Security
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
access-list acl_out deny ip 208.178.50.0 255.255.255.0 any
Or block all Active-X at the firewall..






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
There's also a dll in %system% which you might also want to replace with a folder with the same name of the original Gator file.
This is something I had to do to get rid of Gator Software which works for me. Deny all access to the from the firewall but also try and run this batch in the logon scripts. This works for a number of programs that use the same installer as gator ie Yahoo.
@ECHO OFF
C:
CD\
CD Program Files
REM Detects if Gator Companion software is installed and if so uninstalls it. (Precision Time)
IF EXIST PrecisionTime (
CD PrecisionTime
) ELSE (
GOTO END:
)
IF EXIST INSTALL.LOG (
UNWISE.EXE /S INSTALL.LOG
) ELSE (
GOTO :END
)
:END
REM Detects if Gator Companion software is installed and if so uninstalls it. (Date Manager)
C:
CD\
CD PROGRAM FILES
IF EXIST "Date Manager" (
CD "Date Manager"
) ELSE (
GOTO END2:
)
IF EXIST INSTALL.LOG (
UNWISE.EXE /S INSTALL.LOG
) ELSE (
GOTO :END2
)
:END2

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.