?
Solved

!80 Search Assistant Alert

Posted on 2004-08-03
2
Medium Priority
?
4,812 Views
Last Modified: 2010-04-11
Popup Message

Title Bar "180 Search Assistent Alert"

Message:

   "System has detected that 180 Search Assistent has been removed... perhaps without your knowledge."

Options :
     o   Install  180Search Assistant ... requires Internet connectivity
     o   Leave uninstalled and clean up any ....
     o    Remind me later

                        [Continue]
Is this a valid app  or some  malware?

Bob

0
Comment
Question by:rvseitz
2 Comments
 
LVL 1

Accepted Solution

by:
potuncle earned 500 total points
ID: 11709741
It's Spyware. I suggest using Spybot and/or Ad-aware to rid yourself of such things.  Spybot (free) at: http://www.safer-networking.org/en/index.html. Ad-aware Standard edition (free): http://www.lavasoftusa.com/software/adaware/. Once it's gone, I suggest not using Internet Explorer since it is what lets stuff like that get installed. Check out the Firefox browser at mozilla.org.

Jason
0
 
LVL 1

Expert Comment

by:bantau
ID: 11920954
SPyware is really getting out of hand...These apps are 2 of the best out there but they aren't enough...You should probably go download CWShredder : http://www.softpedia.com/public/cat/10/17/10-17-150.shtml  ..
Also, go get the trial version of spysweeper at http://www.webroot.com/wb/downloads/index.php  ...I  personally use spysweeper and use the others as backup...You run all of those apps and it will clean MOST of what you have out...Good luck...
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

750 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question