Guest Mike Posted July 10, 2007 Posted July 10, 2007 I set up a new Dell Optiplex 745 for our webmaster and installed both Visual Studio 2003 & 2005. She had run the the Windows update site but when she went out to update.microsoft.com but the page ended up going to http://www.update.microsoft.com I ran spybot search & destroy and it found and deleted a cookie which seems to have fixed it but has anyone else run into this same problem? The computer runs very fast. Quote
Guest Milo (MSPSS) Posted July 10, 2007 Posted July 10, 2007 This is what I use http://www.windowsupdate.com http://www.windowsupdate.microsoft.com just to be sure this is the site that comes up http://www.update.microsoft.com/windowsupdate/v6/default.aspx?ln=en-us cookies are alright they come from all website -- Milo MSPSS "Mike" wrote: > I set up a new Dell Optiplex 745 for our webmaster and installed both Visual > Studio 2003 & 2005. She had run the the Windows update site but when she > went out to update.microsoft.com but the page ended up going to > http://www.update.microsoft.com I ran spybot search & destroy and it found and > deleted a cookie which seems to have fixed it but has anyone else run into > this same problem? The computer runs very fast. Quote
Guest Mike Posted July 10, 2007 Posted July 10, 2007 Yes that is the page that comes up. This is the first time I saw the www in front of update.microsoft.com Thanks. "Milo (MSPSS)" wrote: > This is what I use > http://www.windowsupdate.com > http://www.windowsupdate.microsoft.com > > just to be sure this is the site that comes up > http://www.update.microsoft.com/windowsupdate/v6/default.aspx?ln=en-us > > cookies are alright they come from all website > > -- > Milo > MSPSS > > > "Mike" wrote: > > > I set up a new Dell Optiplex 745 for our webmaster and installed both Visual > > Studio 2003 & 2005. She had run the the Windows update site but when she > > went out to update.microsoft.com but the page ended up going to > > http://www.update.microsoft.com I ran spybot search & destroy and it found and > > deleted a cookie which seems to have fixed it but has anyone else run into > > this same problem? The computer runs very fast. Quote
Guest PA Bear Posted July 10, 2007 Posted July 10, 2007 What's "Malwarealarm.com" got to do with this? Run a /thorough/ check for hijackware, including posting your hijackthis log to an appropriate forum. Checking for/Help with Hijackware http://aumha.org/a/parasite.htm http://aumha.org/a/quickfix.htm http://aumha.net/viewtopic.php?t=5878 http://wiki.castlecops.com/Malware_Removal_and_Prevention:_Introduction http://mvps.org/winhelp2002/unwanted.htm http://inetexplorer.mvps.org/data/prevention.htm http://inetexplorer.mvps.org/tshoot.html http://www.mvps.org/sramesh2k/Malware_Defence.htm http://defendingyourmachine2.blogspot.com/ http://www.elephantboycomputers.com/page2.html#Removing_Malware When all else fails, HijackThis v1.99.1 (http://aumha.org/downloads/hijackthis.zip) is the preferred tool to use. It will help you to both identify and remove any hijackware/spyware with assistance from an expert. **Post your log to http://forums.spybot.info/forumdisplay.php?f=22, http://castlecops.com/forum67.html, http://forums.subratam.org/index.php?showforum=7, http://aumha.net/viewforum.php?f=30, or other appropriate forums for expert analysis, not here.** If the procedures look too complex - and there is no shame in admitting this isn't your cup of tea - take the machine to a local, reputable and independent (i.e., not BigBoxStoreUSA) computer repair shop. -- ~Robear Dyer (PA Bear) MS MVP-Windows (IE, OE, Security, Shell/User) AumHa VSOP & Admin DTS-L.org Mike wrote: > I set up a new Dell Optiplex 745 for our webmaster and installed both > Visual > Studio 2003 & 2005. She had run the the Windows update site but when she > went out to update.microsoft.com but the page ended up going to > http://www.update.microsoft.com I ran spybot search & destroy and it found and > deleted a cookie which seems to have fixed it but has anyone else run into > this same problem? The computer runs very fast. Quote
Guest Gerald309 Posted July 11, 2007 Posted July 11, 2007 On Jul 10, 5:41 pm, "PA Bear" <PABear...@gmail.com> wrote: > What's "Malwarealarm.com" got to do with this? > ~Robear Dyer (PA Bear) > MS MVP-Windows (IE, OE, Security, Shell/User) > AumHa VSOP & Admin DTS-L.orgMike wrote: > > I set up a new Dell Optiplex 745 for our webmaster and installed both > > Visual Studio 2003 & 2005. She had run the the Windows update site but when she > > went out to update.microsoft.com but the page ended up going to > >http://www.update.microsoft.comI ran spybot search & destroy and it found and > > deleted a cookie which seems to have fixed it but has anyone else run into > > this same problem? The computer runs very fast. ORIGINAL BULLETIN: Bulletins: Fake Security MalwareAlarm.Com Website Downloads Rogue Application ..... Posted: Tue Apr 24, 2007 8:50 pm Post subject: Bulletins: Fake Security MalwareAlarm.Com Website Rogue App -------------------------------------------------------------------------------- Bulletins: Fake Security MalwareAlarm.Com Website Downloads Rogue Application... Fake Security Website Downloads Rogue Application by Trend Micro on 4/23/2007 9:56 PM Read more | Open in browser TrendLabs | Anti-Malware Blog - by Trend Micro all headlines http://blog.trendmicro.com/fake-security-website-downloads-rogue-application/ We've just spotted another "security website" that offers to aid users in getting rid of spyware plaguing their systems. In reality however, this website does nothing but trick the user into installing an adware application into their system. Although the website doesn't automatically download the rogue application, it does a fairly good job of tricking the user to download for themselves. Similar to the numerous ZLOB-carrying codec websites that proliferated during 2006, this one plays on the unsuspecting user's gullibility regarding security applications. Click on any of the download links and the file malwarealarmsetup.exe is downloaded on your system. When this file is executed, it displays the usual dialog boxes being used by the usual installation package for legitimate applications, even displaying the standard EULA text. SCREENSHOT: http://extracaretrendmicro-europe.com/tm/core/global/images/diary/405cb617208b9d47ddeee9dedda9ca55_malwarealarmsite.jpg An appropriate solution for this threat is already underway and it is to be detected as ADW_SPYSHERIF.BG. As a word of caution, do not download or install anything that this website offers. #####SPY-LERTS FROM BLUECOLLARPC.NET##### Mail List: spy-lerts@bluecollarpc.net Subscribe: spy-lerts-subscribe@bluecollarpc.net Unsubscribe: spy-lerts-unsubscribe@bluecollarpc.net List Owner: postmaster@bluecollarpc.net List Information: http://www.bluecollarpc.net/spy-lerts.html SPF Protected (Sender Authentication) http://spf.pobox.com MODERATOR ANNOUNCEMENT ONLY LIST / NO REPLY *****Moderated List, Internal Anti-Virus Protected***** _________________ *****BlueCollarPCNet Forum Owner***** http://bluecollarpc.net/phpbb2/index.php Quote
Guest Gerald309 Posted July 11, 2007 Posted July 11, 2007 SUBJECT: Malwarealarm.com legit? Options ..... On Jul 10, 10:16 am, Mike <M...@discussions.microsoft.com> wrote: > I set up a new Dell Optiplex 745 for our webmaster and installed both Visual > Studio 2003 & 2005. She had run the the Windows update site but when she > went out to update.microsoft.com but the page ended up going towww.update..microsoft.comI ran spybot search & destroy and it found and > deleted a cookie which seems to have fixed it but has anyone else run into > this same problem? The computer runs very fast. Bulletins: Fake Security MalwareAlarm.Com Website Downloads Rogue Application ..... Posted: Tue Apr 24, 2007 8:50 pm Post subject: Bulletins: Fake Security MalwareAlarm.Com Website Rogue App -------------------------------------------------------------------------------- Bulletins: Fake Security MalwareAlarm.Com Website Downloads Rogue Application... Fake Security Website Downloads Rogue Application by Trend Micro on 4/23/2007 9:56 PM Read more | Open in browser TrendLabs | Anti-Malware Blog - by Trend Micro all headlines http://blog.trendmicro.com/fake-security-website-downloads-rogue-appl... We've just spotted another "security website" that offers to aid users in getting rid of spyware plaguing their systems. In reality however, this website does nothing but trick the user into installing an adware application into their system. Although the website doesn't automatically download the rogue application, it does a fairly good job of tricking the user to download for themselves. Similar to the numerous ZLOB-carrying codec websites that proliferated during 2006, this one plays on the unsuspecting user's gullibility regarding security applications. Click on any of the download links and the file malwarealarmsetup.exe is downloaded on your system. When this file is executed, it displays the usual dialog boxes being used by the usual installation package for legitimate applications, even displaying the standard EULA text. SCREENSHOT: http://extracaretrendmicro-europe.com/tm/core/global/images/diary/405... An appropriate solution for this threat is already underway and it is to be detected as ADW_SPYSHERIF.BG. As a word of caution, do not download or install anything that this website offers. #####SPY-LERTS FROM BLUECOLLARPC.NET##### Mail List: spy-le...@bluecollarpc.net Subscribe: spy-lerts-subscr...@bluecollarpc.net Unsubscribe: spy-lerts-unsubscr...@bluecollarpc.net List Owner: postmas...@bluecollarpc.net List Information: http://www.bluecollarpc.net/spy-lerts.html SPF Protected (Sender Authentication) http://spf.pobox.com MODERATOR ANNOUNCEMENT ONLY LIST / NO REPLY *****Moderated List, Internal Anti-Virus Protected***** _________________ *****BlueCollarPCNet Forum Owner***** http://bluecollarpc.net/phpbb2/index.php Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.