Solved

What is "Scour" and how do I prevent it from comming up

Posted on 2012-04-03
4
859 Views
Last Modified: 2013-12-06
Whenever try to do a search in Bing a page with "Scour" pop up with the results. It might have being fine if the URL match the name on the page but the URL uses an IP address. I was wondering if anyone could tell me if this is something I should be worried about and offer a way to fix my browser so that I get responses from the site that I request information from.
0
Comment
Question by:ruffone
  • 2
4 Comments
 
LVL 5

Assisted Solution

by:9660kel
9660kel earned 500 total points
ID: 37806788
0
 
LVL 15

Expert Comment

by:Russell_Venable
ID: 37809318
9660kel, Is dead on. If your still having trouble with this. Post and we will see what it is. TDL3 Rootkit used this redirection URL for a while.
0
 
LVL 4

Accepted Solution

by:
ruffone earned 0 total points
ID: 37867673
When I say the age of the program in the link I checking my AVG 2012 virus scanner and saw that a regular schedule scan was never set up. So my system had not being scanned since AVG 2012 was installed. I thought this was something AVG 2012 had missed.. So a kicked off AVG 2012 and it took care of the problem. Come to think of it I still didn't schedule regular scans
0
 
LVL 4

Author Closing Comment

by:ruffone
ID: 37885339
Thanks much
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Nessus scan 5 196
McAfee Client Proxy Removal 15 44
Zepto Ransomware - Decrypt/Restore files 5 226
Yet another Ransome ware 13 147
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now