Posted on 2006-04-04
Medium Priority
Last Modified: 2013-12-04

I have a process on my machine, IPSSVC.EXE, that seems to be quite the resource hog. It keeps the CPU at 25% all the time, and the machine gets hot after a while. I had been unfortunate in the past to get hit by a huge adware suite. I spent hours removing it all, but my PC has never quite been the same since (it's a new IBM Thinkpad laptop bought in December).

Anyway, I did a little research about this process. I see that it is "produced by LanCom and offers a VPN client for their services"

I never installed this process myself, nor do I have a need to VPN. Can someone help determine if this is another instance of adware or virus. If it's the latter, how do I remove it? I've tried multiple scan types for adware and virus scans - it all *seems* to be okay.
Question by:jameswalt
  • 2
LVL 51

Accepted Solution

Keith Alabaster earned 600 total points
ID: 16376332
Check in the network settings in the advanced section that you have not enabled the IP Sec security options.

Expert Comment

ID: 16385174
The best software I have found to remove spyware is CounterSpy. I run the Enterprise Ed. at work. This product will tell you if this is a problem or not. It reviews the registery and describes the services running. It is free to try and I think 20 bucks to buy. I would suggest buying the product. I have tested every spyware product out there and this is one of the best.
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16550299
Thanks :)

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month14 days, 7 hours left to enroll

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question