Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


How do you remove XP Anti-Spyware

Posted on 2011-05-13
Medium Priority
Last Modified: 2012-05-11
Have it on a PC
Question by:kerrywilson
  • 2
  • 2

Accepted Solution

mrah earned 1000 total points
ID: 35755142
You can try referencing this link...about a quarter way down the page is a general guide for dealing with this sort of stuff.  This info has helped me (as well as a bunch of other people) in the past, so hopefully you'll find the information useful.  Let me know and good luck.
LVL 13

Assisted Solution

jonahzona earned 1000 total points
ID: 35755149

Follow these directions. Take your time. You can do it!
LVL 38

Expert Comment

ID: 35755378
Just as a concurrence (no points), I have used the instructions provided by "jonahzona" here: http:#a35755149 several times and know that they work.

The author of those instructions (Grinler) is one of the best in the anti-malware business.

The instruction in the first post will not work because they do not address the registry problems - before starting the scans.

LVL 13

Expert Comment

ID: 35755768
While combofix is a useful tool, it should be done with extreme caution.

Hence their warning.

ComboFix is extremely powerful , You should not run ComboFix.exe unless you are asked to by a trained helper .

While I don't disagree with cbowman92, and have used combofix many times, just be careful with it.
LVL 38

Expert Comment

ID: 35755894
"RKill" is one of the steps listed in the second Expert suggestion - not the first one.

I don't understand why you selected the first suggestion as a "Solution".

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The intent of this Article is to provide the basic First Aid steps for working through most malware infections. The target audience includes experienced IT professionals and the casual user who just wants to make the infection go away. **********…
Sub-Titled: “My Way” (with apologies to Francis Albert Sinatra) Let me start by stating emphatically that I am one of those Experts who prefer doing things “My Way”. It’s kind of a no-brainer. “The following procedure works for me, so here is …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other. As you build tables in Microsoft Ac…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question