Malware and other viruses, download problem, IE is hacked?

I ran anti virus programs, they found horses of Trojans, spyware software, root kit and pirate PUM. They were "out" I used Avast, he found nothing, I used bytes ware bad, and he concluded that all of the above, I chose to delete. But I can not open IE without it redirect me to a bogus page. I also use Firefox, I can access the web with Firefox and everything seems normal in this aspect, except when I try to download anything, I only get the option to save or cancel the file. I click on save and the DL box opens, but I'm unable to open or run the file, or it appears when I open the separately from the folder to download on my computer. So so I can't DL a file, I can't get the files sent to me through my bf on Skype, I know, but I can't go anywhere in line and DL! Help, please!

Hello

You shouldn't have two major antivirus programs on the computer at the same time much less
running. Even the remains of some people can cause strange problems. Run the McAfee removal
Tool. Uninstall AVG and run the removal tool.

McAfee removal tool
http://service.McAfee.com/FAQDocument.aspx?ID=TS100507

AVG removal tool
http://www.Avg.com/us-en/download-tools

List of tools to clean/uninstall anti-malware programs
http://social.answers.Microsoft.com/forums/en-us/msestart/thread/407bf6da-C05D-4546-8788-0aa4c25a1f91/

=================================

Make sure you use ALL the methods to search for malware, including the online scanners.

If you make a new account and connected to it and still could not download from ANY site (not only
a specific site) there are some unusual factors in the game. Don't forget to run the removal tools
as indicated above. Then, start a new account.

------------------------------------------------------------

Here's what I use and recommend: (these are all free and very effective versions.)

Avast and Prevx proved extremely reliable and compatible with all I have
launched on them. Microsoft Security Essentials and Prevx have also proven to be very
reliable and compatible. Use MSE or Avast and Prevx, Prevx 3 but not all.

Avast Home free - stop any shields is not necessary except leaving Standard, Web, and
Operation of the network.

Prevx - Home - free

Windows Firewall

Windows Defender (is not necessary if you use MSE)

Protected IE - mode

IE 8 - SmartScreen filter WE (IE 7 phishing filter)

I also IE always start with asset if filter InPrivate IE 8.
(It may temporarily turn off with the little icon to the left of the + bottom
right of IE)

Two versions of Avast are available 5.x and 4.8 x

Avast - home - free - 5.x stop shields you do not use (except files, Web, network, &)
Shields of behavior) - double click on the icon in the Notification area - real time Orange - click on the
Shield that you want to stop - STOP. To stop the Orange icon to show an error indicator-
Click on the Orange icon - top right - settings - click on the status bar - uncheck shields you
disabled - click OK
http://www.avast.com/free-antivirus-download

Avast 4.8 x - home - free - stop shields, you don't need except leaving Standard, Web,.
and the network running. (Double-click the blue icon - look OK. - upper left - Shields details
Finish those you don't use).
http://www.avast.com/free-antivirus-download#TAB4

Or use Microsoft Security Essentials - free
http://www.Microsoft.com/Security_Essentials/

Prevx works well alongside MSE or Avast

Prevx - home - free small, fast, exceptional protection CLOUD, working with other security
programs. It is a single scanner, VERY EFFICIENT, if it finds something come back here
or use Google to see how to remove.
http://www.prevx.com/   <-->
http://info.prevx.com/downloadcsi.asp  <-->

PCmag - Prevx - Editor's choice
http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

Also get Malwarebytes - free - use as scanner only. If you ever think malware and that
would be unusual with Avast and occasional Prevx running with the exception of a low level cookie
(not much), to UPDATE and then run it as a scanner. I have a lot of scanners and they
never find anything of note that I started to use this configuration.

http://www.Malwarebytes.org/

=======================================================
=======================================================

Once you are sure that the stuff is clean you can try a repair/InPlace upgrade
Facility that allows to maintain the programs and data backups although redundant
are always a good idea.

You can use another DVD that aren't copy protected but you you need to own
Product key. It must be the same version 32 or 64 BIT Vista OEM. Also the system
machine to usually sell the cheap disk since you already own Windows. Don't forget to make a
good backup or 3 (security in redundancy).

On-site upgrade
http://vistasupport.MVPs.org/repair_a_vista_installation_using_the_upgrade_option_of_the_vista_dvd.htm

This tells you how to access the System Recovery Options and/or a Vista DVD
http://Windows.Microsoft.com/en-us/Windows-Vista/what-happened-to-the-recovery-console

How to perform a repair for Vista Installation
http://www.Vistax64.com/tutorials/88236-repair-install-Vista.html

I hope this helps.

Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.

Tags: Windows

Similar Questions

  • How can I check my Mac mini for spyware and other viruses

    How can I check my Mac mini for software spyware and other forms of virus? Recently, I received an electronic invoice which seems to come from Apple on a purchase that I did not. Unfortunately, I answered by clicking on a link that asked me to cancel or manage this purchase that led me to a site that didn't look like an official Apple site. I am afraid that simply by doing so, I welcomed the spyware on my Mac mini hard drive.

    My Mac was purchased in 2011 and runs on OS X El Capitan (version 10.11.6).

    Kind regards

    Politkovskaya

    Receive a fraudulent e-mail for a purchase confirmation, you did not is a very common scam. Remember that you are not misled by providing personal information solicited by this e-mail.

    Unfortunately, I answered by clicking on a link that asked me to cancel or manage this purchase that led me to a site that didn't look like an official Apple site. I am afraid that simply by doing so, I welcomed the spyware on my Mac mini hard drive.

    No harm will come of the fact that you wrote. Fraudulent Web sites that are made to appear as legitimate those who are specially designed to convince you to reveal personal information. If you don't have that, no further action is necessary or justified. Do not install anything, no matter the source or the apparent popularity, in response to one such scam. To do this would be the first step in a path well worn to the misery.

    On the other hand, if you were tricked into providing personal information (like your Apple ID and password) you will need to change your password on Apple ID. Please write back for instructions.

  • a bug keeps opening pages and my current malware and anti virus can't find it

    Ive been hunting something that makes pop pages up to different and these ads sites and its really annoying and I'm sure his slow FF down. I have Malwarebytes, Spybot and AVG all work, and they find nothing. Between this gene constant issues flash and accidents, Im willing to use something else if I can't find solutions. IM using win 8.1 completely up to date. No further questions on this laptop or the other.

    Adblock prevents this from happening now. Problem solved

  • Re: Creative Suite 6 and other software downloads

    Hi, I had the same problem as described above. I am re - download cs6 on a new computer PC laptop. The two elements are in the same folder and I clicked on the .exe file, but I still get the same error as the file to archive is missing, even though I see it above the .exe file. Can you help me with this or maybe walk me through it? Any help would be greatly appreciated. Thank you.

    You must download the .exe and .7z files and make sure that they are placed under the same folder.

    And then double-click the .exe file.

  • A person to access my e-mail personal passwrds and change them, they also interfere with my Spybot Search & Destroy, as they try t send me trjan horses and other viruses. How can-

    A person, who I think is my ex-[boyfriend, Phil Cahal, his ex-wife, Traci Hatfield and her daughter, Briana Cahal arew t destroying my laptop.  My e-mail passwords have been changed every day for more than a month, also my Facebook account has been hacked.  There are now 2 no actual emails on my profile, and I got gto prove wh in the fact that I had to come back.  Now my Hotmail password address has been changed, also, someone is in my anti-virus and spybot search and destroy.  What can I do?

    Unless you have a door furtively remote installed on your PC, there's no way someone is actively change or affect your antivirus on your PC and a review of your firewall settings or Spybot forge plugging this hole.

    Your Hotmail mailbox, but may have been compromised, but you should be able to recover that also using the methods described in the http://windowslivehelp.com/.  As for Facebook, change your password and secret questions to something impossible to guess and you should be able to regain control of it also.  Make sure that you do not access these public WiFi hotspots public profiles unless you enable the https feature.

  • anti malware and anti virus together

    can I use malwarebytes pro & avg free together without conflicts

    In theory, yes - but check the forums for both applications, you may need to change some settings.

  • Windows security - they have my computer was attacked by viruses and other malware, has offered assistance to the evaluation, indications of problems

    Received a phone call from an organization called Windows Security (or similar name). They advise that they have indications that my computer was attacked by viruses and other malware, has offered assistance to the assessment, problems, etc.  I went through a series of tasks that I believe that gave them access to my computer, but then got suspicious, and said I would call back. Given telephone number was (520) 720-0786.  Given names were Sean Wilson and Bryan Hussey.  Please indicate if they are legit, and if not, what can I do to protect myself?  Appreciate your help... Brian

    Received a phone call from an organization called Windows Security (or similar name). They advise that they have indications that my computer was attacked by viruses and other malware, has offered assistance to the assessment, problems, etc.  I went through a series of tasks that I believe that gave them access to my computer, but then got suspicious, and said I would call back. Given telephone number was (520) 720-0786.  Given names were Sean Wilson and Bryan Hussey.  Please indicate if they are legit, and if not, what can I do to protect myself?  Appreciate your help... Brian

    This is a complete scam.  You can report it to your local police.

    For your own protection, you should:
    • Change your passwords on email accounts, accounts financial and sensitive to which accounts you access online from this PC.  RIGHT NOW!
    • Run a full scan of your PC using your antivirus application...    Also download and run a full scan with Malwarebytes Anti-malware (free edition).  MBAM is a very good solution in addition to your primary backup antivirus/antimalware application.
    • I would also go here: https://www.microsoft.com/security/portal/Shared/Help.aspx and follow the advice of "I think that my PC is infected", including potentially calls MS help.
    • Above all, do not delay!  If you have any concerns about the handling of it, then disconnect your computer from the internet and call MS before anything else.
  • Virus Malware Trojans and other junk

    Okay, so, it is true that I am not a Mac person, gasp, but here comes a true unbiased.

    I helped a member of the family rebuild a MacBook Pro using a USB stick to boot and install the latest version of El Capitan.  I was helping to restore the data literally 48 hours later and to my surprise, that the machine was infected with two pieces of malware (which was visible) 'Advanced Mac Cleaner' and 'ZipClould '.  It is interesting ZipCloud himself had placed in the dock bar, replacing a similar looking cloud storage service.

    So clearly the machine has been compromised, and it was easier to rebuild than to go on the road to 'cleaning up' at this stage.

    How can I avoid this happening again?  I can't look over the shoulder 24 x 7, but there should be a way to avoid this.

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you still need to delete any file that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • Hello, a few months ago, I joined a CC + adobe stock subscription. I downloaded my first 10 images of the first month and paid the other. The problem is that since the second month, I have not my 10 free photos more... why? Thanks to you all

    Hello, a few months ago, I joined a CC + adobe stock subscription. I downloaded my first 10 images of the first month and paid the other. The problem is that since the second month, I have not my 10 free photos more... why? Thanks to you all

    Hello

    Sorry - I've added the image apply to your account.

    Kind regards

    Bev

  • When I try to access gmail (and other sites), I get a strange download prompt.

    It says this (with the name of the file varies from one site to another):

    You have chosen to open:

    Which is: application: byte-stream
    From: mail.google.com

    What should Firefox do with this file?

    Open
    Save

    Its very strange, it happens just when I get a Web site in the navigation bar and few enter.

    Thank you.

    Sometimes a problem with Firefox can be a result of malware installed on your computer, you may not be aware of.

    You can try these free programs to search for malicious software that work with your existing anti-virus software:

    Microsoft Security Essentials is a good permanent antivirus for Windows 7/Vista/XP, if you do not already have one.

    More information can be found in the article troubleshooting Firefox problems caused by malware .

    This solve your problems? Please report to us!

  • I ae8 xp cannot download, without tools, internet option code inadmissible and other small details. IE 8 will not unistall because missing files and extensions to copy.

    Cannot download missing tools, internet option inactive and files missing in ie8 not allowing not uninstall - help

    Hi RandyRawlinson,

    1. did you of recent changes on the computer?

    2. What is the full error message that you receive during the uninstallation of internet Explorer 8?

    3. do you have security software installed on the computer?

    4. what happens when you try to download anything using internet explorer 8?

    5 do you have other options available on the bar menu of internet explore?

    I suggest that you put the computer in a clean boot state and check if the problem persists.

    It is possible that some third-party programs installed on the computer is causing the problem.

    To help resolve the error and other messages, you can start Windows Vista or Windows 7 by using a minimal set of drivers and startup programs. This type of boot is known as a "clean boot". A clean boot helps eliminate software conflicts.

    See the link below to learn more about how to clean boot.

    How to configure Windows XP to start in a "clean boot" State

    http://support.Microsoft.com/kb/310353

    Reset the computer to start as usual

    When you are finished troubleshooting, follow these steps to reset the computer to start as usual:

    (a) click Start, type msconfig in the search box and press ENTER.

    (b) If you are prompted for an administrator password or for confirmation, type your password or click on continue.

    (c) under the general tab, click the Normal startup option, and then click OK.

    (d) when you are prompted to restart the computer, click on restart.

    If you still want to uninstall internet explorer 8 from the computer then refer the below Microsoft article and try the steps mentioned, check if it helps.

    How to uninstall or remove IE as a troubleshooting step?

    http://support.Microsoft.com/kb/957700

    I would also say that you scan the computer for infections of malware or viruses using below online virus scanner.

    The scan below only works on the 32-bit version of Windows

    http://OneCare.live.com/site/en-us/default.htm

     

    You can use the Microsoft security essentials to scan your computer

    http://www.Microsoft.com/security_essentials/

  • Problem with iTunes gel preferences and other issues.

    I don't know why, but the week last iTunes randomly decided to not work: whenever I try to open the preferences panel it hangs and release only randomly after a few minutes only to freeze again when I change the tabs. Also, all devices that I connect so that open freezes iTunes, yet once it thaws in itself rarely after waiting an hour or more but crashes again soon after.

    I tried everything short of wiping the disk and start from scratch (not an option to be honest): followed every single link help I found on Apple's site, used several malware scanner, defragmented, made several clean install iTunes and its components.

    I'm on an ASUS N53SV win 10, latest version, all the updated drivers. I don't really know what else remains.

    For general advice, see troubleshooting problems with iTunes for Windows updates.

    The steps described in the second case are a guide to remove everything related to iTunes and then rebuild what is often a good starting point, unless the symptoms indicate a more specific approach.

    Review the other boxes and other support documents list to the bottom of the page, in case one of them applies.

    More information area has direct links with the current and recent buildings if you have problems to download, must revert to an older version or want to try the version of iTunes for Windows (64-bit-for old video cards) as a workaround for problems with installation or operation, or compatibility with QuickTime software or a third party.

    Backups of your library and device should be affected by these measures but there are links to backup and recovery advice there.

    TT2

  • What is malware and how do you know if it affects your pc? Is it possible to solve the problem?

    What is malware and how do you know if it affects your pc?  Is it possible to solve the problem?

    Definition of malware from Wikipedia.org

    Malware, short for malicious software, is made up of programming (code, scripting, active content and other software) designed to disrupt or deny the operation of gathering information that leads to the loss of privacy, or operating, access resources system and other abusive behavior. The expression is a general term used by the professionals for a variety of forms of software code or hostile, intrusive, or annoying program.

    One of the best (and FREE) ways to prevent it from running Microsoft Security Essentials, which will scan your (s) and eliminate the bad guys you can be picked up when you surf, opening files is sent to you etc..  Of course security software is only good if it updates often with the newly found bad, but MSE update daily and you can set to sweep once per day or more.

    http://www.Microsoft.com/en-us/security_essentials/default.aspx

    I suggest that you download and install, then let run a FULL scan and see what it finds.

  • Hi.I download Microsoft Security Essentials and installation becomes a problem with the code: 0 x 80070643. If you can help me...

    Hi.I download Microsoft Security Essentials and installation becomes a problem with the code: 0 x 80070643. If you can help me...

    Support Microsoft Security Essentials forums
    http://social.answers.Microsoft.com/forums/en-us/category/MSE

    Can I install Microsoft Security Essentials [or any other anti-virus/anti-spyware application] to clean my already infected computer?
    http://social.answers.Microsoft.com/forums/en-us/msescan/thread/87058857-D181-4019-a723-efd9a49d9275

    ~ Robear Dyer (PA Bear) ~ MS MVP (that is to say, mail, security, Windows & Update Services) since 2002 ~ WARNING: MS MVPs represent or work for Microsoft

  • When I try to defrag, a window opens and closes and a file download-security warning. A loop repeats. Other programs to do the same thing. Please help me fix this loop? SOS?

    When I run defrag, an IE window opens and closes and a file download-security warning comes up and asks me to run or save the file name: c:\windows\system32 dfrgui.exe, if I hit then another warning of IE - sec stands up and says 'the Publisher could not be verified. Are you sure that you want to run. I struck and the loop repeats. I run a diag of the F10 boot menu with dell. They say that its software and non-material, pay! Microsoft says that Dell is responsible. Other programs to do the same thing. I've updated and rerun my AVG security without error. We are automatically updated, and no other programs were added. Please help me fix this loop? SOS?

    Vista - open file - security warning
    http://www.Vistax64.com/Vista-security/125044-open-file-security-warning.html

    How to repair the operating system and how to restore the configuration of the operating system to an earlier point in time in Windows Vista
    http://support.Microsoft.com/kb/936212/#appliesTo

    How to troubleshoot a problem by performing a clean boot in Windows Vista or in Windows 7
    http://support.Microsoft.com/default.aspx/KB/929135

    Your programs launch properly from Safe Mode?  Or Normal Mode if you create another user to test with?

    Vista advanced boot options
    http://Techblissonline.com/Vista-advanced-boot-options/

    Try running ChkDsk to check your drive for errors. Right click on your drive icon / properties / tools / error checking.  Try first by checking do not each box (that it will run in read-only mode) to see if it reports any problems file or hard drive.  If so, restart it by checking both boxes and restart to allow him to attempt to fix any problems found.

    I see a lot of recommendations here for programs such as -

    Malwarebytes' Anti-Malware
    http://www.Malwarebytes.org/MBAM.php

    SuperAntispyware
    http://SUPERAntiSpyware.com/

Maybe you are looking for