spy-ad ware

T

thomas

I keep getting these pop-up adds from smily central and
cursor mania stuff thats on the toolbar. How do I get rid
of these and what is the best spy-ware and pop-up anti
software? Any info would be appreciated. Thanks
 
J

Jim Macklin

see http://www.aumha.org/index.htm and on that page you'll
find links to what you need, such as,
http://www.aumha.org/secure.htm


--
The people think the Constitution protects their rights;
But government sees it as an obstacle to be overcome.



message |I keep getting these pop-up adds from smily central and
| cursor mania stuff thats on the toolbar. How do I get rid
| of these and what is the best spy-ware and pop-up anti
| software? Any info would be appreciated. Thanks
 
B

Blane

Thank you for your post.

It sounds like you are infected with either some adware, spyware or a
virus. Many of these types of programs will go in and redirect your
homepage for Internet Explorer (IE) and cause these toolbar changes. .

My first recommendation would be to ensure your anti-virus software is up
to date and to perform a full system scan of your computer.

My second recommendation be to download software to remove spyware. Some
of these include SpyBot Search and Destroy
(http://www.safer-networking.org/en/index.html) or Adaware
(http://www.noadware.net/?hop=wintech). Install these, ensure they are
updated with the latest spyware/adware definitions and scan your system.
Follow their recommendations for removing certain items they find.

Next, if you are able to access the WWW after cleaning the system, ensure
that you are up to date with all Microsoft security updates. This can be
done through the Windows Update feature, by opening IE, going to Tools ->
Windows Updates. Make sure that you enable pop-ups on this page if you
have a pop-up blocker.

Also, updating to XP Service Pack 2 provides built in pop-up blocking to
the operating system and many other updated security features to protect
against internet viruses and worms.

Best regards,
Blane Clark


This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.
(C) 2003 Microsoft Corporation. All rights reserved
 
D

David H. Lipman

1) Download the following three items...

Trend Sysclean Package
http://www.trendmicro.com/download/dcs.asp

Latest Trend signature files.
http://www.trendmicro.com/download/pattern.asp

Adaware SE (personal free version)
http://www.lavasoftusa.com/

Create a directory.
On drive "C:\"
(e.g., "c:\New Folder")
or the desktop
(e.g., "C:\Documents and Settings\lipman\Desktop\New Folder")

Download sysclean.com and place it in that directory.
Dowload the signature files (pattern files) by obtaining the ZIP file.
For example; lpt194.zip

Extract the contents of the ZIP file and place the contents in the same directory as
sysclean.com.

2) Update Adware with the latest definitions.
3) If you are using WinME or WinXP, disable System Restore
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm
4) Reboot your PC into Safe Mode
5) Using both the Trend Sysclean utility and Adaware, perform a Full Scan of your
platform and clean/delete any infectors/parasites found.
6) Restart your PC and perform a "final" Full Scan of your platform using both the
Trend Sysclean utility and Adaware
7) If you are using WinME or WinXP,Re-enable System Restore and re-apply any
System Restore preferences, (e.g. HD space to use suggested 400 ~ 600MB),
8) Reboot your PC.
9) If you are using WinME or WinXP, create a new Restore point
10) Please report back your results

Dave






| I keep getting these pop-up adds from smily central and
| cursor mania stuff thats on the toolbar. How do I get rid
| of these and what is the best spy-ware and pop-up anti
| software? Any info would be appreciated. Thanks
 
B

billium

thomas said:
I keep getting these pop-up adds from smily central and
cursor mania stuff thats on the toolbar. How do I get rid
of these and what is the best spy-ware and pop-up anti
software? Any info would be appreciated. Thanks

Once you've got rid of it try firefox http://www.mozilla.org/ instead of
Internet Explorer .. you'll be much safer.

Billy
 
D

David H. Lipman

Really ?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Technical Cyber Security Alert TA04-261A
Multiple vulnerabilities in Mozilla products

Original release date: September 17, 2004
Last revised: --
Source: US-CERT

Systems Affected

Mozilla software, including the following:

* Mozilla web browser, email and newsgroup client
* Firefox web browser
* Thunderbird email client

Overview

Several vulnerabilities exist in the Mozilla web browser and derived
products, the most serious of which could allow a remote attacker to
execute arbitrary code on an affected system.

I. Description

Several vulnerabilities have been reported in the Mozilla web browser
and derived products. More detailed information is available in the
individual vulnerability notes:

VU#414240 - Mozilla Mail vulnerable to buffer overflow via
writeGroup() function in nsVCardObj.cpp

Mozilla Mail contains a stack overflow vulnerability in the display
routines for VCards. By sending an email message with a crafted VCard,
a remote attacker may be able to execute arbitrary code on the
victim's machine with the privileges of the current user. This can be
exploited in the preview mode as well.

VU#847200 - Mozilla contains integer overflows in bitmap image decoder

A vulnerability in the way Mozilla and its derived programs handle
certain bitmap images could allow a remote attacker to execute
arbitrary code on a vulnerable system.

VU#808216 - Mozilla contains heap overflow in UTF8 conversion of
hostname portion of URLs

A vulnerability in the way Mozilla and its derived programs handle
certain malformed URLs could allow a remote attacker to execute
arbitrary code on a vulnerable system.

VU#125776 - Multiple buffer overflows in Mozilla POP3 protocol handler

There are multiple buffer overflow vulnerabilities in the Mozilla POP3
protocol handler that could allow a malicious POP3 server to execute
arbitrary code on the affected system.

VU#327560 - Mozilla "send page" feature contains a buffer overflow
vulnerability

There is a buffer overflow vulnerability in the Mozilla "send page"
feature that could allow a remote attacker to execute arbitrary code.

VU#651928 - Mozilla allows arbitrary code execution via link dragging

A vulnerability affecting Mozilla web browsers may allow violation of
cross-domain scripting policies and possibly execute code originating
from a remote source.

II. Impact

These vulnerabilities could allow a remote attacker to execute
arbitrary code with the privileges of the user running the affected
application.

VU#847200 could also allow a remote attacker to crash an affected
application.

III. Solution

Upgrade to a patched version

Mozilla has released versions of the affected software that contain
patches for these issues:

* Mozilla 1.7.3
* Firefox Preview Release
* Thunderbird 0.8

Users are strongly encouraged to upgrade to one of these versions.

Appendix A. References

* Mozilla Security Advisory -
<http://www.mozilla.org/projects/security/known-vulnerabilities.ht
ml>
* Mozilla 1.7.2 non-ascii hostname heap overrun, Gael Delalleau -
<http://www.zencomsec.com/advisories/mozilla-1.7.2-UTF8link.txt>
* Security Audit of Mozilla's .bmp image parsing, Gael Delalleau -
<http://www.zencomsec.com/advisories/mozilla-1.7.2-BMP.txt>
* Security Audit of Mozilla's POP3 client protocol, Gael Delalleau -
<http://www.zencomsec.com/advisories/mozilla-1.7.2-POP3.txt>
* US-CERT Vulnerability Note VU#414240 -
<http://www.kb.cert.org/vuls/id/414240>
* US-CERT Vulnerability Note VU#847200 -
<http://www.kb.cert.org/vuls/id/847200>
* US-CERT Vulnerability Note VU#808216 -
<http://www.kb.cert.org/vuls/id/808216>
* US-CERT Vulnerability Note VU#125776 -
<http://www.kb.cert.org/vuls/id/125776>
* US-CERT Vulnerability Note VU#327560 -
<http://www.kb.cert.org/vuls/id/327560>
* US-CERT Vulnerability Note VU#651928 -
<http://www.kb.cert.org/vuls/id/651928>
_________________________________________________________________

Mozilla has assigned credit for reporting of these issue to the
following:

* VU#414240: Georgi Guninski
* VU#847200: Gael Delalleau
* VU#808216: Gael Delalleau and Mats Palmgren
* VU#125776: Gael Delalleau
* VU#327560: Georgi Guninski
* VU#651928: Jesse Ruderman
_________________________________________________________________

Feedback can be directed to the US-CERT Technical Staff.
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA04-261A.html>

_________________________________________________________________

Copyright 2004 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

Revision History

Sept 17, 2004: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQUtEPBhoSezw4YfQAQIosQgAkny8jByUHOSsukYr4u20BGhOb1FI2wKY
GilIzIJy8sKtHq6S3XHMk5xXH8dDgheODPV3NLB6X6sksG4x1o5pQKq2lgANas13
EIIfVb5p3//uS0qV/zhPlc7tkBcJAVgx1BaExorJpsHeEfhF22+hPt+BuuBM875B
T1owipQIGbADQjhh4zVAJYSsLl3R8ZHYu8QnJlRn+qCF2Psg2eTnXlzfzIHvhl/3
KuaeqQ86V+B+uXUox2FjlrOzYujUY2z+syRkfNFINIo3E51rRJxF5SGxNt0gPD+y
CqZw4LDf+HqdpIQd6J/vJq4GcOkOXYraXskUK8zwCiSwqSw1ucYGvA==
=C1IN
-----END PGP SIGNATURE-----





|
| Once you've got rid of it try firefox http://www.mozilla.org/ instead of
| Internet Explorer .. you'll be much safer.
|
| Billy
|
 
M

Michael N. Christoff

David H. Lipman said:

Yes really. In fact CERT (the U.S. Computer Emergency Readiness Team) now
recommends that users consider switching browsers as one way to avoid IE
security issues.

Internet Explorer Dips in Popularity
http://www.eweek.com/article2/0,1759,1622828,00.asp?kc=EWRSS03119TX1K0000594

Internet Explorer Loses More Market Share
http://www.eweek.com/article2/0,1759,1646705,00.asp

Security Holes Sinking IE
http://www.eweek.com/article2/0,1759,1624514,00.asp

Internet Explorer Is Too Dangerous to Keep Using
http://www.eweek.com/article2/0,1759,1617927,00.asp

etc...

By the way, I'm not saying alternative browsers are perfectly secure (or
that ANY software is for that matter), but IE is by far the easiest browser
for an average user to get infected with viruses/spyware etc. at this point
in time.



l8r, Mike N. Christoff
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top