Solved

How to prevent home page hijacking

Posted on 2004-04-20
2
1,320 Views
Last Modified: 2010-04-12
I have some PCs at work, and the users complain to me that after visiting certain sites, their IE homepage gets hijacked.  Even if I set the browser security settings to high, this still happens.  I tried to get rid of the problem using Spybot Search & Destroy and Adaware -didn't work.

The hijacker site is

http://best-search.cc/index.php?v=6&aff=3105571

Is there a registry setting I can change, or something I can do to prevent this from ever happening?
0
Comment
Question by:AsenathWaite
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 125 total points
ID: 10869043
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html 
0
 
LVL 32

Expert Comment

by:LucF
ID: 10869052
Hi AsenathWaite,

This is what you're looking for:
http://www.spywareinfo.com/~merijn/cwschronicles.html

To get rid of it:
http://www.spywareinfo.com/~merijn/files/CWShredder.exe

How do I prevent it from happening again?
http://www.spywareinfo.com/~merijn/cwschronicles.html#byteverify

Greetings,

LucF
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Lotus Notes has been used since a very long time as an e-mail client and is very popular because of it's unmatched security. In this article we are going to learn about  RRV Bucket corruption and understand various methods to Fix "RRV Bucket Corrupt…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question