cmdservice removal assistance badly needed...

Hello fadingcaptain :)

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt & save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "SAFE MODE" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with DrWeb-CureIt as follows:
  • Double-click on drweb-cureit.exe to start the program. An "Express Scan of your PC" notice will appear.
  • Under "Start the Express Scan Now", Click "OK" to start. This is a short scan that will scan the files currently running in memory and when something is found, click the Yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click Options > Change settings
  • Choose the "Scan tab" and UNcheck "Heuristic analysis"
  • Back at the main window, click "Custom Scan", then Select drives (a red dot will show which drives have been chosen).
  • Then click the "Start/Stop Scanning" button (green arrow on the right) and the scan will start.
  • When done, a message will be displayed at the bottom advising if any viruses were found.
  • Click "Yes to all" if it asks if you want to cure/move the file.
  • When the scan has finished, look if you can see the icon next to the files found. If so, click it, then click the next icon right below and select "Move incurable".
    (This will move it to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if it can't be cured)
  • Next, in the Dr.Web CureIt menu on top, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
 
CureIt log:

Proof.dll;C:\Documents and Settings\tsguest\Application Data\Microsoft;Trojan.Fakealert;Deleted.;
qrzol.exe.vir;C:\QooBox\Quarantine\C\Program Files\Common Files\qrzo;Trojan.DownLoader.11354;Deleted.;
qrzop.exe.vir;C:\QooBox\Quarantine\C\Program Files\Common Files\qrzo;Adware.TargetServer;Moved.;
qrzoc.dll.vir;C:\QooBox\Quarantine\C\Program Files\Common Files\qrzo\qrzod;Adware.TargetServer;Moved.;
UnInstall.exe.vir;C:\QooBox\Quarantine\C\Program Files\Insider;Trojan.Rond.origin;Incurable.Moved.;
kernInst.exe.vir;C:\QooBox\Quarantine\C\Program Files\Temporary;Trojan.Winpop.origin;Incurable.Moved.;
b103.exe.vir;C:\QooBox\Quarantine\C\WINDOWS;Trojan.Rond;Deleted.;
b116.exe.vir;C:\QooBox\Quarantine\C\WINDOWS;Trojan.MulDrop.9222;Deleted.;
fgdnvrsy.dll.vir;C:\QooBox\Quarantine\C\WINDOWS\system32;Trojan.Click.16975;Deleted.;
hph.dll.vir;C:\QooBox\Quarantine\C\WINDOWS\system32;Adware.ClickSpring.origin;Moved.;
ohlhdtfu.dll.vir;C:\QooBox\Quarantine\C\WINDOWS\system32;Trojan.Virtumod.260;Deleted.;
rrmglwvh.dll.vir;C:\QooBox\Quarantine\C\WINDOWS\system32;Trojan.Virtumod.260;Deleted.;
asappsrv.dll.vir;C:\QooBox\Quarantine\C\WINDOWS\T3duZXI;Trojan.Proxy.493;Deleted.;
smss.exe.vir;C:\QooBox\Quarantine\C\WINDOWS\WNSXS~1;Trojan.DownLoader.origin;Incurable.Moved.;
Process.exe;C:\SDFix\apps;Tool.Prockill;Moved.;
Dot1XCfg.exe;C:\SDFix\backups_old2;Trojan.Stars.184;Deleted.;
A0050580.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP797;Trojan.Popuper;Deleted.;
A0050582.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP797;Trojan.Popuper;Deleted.;
A0050583.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP797;Trojan.Fakealert;Deleted.;
A0052738.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP822;Trojan.DownLoader.45546;Deleted.;
A0052779.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP823;Trojan.DownLoader.45546;Deleted.;
A0054234.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824;Adware.Ttc;Moved.;
A0054237.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824;Adware.ClickSpring - read error;;
A0054241.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824;Trojan.DnsChange;Deleted.;
A0054244.exe\data002;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824\A0054244.exe;Trojan.DownLoader.origin;;
A0054244.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824;Archive contains infected objects;Moved.;
A0054258.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP824;Trojan.Virtumod.268;Deleted.;
A0054301.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;Adware.TargetServer;Moved.;
A0054302.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;BackDoor.Vomba;Deleted.;
A0054304.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;Trojan.DownLoader.45546;Deleted.;
A0054306.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;Trojan.Proxy.493;Deleted.;
A0054307.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;Trojan.Insider;Deleted.;
A0054308.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP825;Trojan.DownLoader.11355;Deleted.;
A0055102.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Rond;Deleted.;
A0055104.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.MulDrop.9222;Deleted.;
A0055109.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Adware.ClickSpring.origin;Moved.;
A0055110.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Click.16975;Deleted.;
A0055112.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Virtumod.260;Deleted.;
A0055115.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Rond.origin;Incurable.Moved.;
A0055118.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Winpop.origin;Incurable.Moved.;
A0055119.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.DownLoader.origin;Incurable.Moved.;
A0055121.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.DownLoader.11354;Deleted.;
A0055124.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Adware.TargetServer;Moved.;
A0055125.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Adware.TargetServer;Moved.;
A0055130.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Virtumod.268;Deleted.;
A0055132.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Virtumod.260;Deleted.;
A0055143.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP829;Trojan.Virtumod.260;Deleted.;
A0055283.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP831;Trojan.Stars.184;Deleted.;
A0056012.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP842;Trojan.Proxy.493;Deleted.;
A0056596.dll;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP846;Trojan.Fakealert;Deleted.;
A0056597.exe;C:\System Volume Information\_restore{C0DBE494-8501-40C0-AAC9-D8981BB43087}\RP846;Trojan.Stars.184;Deleted.;
ldC664.tmp;C:\WINDOWS\system32\1024;Trojan.Fakealert;Deleted.;
ldFF71.tmp;C:\WINDOWS\system32\1024;Trojan.Fakealert;Deleted.;
 
Hello fadingcaptain :)

Please post back with a new HijackThis log, and and update on how your computer is currently running.
 
HJT log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:26:42 AM, on 02/15/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Trend Micro\Client Server Security Agent\ntrtscan.exe
C:\Program Files\Trend Micro\Client Server Security Agent\tmlisten.exe
C:\WINDOWS\TEMP\IH57A6.EXE
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Trend Micro\Client Server Security Agent\pccntmon.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\palmOne\Hotsync.exe
C:\Program Files\Trillian\trillian.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\iTunes\iTunes.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceHelper.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\distnoted.exe
C:\Program Files\Sage Software\Peachtree\peachw.exe
C:\Program Files\Sage Software\Peachtree\W32MKDE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar4.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar4.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\Client Server Security Agent\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [UpdateManager] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: palmOne Registration.lnk = C:\Program Files\palmOne\register.exe
O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
O4 - Global Startup: HOTSYNCSHORTCUTNAME.lnk = C:\Program Files\palmOne\Hotsync.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {3BFFE033-BF43-11D5-A271-00A024A51325} (iNotes6 Class) - https://email1.uncg.edu/iNotes6W.cab
O16 - DPF: {A922B6AB-3B87-11D3-B3C2-0008C7DA6CB9} (InetDownload Class) - https://media.pineconeresearch.com/ActiveX/downloadcontrol.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = TSNetServer.local
O17 - HKLM\Software\..\Telephony: DomainName = TSNetServer.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = TSNetServer.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = TSNetServer.local
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Trend Micro Client/Server Security Agent RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\Client Server Security Agent\ntrtscan.exe
O23 - Service: Trend Micro Client/Server Security Agent Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\Client Server Security Agent\tmlisten.exe

--
End of file - 7907 bytes


My machine seems to be running great. I haven't had any popups, and there seems to be nothing out of the ordinary.
 
Hello fadingcaptain :)

Time for some housekeeping
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

    • CF_Cleanup.png

  • When shown the disclaimer, Select "2"

The above procedure will:
  • Delete the following:
    • ComboFix and its associated files and folders.
    • VundoFix backups, if present
    • The C:\Deckard folder, if present
    • The C:_OtMoveIt folder, if present
  • Reset the clock settings.
  • Hide file extensions, if required.
  • Hide System/Hidden files, if required.
  • Reset System Restore.

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  1. Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    5. Next press the Apply button and then the OK to exit the Internet Properties page.
  2. Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources
  3. Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
  4. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls
  5. Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
  6. Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware
  7. Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

here are some additional utilities that will enhance your safety
  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
  • Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
    Using Winpatrol to protect your computer from malicious software
 
Back
Top