?
Solved

zestyfind.com

Posted on 2004-04-19
9
Medium Priority
?
231 Views
Last Modified: 2011-09-20
i have a file that I can not get rid of that I believe is associated with Zestyfind.com

Adaware can locate it but it says it can not remove it because it is still running.  The file is called

aqtiveds.cpy.dll

I have also recently noticed that there is something on my toolbar called "bird dupe cast"  Is this part of the Zestyfind problem?
0
Comment
Question by:BigWilz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
9 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 252 total points
ID: 10869127
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 248 total points
ID: 10874996
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html 
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

 
LVL 21

Expert Comment

by:jvuz
ID: 10875506
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10966109
Give us a feedback regarding your status on this question
0
 
LVL 21

Expert Comment

by:jvuz
ID: 10975068
Please come back and give us some feedback so we can help more if necesarry.

Jvz
0
 
LVL 21

Expert Comment

by:jvuz
ID: 11209685
Thanx,

Jvuz
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Read about achieving the basic levels of HRIS security in the workplace.
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question