My Web Search is a malware toolbar distributed by Mindspark Interactive Network via their extensive network of spam sites, most of which are targeted towards young people. This rapidly expanding list of sites includes Zwinky, Zwinky Cuties, GirlSense, Webfetti, Kazula, iWon, SmileyCentral, MyFunCards, CursorMania, and CardBoiled. These sites trick people, mainly children, into installing the My Web Search toolbar. The toolbar is spyware. Mindspark admit as much in their EULA (End User License Agreement): “The My Web Search Toolbar, in the course of processing a given search query, sends a Read More
How to Remove MyWebSearch Toolbar
MyWebSearch Toolbar is a toolbar for Internet Explorer that allows users to run searches directly from their browser that all major search engines, including Google, Yahoo, AskJeeves, and Bing index. MyWebSearch Toolbar also includes a significant collection of emoticons, cursors, and screensavers. Additionally, MyWebSearch Toolbar includes a pop-up blocker and has many extensive features for customizing the toolbar. While MyWebSearch Toolbar may seem harmless, it can use a significant amount of CPU and memory as well as track computer usage through cookies that are saved when a user visits a Read More
Computer Worms
Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can execute completely independently and spread on its own accord through network connections. The security threat from worms is equivalent to that of viruses. Computer worms are skilled enough to do serious damage such as destroying Read More
g2mdlhlpx.exe
The original g2mdlhlpx.exe is a part of Citrix GoToMeeting and GoToWebinar. Malware creators have copied this filename in an attempt to “hide” from PC owners and system administrators. Someone who has Citrix GoToMeeting or GoToWebinar installed does not have to worry about this process. However, if he/she does not have either of these Citrix products installed on his/her PC, he/she will have to clean this malware from the PC. The legitimate g2mdlhlpx.exe executable installs in the C:Documents and Settings%user account% folder. Rogue versions of this executable process are sometimes found Read More
Master Blaster Virus
The Master Blaster virus is a malicious program that was developed from the initial Blaster worm. It was repackaged by Jeffrey Lee Parson during 2003. It was also released to infect computers running on MS Windows OS versions across the globe during the same year. The repackaged or reprogrammed Master Blaster virus was then known as Blaster B or LovSan. This variant of the Master Blaster virus exploited known vulnerabilities of MS Windows OS versions. This activity was similar to other known variants of the Master Blaster Virus. Upon infection, Read More
Boot Sector Virus
A boot sector virus is a computer virus which infects the boot sector on hard disks, floppy disks, and theoretically also other bootable media such as CD’s and DVD’s. A boot sector virus does not need to be able to successfully boot the victims computer to infect it. Because of this, even non-bootable media can spread a boot sector virus. Once the infected computer successfully boots, the boot sector virus stays in memory and infects floppies and other media when they are written to by the infected computer. Boot sector Read More
How to Remove a Browser Hijacker
Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware to the computer or steal the user’s data. Most browser hijacks are based on adware, and to a more limited degree, spyware functions. How do Browser Hijackers Infect Computers? When a computer browser is hijacked, Read More
How to Remove a Virus
A computer virus is designed to infect computer files through self-replication, and is able to infect other computers on its own. Viruses infect computers through boot sectors of portable drives, email attachments, other files, and by exploiting vulnerabilities in instant messaging and other real-time communication systems online. Not all computer viruses harm computers, but many steal the user’s private information. Although every computer virus is designed a bit differently, there is a common method of removing viruses from computers. How to Remove Viruses Removing viruses, though technical, is yet a Read More
Detection and Removal of Internet Speed Monitor
Browser helper objects (BHOs) are primarily software programs that enable website authors to gain control and customize different components of IE. Usually, BHOs get loaded whenever IE browser starts and tend to share IE’s memory context. “Internet speed monitor” is a type of browser helper object. Simply, an “Internet Speed Monitor” can be termed as an extremely irritating and invasive Adware toolbar program that gets installed into the system through an adware called BndDrive, thereby generating an uncontrolled stream of popup advertisements that are titled “internet speed monitor”. In this, Read More
How to Remove the Generic.dx Trojan
Generic.dx is a rather common trojan virus that infects the computer and weakens its security in order to allow other viruses and malicious software to infect the computer. It enters the computer via an email that the user opens, a website he/she visits, or a third party software that he/she downloads and installs. Generic.dx trojans tend to hide rather well, but can be eliminated with anti-virus software. Typically, Generic.dx trojans can be found in the primary hard drive’s Programs Files folder. How Generic.dx Trojan Works Generic.dx trojans begin by Read More
Share on: