Thankyou I will try that. I already have adaware running, but I did not try it through safe mode. What is wierd is this browser hijacker is an MSN search engine site. I use pop up stopper all the time, and never allow it to be shut off. I abhore clicking on any popup ads. Who knows how this virus snuck into my system. Thanks for the help! -Kerry
At 12:18 PM 9/28/04 -0400, you wrote: > Download: > Adaware and Spybot (google for them, easiest way) > Install and just update the definitions, do not do a scan. > Turn off System Restore (it is evil and should be turned off anyway) > Reboot in SAFE MODE without network > Run Adaware first, then Spybot. > Reboot again into SAFE MODE and run Adaware and then Spybot again. > > This has worked for EVERY pc that I run into on my network with ANY >problems lately. > > Also, stop clicking on pop-ups. Also-also, pay for your porn. If you >subscribe to porn, there are no pop ups and malware installed (or so I'm >told) > > Another also, install SP2 immediately after if this is an XP box. > > >-----Original Message----- >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] >On Behalf Of Kerry Barlow >Sent: Tuesday, September 28, 2004 12:08 PM >To: [email protected] >Subject: Re: Strong recommendation > >Thanks for the heads up! I still after a month have a browser hijacker virus >on my home system. I just cant get rid of it :( I tried avg and fprot so far >with no success. >ugg these things are such a headache. >-kerry > >At 10:53 PM 9/27/04 -0500, you wrote: >>Make sure your virus definitions are up to date. >> >> >> >>The first virus exploiting the Windows GDI+ JPEG flaw has officially >>been written. >> >> >> >>I downloaded a ZIPed sample after updating my e-trust ez-antivirus >>definitions, and scanned the file. Apparently, etrust is pretty quick; >>they already have definitions on-line that detect it. >> >> >> >>Regards, >> >> >> >>-- Eric Helfgott >> >><html xmlns:o="urn:schemas-microsoft-com:office:office" >xmlns:w="urn:schemas-microsoft-com:office:word" >xmlns="http://www.w3.org/TR/REC-html40"> >> >><head> >><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"> >><meta name=Generator content="Microsoft Word 11 (filtered medium)"> >><style> >><!-- >> /* Style Definitions */ >> p.MsoNormal, li.MsoNormal, div.MsoNormal >> {margin:0in; >> margin-bottom:.0001pt; >> font-size:12.0pt; >> font-family:"Times New Roman";} >>a:link, span.MsoHyperlink >> {color:blue; >> text-decoration:underline;} >>a:visited, span.MsoHyperlinkFollowed >> {color:purple; >> text-decoration:underline;} >>span.EmailStyle17 >> {mso-style-type:personal-compose; >> font-family:Arial; >> color:windowtext;} >>@page Section1 >> {size:8.5in 11.0in; >> margin:1.0in 1.25in 1.0in 1.25in;} >>div.Section1 >> {page:Section1;} >>--> >></style> >> >></head> >> >><body lang=EN-US link=blue vlink=purple> >> >><div class=Section1> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; font-family:Arial'>Make sure your virus >>definitions are up to >date.<o:p></o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'><o:p> </o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; font-family:Arial'>The first virus exploiting >>the Windows GDI+ JPEG flaw has officially been >>written.<o:p></o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'><o:p> </o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; font-family:Arial'>I downloaded a ZIPed sample >>after updating my e-trust >ez-antivirus >>definitions, and scanned the file. Apparently, etrust is pretty >quick; they >>already have definitions on-line that detect >>it.<o:p></o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'><o:p> </o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'>Regards,<o:p></o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'><o:p> </o:p></span></font></p> >> >><p class=MsoNormal><font size=2 face=Arial><span >>style='font-size:10.0pt; >>font-family:Arial'>-- Eric Helfgott<o:p></o:p></span></font></p> >> >></div> >> >></body> >> >></html> >> > > > >Very respectfully, your obedient servant. >Brig. Gen. Johnston Pettigrew > >[EMAIL PROTECTED] >WWW server hosting Http://mntnweb.com >Kerry Barlow >p.o. box 21 >kirkwood ny >13795 >607-775-1575 > > > >This is the discussion list for the IMS Free email server software. > To unsubscribe send mailto:[EMAIL PROTECTED] > > Delivered by Rockliffe MailSite > http://www.rockliffe.com/mailsite > Rock Solid Software (tm) > >This is the discussion list for the IMS Free email server software. > To unsubscribe send mailto:[EMAIL PROTECTED] > > Delivered by Rockliffe MailSite > http://www.rockliffe.com/mailsite > Rock Solid Software (tm) > > Very respectfully, your obedient servant. Brig. Gen. Johnston Pettigrew [EMAIL PROTECTED] WWW server hosting Http://mntnweb.com Kerry Barlow p.o. box 21 kirkwood ny 13795 607-775-1575 This is the discussion list for the IMS Free email server software. To unsubscribe send mailto:[EMAIL PROTECTED] Delivered by Rockliffe MailSite http://www.rockliffe.com/mailsite Rock Solid Software (tm)
