Solved

Spybot S&D detected registry change (backward links, cached snapshot of page, similar pages)

Posted on 2004-08-10
2
889 Views
Last Modified: 2013-12-04
Yesterday and today I'm getting a whole bunch of calls about about a Spybot S&D popup saying:

Spybot - Search & Destroy has detected an important registry entry that has been changed.
Category: Browser menu extension
Change: Value deleted
Entry: Backward Links (also: Cached Snapshot of Page AND Similar Pages)

I try clicking Deny the first time around, but then that option goes away and the only button I can click on is Allow. (So I allowed it)

I'm pretty sure these values have to do with the Google Toolbar that I love so much, but I'm not sure if the changes are being caused by malware or not; if so, what can I do to fix it.

Thanks in advance,
Chuck
0
Comment
Question by:chuckrox
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
4ceReconSniper earned 125 total points
ID: 11769367
i also use spybot, if i am installing something i make sure that i am not physically connected to the net which means the cable unplugged, when spybot asks for changes i allow it because im not connected on anything, but prior the installation, perform a spybot scan and remove all problems. on your case, you have clicked deny after that the deny button is deactivated because it processes the deny click you did earlier
0
 
LVL 2

Author Comment

by:chuckrox
ID: 11821781

Thanks 4ceReconSniper, but can you tell me anything about the specific application that caused the registry changes. Is it spyware? Is it something I should be worried about? From what I can tell its something associated with the IE integrated google toolbar I use. Both Spybot S&D and Ad-aware scans didn't turn up anything unusual.

-Chuck
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question