Solved

What is "Scour" and how do I prevent it from comming up

Posted on 2012-04-03
4
861 Views
Last Modified: 2013-12-06
Whenever try to do a search in Bing a page with "Scour" pop up with the results. It might have being fine if the URL match the name on the page but the URL uses an IP address. I was wondering if anyone could tell me if this is something I should be worried about and offer a way to fix my browser so that I get responses from the site that I request information from.
0
Comment
Question by:ruffone
  • 2
4 Comments
 
LVL 5

Assisted Solution

by:9660kel
9660kel earned 500 total points
ID: 37806788
0
 
LVL 15

Expert Comment

by:Russell_Venable
ID: 37809318
9660kel, Is dead on. If your still having trouble with this. Post and we will see what it is. TDL3 Rootkit used this redirection URL for a while.
0
 
LVL 4

Accepted Solution

by:
ruffone earned 0 total points
ID: 37867673
When I say the age of the program in the link I checking my AVG 2012 virus scanner and saw that a regular schedule scan was never set up. So my system had not being scanned since AVG 2012 was installed. I thought this was something AVG 2012 had missed.. So a kicked off AVG 2012 and it took care of the problem. Come to think of it I still didn't schedule regular scans
0
 
LVL 4

Author Closing Comment

by:ruffone
ID: 37885339
Thanks much
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Has this user really been infected by Ransomware? 3 130
ACAS / Nessus 2 105
Regedit Register where from, why everyday need to clean them  ? 13 74
Mobile penetration testing 2 105
This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now