Just a thought about a way to reduce the load on the dedicated people who run this shop - Is there a list anywhere of common things to look for in a Hijack-This log? I had an infestation of aBetterInternet a while back, and I saved the annotated HJT log with my problems. This was helpful in cleaning up a second machine, but now I've found some new entries. I've got the signatures of things like PurityScan and what to do about it, so now I can handle a few of these myself, but how about all the others?
Another thing that would be good to have is a similar list of things that we don't want to touch - like the internal Windows and IE stuff. To me, anything that starts with "win" or "sys" should be left alone, but I suppose that is precisely why the Spyware Axis of Evil uses names like this for its files.
1 reply to this topic