web pages.

To get around this, you can place trusted websites that you regularly visit into the 'trusted sites' Internet zone.

Site addresses that you enter here will be mostly unrestricted, allowing them to display their content properly.

Try an alternate browser

The best way to defend against many browser hijackers is to stop using Internet Explorer altogether. Since a majority of these programs are coded specifically for IE, switching browsers will render them harmless. Consider Mozilla as one alternative.

< Previous Page © 2023 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >

 

Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Browser Hijacking & How to Stop It
 Pg 2.  The worst case scenario
 Pg 3.  — Use Anti-virus programs regularly
 Pg 4.  Repairing a browser hijack
 Pg 5.  Antivirus Scan in safe mode
 Pg 6.  Manual system search; HOSTS file
 Pg 7.  Manually Checking the registry

 
Hardware Sections 


 
PCSTATS Network Features Information About Us Contact
FrostyTech
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.