What is ist sidefind and ist surf accaracy?

Posted on 2006-05-22
Medium Priority
Last Modified: 2010-03-05
Hello there,

Wonder if somebody can tell me what is "ist sidefind" and "ist suft accaracy" a spyware remover found it but when I looked it up on Google I got all kinds of differnt answers some of it suggested they are good antispy software element and others say they are spyware themself - some light on the subject would be great.  I have spybot installed and is trying out webroot spy sweeper and the webroot found them.


Question by:lanivanvuuren
LVL 44

Expert Comment

by:zephyr_hex (Megan)
ID: 16738196
if you didn't install it as an antispyware program, you should remove it from your computer.  it is not a good practice to allow things to be installed on your computer that you didn't intentionally install.  this is a key indicator that something is spyware (it installs itself on your computer without you knowing it)

Expert Comment

ID: 16738266
Although I've never seen ist (and its various by-products such as IST Bar, IST sidefind) portrayed in a positive light, I believe it is spyware. It has all the characteristics of spyware/malware in the fact that it installs itself without the user's knowledge, is difficult to delete from your system, and can/will slow down your system considerably.

 As to the question of whether it is good or bad...consider this question: What kind of anti-spyware would install itself without your knowledge, and why would it cause your system to get pop-ups?" If anything, you should try and remove them from your system.
LVL 47

Accepted Solution

rpggamergirl earned 500 total points
ID: 16738347
Sidefind and Surf Accuracy are something you don't want to be in your system. They usually come installed by downloader trojan.
Sometimes removing Sidefind messes up your system,
Surf Accuracy also sometimes can be hard to remove because it injects itself to your AppInit_dll registry key so it is loaded very early before windows starts to hide itself or protect itself before we have access to the system.

If you want help in removing these just let us see a hijackthis log.

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question