Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

zestyfind.com

Posted on 2004-04-19
9
Medium Priority
?
236 Views
Last Modified: 2011-09-20
i have a file that I can not get rid of that I believe is associated with Zestyfind.com

Adaware can locate it but it says it can not remove it because it is still running.  The file is called

aqtiveds.cpy.dll

I have also recently noticed that there is something on my toolbar called "bird dupe cast"  Is this part of the Zestyfind problem?
0
Comment
Question by:BigWilz
  • 5
  • 2
7 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 252 total points
ID: 10869127
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 248 total points
ID: 10874996
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html 
0
Lessons on Wi-Fi & Recommendations on KRACK

Simplicity and security can be a difficult  balance for any business to tackle. Join us on December 6th for a look at your company's biggest security gap. We will also address the most recent attack, "KRACK" and provide recommendations on how to secure your Wi-Fi network today!

 
LVL 21

Expert Comment

by:jvuz
ID: 10875506
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10966109
Give us a feedback regarding your status on this question
0
 
LVL 21

Expert Comment

by:jvuz
ID: 10975068
Please come back and give us some feedback so we can help more if necesarry.

Jvz
0
 
LVL 21

Expert Comment

by:jvuz
ID: 11209685
Thanx,

Jvuz
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Integration Management Part 2
Is your OST file inaccessible, Need to transfer OST file from one computer to another? Want to convert OST file to PST? If the answer to any of the above question is yes, then look no further. With the help of Stellar OST to PST Converter, you can e…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question