Solved

zestyfind.com

Posted on 2004-04-19
9
208 Views
Last Modified: 2011-09-20
i have a file that I can not get rid of that I believe is associated with Zestyfind.com

Adaware can locate it but it says it can not remove it because it is still running.  The file is called

aqtiveds.cpy.dll

I have also recently noticed that there is something on my toolbar called "bird dupe cast"  Is this part of the Zestyfind problem?
0
Comment
Question by:BigWilz
  • 5
  • 2
9 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 63 total points
ID: 10869127
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 62 total points
ID: 10874996
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html 
0
 
LVL 21

Expert Comment

by:jvuz
ID: 10875490
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 21

Expert Comment

by:jvuz
ID: 10875506
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10966109
Give us a feedback regarding your status on this question
0
 
LVL 21

Expert Comment

by:jvuz
ID: 10975068
Please come back and give us some feedback so we can help more if necesarry.

Jvz
0
 
LVL 21

Expert Comment

by:jvuz
ID: 11209685
Thanx,

Jvuz
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question