Lsp fic

Posted on 2005-04-29
Last Modified: 2010-04-11
msw sock

What should I remove I know newdot is going what about the others?/

Is Sheharyaarsaahi and sunray still around?? Are you both OK?

Question by:123nitab

    Author Comment

    Sorry the title was lsp fix.
    LVL 10

    Expert Comment

    Are now not able to connect? Newdot will interfere with your connection.

    Author Comment

    It is my friends comp she could not connect at home but at my house (satilite wireless) it started up quickly. I did a hijack log and it found newdot.


    LVL 29

    Expert Comment


    In the known LSP fix tool, you just need to click Finish and reboot your PC.

    There is no need for user intervention.

    Try also this Winsock fix:

    Good luck,


    Author Comment

    Ok I tried finish reboot and the enties are still there.

    Allso spybot cannot delete something called xuron it has a german name in a win ini line.

    LVL 29

    Accepted Solution


    First of all, download NOW this Winsock fix (FREE):
    If you lose internet access after the cleanup, run this tool.

    After that, download the fully functional trial version of Spy Sweeper:
    Install, UPDATE and run.
    You may need to reboot and run again to clean all the nasties that cannot be deleted at once ('in use').

    Download Ad-Aware (FREE) from here:
    Install, UPDATE and run.
    You may need to reboot and run again to clean all the nasties that cannot be deleted at once ('in use').

    You can also install 'preventive' software that will help you control these nasties:

    SpywareBlaster (FREE):
    Prevents the installation of Active-X based spyware, malware, dialers, etc
    Currently protects you against 3500+ nasties.
    Advantage: no system resources used!!!
    Just download, install and UPDATE.

    All of them extremely useful but you must keep them UPDATED.

    Suggestion: Make sure you can see all files and folders and run Ad-aware and Spybot S&D in Safe Mode.


    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
    Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now