?
Solved

atomiclog spyware found on many computers

Posted on 2006-11-28
3
Medium Priority
?
184 Views
Last Modified: 2013-12-04
atomiclog was found on many computers on my network. What I am wondering is how did they get there and whats the worst possible case scenario?
0
Comment
Question by:gsco
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 30

Accepted Solution

by:
serialband earned 600 total points
ID: 18033231
How did it get there? Someone installed something that inclued it.  Do users have Administrative priveleges to install software?  If yes, then users downloaded and installed something that included it.  If no, then the sysadmin installed somethnig that included it, or your systems got wormed.

What's the worse case scenario?  Reinstall the OS.  Probably not necessary unless it's a system that contains confidential information and/or important data.

0
 

Author Comment

by:gsco
ID: 18040523
Well the only thing I know of that was downloaded onto many computers was the logmein.com client to remotely access certain machines across a wan.
0
 
LVL 47

Assisted Solution

by:rpggamergirl
rpggamergirl earned 400 total points
ID: 18041423
McAfee classified it as Adware, comes bundled when you installed other legit apps. It must've come with your logmein.com if that was the only apps you installed.
http://vil.nai.com/vil/content/v_131085.htm


AtomicLog removal tool:
http://www.spywareremove.com/removeAtomicLog.html

0

Featured Post

Want to be a Web Developer? Get Certified Today!

Enroll in the Certified Web Development Professional course package to learn HTML, Javascript, and PHP. Build a solid foundation to work toward your dream job!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Suggested Courses
Course of the Month9 days, 2 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question