Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Kazaa removal

Posted on 2006-07-01
3
Medium Priority
?
368 Views
Last Modified: 2013-11-21
I am about to start removing Kazaa from a friends computer and I thought I would touch home base first. I have been hearing about DNS issues after removal and would like to make this as clean and quick as possible.


What is the best way to remove this application and all the garbage that comes with it? I was planning on starting with hijackthis and maybe ewido if needed.

Thanks--Eric
0
Comment
Question by:ehanner
3 Comments
 
LVL 97

Expert Comment

by:war1
ID: 17024153
Greetings, ehanner !

Here is step by step on removing Kaaza
http://answers.google.com/answers/threadview?id=159964

If you break your internet connection while removing spyware, run this script to fix your connection
http://downloads.subratam.org/WinsockFix.zip


Best wishes!
0
 
LVL 47

Accepted Solution

by:
rpggamergirl earned 500 total points
ID: 17026284
Use KazaaBegone,
plus be ready with LSPFix or WinsockFix incase you lose connection afterwards.
http://www.majorgeeks.com/download.php?det=3446
0
 

Author Comment

by:ehanner
ID: 17026744
Thanks rpgammergirl, I was looking for a tool to do the job.

0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question