-
June 7th, 2004, 03:52 PM
#1
Manual Entry of URLs in IE
I fixed a problem with IE 6 that had been infected with the CoolWebSearch trojan. Now the user has to type in the full url
i.e. http://www.windowsbbs.com....
Normally, you don't have to insert the text "http://", windows will insert that for you. What's happened here ... any ideas.
The good news is that CoolWebSearch is gone.
Thanks for any help
-
June 7th, 2004, 11:18 PM
#2
Banned
How about other malware?
You should clean it ALL up with all the standard tools here: http://forums.windrivers.com/showthread.php?t=57348
And then, if things are stil problematic, try a repair install of IE:
http://support.microsoft.com/default...&Product=winxp
-
June 8th, 2004, 10:47 PM
#3
Originally Posted by OldBob
I fixed a problem with IE 6 that had been infected with the CoolWebSearch trojan. Now the user has to type in the full url
i.e. http://www.windowsbbs.com....
Normally, you don't have to insert the text "http://", windows will insert that for you. What's happened here ... any ideas.
The good news is that CoolWebSearch is gone.
Thanks for any help
Your problem is a default entry in the registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\URL
DefaultPrefix
Name, Type, Data
(Default), REG_SZ, http://
-
June 8th, 2004, 10:58 PM
#4
Banned
OK: I'll bite: why is that the problem based on what he has said, and what exactly is the fix Votan? Delete that key?
-
June 8th, 2004, 11:07 PM
#5
Originally Posted by TripleRLtd
OK: I'll bite: why is that the problem based on what he has said, and what exactly is the fix Votan? Delete that key?
Oops, you got me there.
I missed to say that the key or its value must have been erased, this is why the auto-complete was not working. He has to re-enter the key value manually in the registry. I provided the key and its value.
-
June 9th, 2004, 10:49 AM
#6
another good tool for spyware scaning is:
doxdesk.com/parasite (not my site) I use this all the time as there is nothing to install.
Another one to be aware of is there are several SpyWare companies that insert their own DLL's as part of the WinSOCK TCP/IP Protocol Stack (NetDotNet6 is an example) - to get rid of these DLL's search for LSPFix.exe and run it. It will display the DLL's used in WinSOCK currently and you will need to determine if al of them belong there - search your computer for the DLL's listed and click "properties" then "version" The Microsoft DLL's can stay, the non-MS ones are generally the spyware component and should be removed.
Death is lighter than a feather - duty heavier than a mountian.
The answer to your question is: 00110100 00110010
Similar Threads
-
By Froghead in forum Windows XP
Replies: 11
Last Post: December 30th, 2008, 04:37 AM
-
By robertjvan in forum Video Adapter/Monitor Drivers
Replies: 16
Last Post: November 2nd, 2004, 02:33 PM
-
By Technichian in forum BIOS/Motherboard Drivers
Replies: 2
Last Post: May 13th, 2001, 12:50 PM
-
By Lacrosse in forum BIOS/Motherboard Drivers
Replies: 1
Last Post: April 14th, 2001, 01:55 AM
-
By morselady in forum Comments and Suggestions
Replies: 6
Last Post: March 9th, 2001, 02:57 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|
Bookmarks