Need to go "BACK"!

Posted on 2006-04-20
Last Modified: 2013-12-28
I let a friend use my computer and now when I log onto the internet, I am getting pop up screens galore!  I have a pop up blocker, etc.  Aso, my Start Menu contains things I did not have origainally programmed AND things are missing.  Help me.  I would like to go back to the way the computer was set up, or at least to last week!  Help on cleaning up start menu...keep it simple, please.  I am "computer challenged"!
Thank you.  Need help quick.  Need to access internet for job search.
Question by:JamieHolland
    LVL 27

    Expert Comment

    You could try booting with a Win98 boot disk.
    Then at the A:\> prompt, type C:        Then press 'enter'.
    Type CD \windows\command     Press 'enter'     (note the space between D and \)
    Type scanreg /restore      Press 'enter'   (space between g and / )
    Select a previous working Registry(with 'started' written next to it) prior to letting the friend use your pc.    Then press enter.
    LVL 27

    Expert Comment

    If you don't have a bootup floppy, you can get one from here ->

    Alternatively, have you tried starting in Safe Mode, by rebooting the PC and rapidly tapping F8 key until the dos screen shows up?   Select safe mode.
    More detail ->
    "Troubleshooting Windows 98 Startup Problems":;EN-US;Q188867#XSLTH3121121123120121120120
    LVL 27

    Expert Comment

    If you can reach Safe Mode, at the C:\ prompt type:
    scanreg /restore    (space between g and / )
    Press enter, & select a date prior to the problem starting.  
    Now reboot.

    LVL 27

    Accepted Solution

    Assuming you can manage to restore successfully, advise that you try at least two of these three, free virus scanners, as no scanner can guarantee finding & fixing everything.

    You may also have parasites and could try checking for Adware.   Check for "New updates"and download them before scanning:

    Ad-Aware SE Personal v1.06,fid,7423,00.asp
    LVL 38

    Assisted Solution

    Hi, Jamie

    I like your blatantly honest self-appraisal : "computer challenged".  That allows us to get an idea of whether we are perhaps providing advice that might go over your head.

    I agree fully with Jonvee in that you should run a FULL virus scan of your hard drive first of all, and then run an AntiSpyware utility.

    AntiVirus programs generally will ONLY target KNOWN infections, and thereby allow you to quarantine the infected file(s) pending deletion.  You occasionally get problems where a Windows System file has been overwritten by an infected file, or has remained as the same system file but has been infected with a virus.  It's more common for virus-ridden files to be given a name that resemble a Windows System file, or to be given a name containing random letters and numbers.  In the event that a virus is hiding in a Windows System file, then you can have problems if the AntiVirus program deletes or quarantines that file.  We can cross that bridge IF you get to it, though.  Just make sure that you update the antivirus program BEFORE running it.

    The popups are more likely to be caused by Ad-ware or Spyware, but programs designed to get rid of these bring some risks if you don't know what you are looking at when they show the final report after the scan and wait for you to decide what to do.  It is VERY common for Anti Spyware applications like Adaware to report normal, good, and useful registry settings, files, and processes mixed in with the bad and nasty ones.

    That's the reason I'm explaining this in some detail, given that you say you are "computer challenged".

    I use Adaware and find it pretty easy to use once you configure it.  The good news is that, if you end up allowing it to fix (ie. delete) something that turns out to be needed, then it allows you to restore the file or setting again.

    Here's an excellent tutorial that runs you through installing, configuring, and running Adaware:
    Adaware also has a very good help file, so you can acquaint yourself with it before scanning your system.

    If you are in any doubt whether to remove something it shows in its results columns, then leave it meantime and click the "Show Logfile" button.  Right-Click in the Logfile window and choose "Select All", then Right-Click again and choose "Copy to Clipboard".  Paste into Notepad or Wordpad, and save the document.
    Edit it to whittle it down to only the "Critical" items found.  Ignore what it calls "MRU's".  These are just the entries left over in the registry for the "Most Recently Used" (or accessed) files that appear on the "File" menu of various programs.  You can delete all of them.

    We would be able to advise you further and help you decide what to do if you pasted the basic details of the items reported in the log as "New Critical Objects" and "Objects found so far" under each of the sections.  If pasting here, try to keep it short (unlike my comments :-).

    Remember, ALWAYS shut down and then restart the computer after getting rid of viruses or spyware/adware.

    As Jonvee stated above when referring to AntiVirus programs, it is better to run more than one utility because some may miss one that another will catch.  So, as far as Spyware goes, you should then download HiJack This! and run it:

    The links on this page may help you understand how Spyware, Viruses, etc work.
    There is a good tutorial for HiJack This here:

    Download the program TO ITS OWN FOLDER.  This is important, because it will create backup files in that folder when run.

    It will produce a log which you should either copy and paste into the field provided on this page
    or Save the logfile and use the upload button.
    Click the "Analyze" button on that web page, and it will provide a report below that of what it identifies as being "Nasty" or "Possibly Nasty".
    You will see a new link appear named "Analysis".  Right-Click on this and choose "Copy Shortcut".
    Paste that shortcut here so we can look at the saved results and advise you what to remove.
    The shortcut will be something like this:<unique numeric reference>.html

    PLEASE DON'T paste the actual logfile here, it is too long and takes ageas to read.

    The general rule is that you can tick the ones reported as "Nasty", and allow HiJack This to "Fix" them.
    Remember to reboot after this.

    One thing you CAN paste here is a "startup log" which you can generate using Hijack This as follows:
    Config > Miscellaneous Tools > "Generate Startup Log".

    Any questions, just ask.
    LVL 38

    Expert Comment

    In fact, here's an alternative way to produce a report of startup processes and running tasks.
    This is probably the first thing to address, because sometimes an AntiVirus or Anti-Spyware program won't be able to get rid of a file or setting if the rogue process is set to automatically run when Windows starts up.

    Use the Start Menu as follows:

    1. Start Menu > "Run" option > and type MSINFO32 > click "OK"
    2. In the LEFT pane, find "Software Environment"
    3. For each of the following sub-sections of "Software Environment", click on it and then use the "Edit" menu as follows:
             Edit > Select All > Edit Copy
    4. Paste each into NotePad and save by the name of the section in MSINFO32
    5. Copy and paste the details here ONLY if they are brief enough

    Software Environment\
                                     Running Tasks
                                     Startup Programs
                                     System Hooks

    Your list of startup programs will help you decide what you need and don't need (or want and don't want) to run automatically when Windows boots.

    You can disable them using MSCONFIG (Start Menu > Run > type MSCONFIG > click OK) and untick the boxes in the "Startup" tab.  It is necessary to click the "Apply" button, then the OK button, and reboot when prompted.

    It is advisable to LEAVE the following startups TICKED for now:
    System Tray, ScanRegistry, and and TaskMonitor for now.

    A helpful page to assist you in identifying common Startup items is:
    but we would probably be able to help you to figure out whether they are essential for your computer or not.

    Hope this helps.
    LVL 29

    Assisted Solution


    I would like to add to all the excellent comments above an extra tool that targets also other pests, Trojans, Dialers, Worms and Spyware

    a-squared Free

    Update after installing and do a full scan.

    Good luck,

    LVL 27

    Expert Comment

     > Need help quick <
    Have you been able to fix your problem using any of the comments above, or have other difficulties arisen ?    You may like to report back on progress.   Thank you.
    LVL 38

    Expert Comment

    Thank you LeeTutor and GranMod
    LVL 27

    Expert Comment

    Thank you.

    Featured Post

    Want to promote your upcoming event?

    Attending an event? Speaking at a conference? Or exhibiting at a tradeshow? Easily inform your contacts by using a promotional banner in your email signature. This will ensure your organization’s most important contacts are in the know.

    Join & Write a Comment

    Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
    A Bare Metal Image backup allows for the restore of an entire system to a similar or dissimilar hardware. They are highly useful for migrations and disaster recovery. Bare Metal Image backups support Full and Incremental backups. Differential backup…
    This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.
    The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now