Internet explorer connects through a secondary site

  • Thread starter Thread starter Aaron. C
  • Start date Start date
A

Aaron. C

I opened an email one time, and it installed a toolbar in
internet explorer. I deleted the toolbar software, but
internet explorer hasn't functioned the same, since. When
I enter an address into the address bar, it tries to
connect to the site through a secondary site, instead of
connecting directly to the site. For example when I type
in www.msn.com, a screen comes up and Can't connect to
www.msn.com, but then it gives me the www.msn.com link
below that, and if I click on the link, it will take me to
the site. I could use some help. Thanks!
 
Aaron. C wrote in
I opened an email one time, and it installed a toolbar in
internet explorer. I deleted the toolbar software, but
internet explorer hasn't functioned the same, since. When
I enter an address into the address bar, it tries to
connect to the site through a secondary site, instead of
connecting directly to the site. For example when I type
in www.msn.com, a screen comes up and Can't connect to
www.msn.com, but then it gives me the www.msn.com link
below that, and if I click on the link, it will take me to
the site. I could use some help. Thanks!

Not knowing what you have manually removed and not knowing what
exactly you "have" it may not be possibly to return everything to
"normal". It sounds like a BHO hijacker type Adware/Spyware nasty.
You also do not say what OS and SP or the IE version or the site or
.... You really need to provide as much info. as possible. In any
case ensure you're A-V is up to date and get some tools. These two
are free and are fairly good. Get both, update both, use both.
Ad-aware
http://www.lavasoftusa.com/
SpyBot Search and Destroy
http://www.safer-networking.org/

In the future I suggest doing some research before installing
anything. Get defensive.

Both SpyBot and Ad-Aware have user forums that are useful. Google
can often point you to information based on a filename. There are
many security sites that have information on BHO hijackers etc. In
this case it cannot, it appears, be said that any of your software
was exploited as you willingly installed the thing.
 
Back
Top