Solved

IE "Hijacked" by JetSeeker

Posted on 2003-12-11
6
339 Views
Last Modified: 2013-12-04
When I use IE, after a while I see a page over all the screen shwoing various search ioptions, and with the writing "Powered by Jetseeker" at the bottom.
How can I get rid of it?

I am running Windows-XP.
Thanks!
0
Comment
Question by:avibn
6 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 125 total points
ID: 9920913
Check for adware and sypware

spybot here
http://spybot.safer-networking.de/
Download
http://spybot.safer-networking.de/index.php?lang=en&page=download

AdAware
http://www.lavasoftusa.com/

Spycop:
http://www.spycop.com/

This little didy will get rid of some of the more well known Home page Hijackers.
CoolWebShredder
http://www.spychecker.com/program/cwshredder.html 

Hijack This and BHODemon and Browser Hijack Blaster

Hijack This http://www.spywareinfo.com/~merijn/files/hijackthis.zip | Written by a member of our support forums and based on our Hijacked! article, this program scans the locations in your computer system that may be modified by browser hijackers and fixes any problems found. An easy-to-understand tutorial is available at TomCoyote.org.

http://www.spywareinfo.com/downloads.php?cat=sp#det
BHODemon http://www.spywareinfo.com/downloads/bhod/ | Think of BHODemon as a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. This program is my choice for BHO detection and is highly recommended.

Browser Hijack Blaster http://www.wilderssecurity.net/bhblaster.html | Running silently in the background, Browser Hijack Blaster only springs into action when an attempt is made. It watches and protects the following items: IE Homepage, IE Default Page, IE Search Page, BHOs. Whenver one of the above items is changed, or a BHO is added, you are immediately provided with information on the item, along with the option to keep the change, or revert to your previous settings.

General and overall information about Spy/Adware
http://www.cexx.org/adware.htm
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9920980
Dear avibn,

Use the HIjackthis software given in CO's comment and post us the log file . We would be able to assist you better

Thanks,
Sunray
0
 
LVL 10

Assisted Solution

by:LRI41
LRI41 earned 125 total points
ID: 9921061
Powered by Jetseeker

http://forums.spywareinfo.com/index.php?s=c220d31206798116994f636e654e04eb&showtopic=11315

CWS is a trojan that hijacks Internet Explorer start and search settings to one of several different web sites (see below).
Removal Instructions

Merijn, author of HijackThis and StartupList, has created CWShredder specifically to remove this parasite. Please make certain that all browser and folder windows are closed before using CWShredder. If any symptom of the problem remains afterward, then follow these directions below.

http://www.spywareinfo.com/articles/cws/
0
 
LVL 1

Expert Comment

by:charade-you-are
ID: 9953322
the gpo overrides what in ie

start run - gpedit.msc
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now