Solved

spyware fix

Posted on 2004-04-01
5
257 Views
Last Modified: 2013-12-04
is there a general fix for removing spyware , in win xp, win 98/me, ?

or is  there a solution for the following symptoms:

while using a dsl connection, able to ping modem, able to ping dns servers, able to send/receive mail via mail clients, unable to surf the net, unable to access any of the system icons on the desktop,

thanks
0
Comment
Question by:donnavictor
  • 2
5 Comments
 
LVL 5

Accepted Solution

by:
visioneer earned 20 total points
ID: 10737423
To answer your first question, I prefer Spybot Search & Destroy for taking care of spyware.  http://www.safer-networking.org  (Thought I'd get that in there before someone posts the obligatory links to 30 other spyware products.)

The second issue could be a spyware or virus problem.  What happens when you try to access icons on your desktop?
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10738683
Follow this thread ...
http://www.experts-exchange.com/Security/Win_Security/Q_20935886.html

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10738690
Spybot:
http://security.kolla.de/index.php

Ad-aware Standard Edition is THE award winning, free*, multicomponent adware detection and removal utility:
http://www.lavasoft.de/software/adaware/

SpyFerret detects & removes spyware
http://www.onlinepcfix.com/spyware/spyware.htm

Bazooka Adware and Spyware Scanner v1.13.01
http://www.kephyr.com/spywarescanner/

Automatic check of your browser for parasites, adware and spyware
http://www.doxdesk.com/parasite/
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SID change in file permissions 3 136
Determining & validating if my SSL certificate is using SHA-2 cipher ? 15 116
Server 2008-R2 lost password 19 104
Compromised PC? 17 238
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question