Thankyou I will try that. I already have adaware running, but I did not try
it through safe mode.
What is wierd is this browser hijacker is an MSN search engine site. I use
pop up stopper all the time, and never allow it to be shut off. I abhore
clicking on any popup ads. Who knows how this virus snuck into my system.
Thanks for the help!
-Kerry

At 12:18 PM 9/28/04 -0400, you wrote:
> Download:
>       Adaware and Spybot (google for them, easiest way)
>       Install and just update the definitions, do not do a scan.
>       Turn off System Restore (it is evil and should be turned off anyway)
> Reboot in SAFE MODE without network
> Run Adaware first, then Spybot.
> Reboot again into SAFE MODE and run Adaware and then Spybot again.
>
> This has worked for EVERY pc that I run into on my network with ANY
>problems lately.
>
> Also, stop clicking on pop-ups.  Also-also, pay for your porn.  If you
>subscribe to porn, there are no pop ups and malware installed (or so I'm
>told)
>
> Another also, install SP2 immediately after if this is an XP box.
>
>
>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
>On Behalf Of Kerry Barlow
>Sent: Tuesday, September 28, 2004 12:08 PM
>To: [email protected]
>Subject: Re: Strong recommendation
>
>Thanks for the heads up! I still after a month have a browser hijacker virus
>on my home system. I just cant get rid of it :( I tried avg and fprot so far
>with no success.
>ugg these things are such a headache.
>-kerry
>
>At 10:53 PM 9/27/04 -0500, you wrote:
>>Make sure your virus definitions are up to date.
>>
>> 
>>
>>The first virus exploiting the Windows GDI+ JPEG flaw has officially 
>>been written.
>>
>> 
>>
>>I downloaded a ZIPed sample after updating my e-trust ez-antivirus 
>>definitions, and scanned the file.  Apparently, etrust is pretty quick; 
>>they already have definitions on-line that detect it.
>>
>> 
>>
>>Regards,
>>
>> 
>>
>>-- Eric Helfgott
>>
>><html xmlns:o="urn:schemas-microsoft-com:office:office"
>xmlns:w="urn:schemas-microsoft-com:office:word"
>xmlns="http://www.w3.org/TR/REC-html40";>
>>
>><head>
>><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"> 
>><meta name=Generator content="Microsoft Word 11 (filtered medium)"> 
>><style>
>><!--
>> /* Style Definitions */
>> p.MsoNormal, li.MsoNormal, div.MsoNormal
>>      {margin:0in;
>>      margin-bottom:.0001pt;
>>      font-size:12.0pt;
>>      font-family:"Times New Roman";}
>>a:link, span.MsoHyperlink
>>      {color:blue;
>>      text-decoration:underline;}
>>a:visited, span.MsoHyperlinkFollowed
>>      {color:purple;
>>      text-decoration:underline;}
>>span.EmailStyle17
>>      {mso-style-type:personal-compose;
>>      font-family:Arial;
>>      color:windowtext;}
>>@page Section1
>>      {size:8.5in 11.0in;
>>      margin:1.0in 1.25in 1.0in 1.25in;}
>>div.Section1
>>      {page:Section1;}
>>-->
>></style>
>>
>></head>
>>
>><body lang=EN-US link=blue vlink=purple>
>>
>><div class=Section1>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; font-family:Arial'>Make sure your virus 
>>definitions are up to
>date.<o:p></o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; 
>>font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; font-family:Arial'>The first virus exploiting 
>>the Windows GDI+ JPEG flaw has officially been 
>>written.<o:p></o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; 
>>font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; font-family:Arial'>I downloaded a ZIPed sample 
>>after updating my e-trust
>ez-antivirus
>>definitions, and scanned the file.&nbsp; Apparently, etrust is pretty
>quick; they
>>already have definitions on-line that detect 
>>it.<o:p></o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; 
>>font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; 
>>font-family:Arial'>Regards,<o:p></o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt; 
>>font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>
>>
>><p class=MsoNormal><font size=2 face=Arial><span 
>>style='font-size:10.0pt;
>>font-family:Arial'>-- Eric Helfgott<o:p></o:p></span></font></p>
>>
>></div>
>>
>></body>
>>
>></html>
>>
>
>
>
>Very respectfully, your obedient servant.
>Brig. Gen. Johnston Pettigrew
>
>[EMAIL PROTECTED]
>WWW server hosting Http://mntnweb.com
>Kerry Barlow
>p.o. box 21
>kirkwood ny
>13795
>607-775-1575
>
>
>
>This is the discussion list for the IMS Free email server software.
>  To unsubscribe send mailto:[EMAIL PROTECTED]
>
>            Delivered by Rockliffe MailSite
>           http://www.rockliffe.com/mailsite
>                Rock Solid Software (tm)
>
>This is the discussion list for the IMS Free email server software.
>  To unsubscribe send mailto:[EMAIL PROTECTED]
>
>            Delivered by Rockliffe MailSite
>           http://www.rockliffe.com/mailsite
>                Rock Solid Software (tm)
>
>



Very respectfully, your obedient servant.
Brig. Gen. Johnston Pettigrew

[EMAIL PROTECTED]
WWW server hosting Http://mntnweb.com
Kerry Barlow
p.o. box 21
kirkwood ny
13795
607-775-1575



This is the discussion list for the IMS Free email server software.
  To unsubscribe send mailto:[EMAIL PROTECTED]

            Delivered by Rockliffe MailSite
           http://www.rockliffe.com/mailsite
                Rock Solid Software (tm)

Reply via email to