Hijacker
Software that seizes control of a computer’s resources to proliferate itself or use them for other malicious purposes.
There are several types of hijackers. The most common are:
- Browser hijackers – Alters the existing Internet browser settings so that a user is redirected to unwanted or malicious Web sites. These include programs that change the browser Home page or replace a popular search service’s home page with its own fake copy, whose search results point to particular malicious or irrelevant sites.
- Autorun hijackers – Automatically run certain programs on start-up of a user’s computer.
- HuntBar
- HuntBar.BTIn
- HuntBar.BTLink
- HuntBar.MSIn
- HuntBar.MSLink
- Huntbar.QDow
- HuntBar.Side
- HuntBar.Stoolbar
- HuntBar.WebSearch
- Hyperlinker
- IB.TopicBrowser.Hijack
- IBIS
- iChoose
- IE ZoneMap Domains
- IEBAR
- IEPlugin
- Iesar
- iesecurepages.com
- IETray
- IGetNet
- IGetNet.ClearSearch
- IGetNet.Keywords
- iGetNet.Natural.Language.Navigation
- Image File Execution Options
- iMesh.com
- in.webcounter.cc
- IncrediFind
- InstaFinder
- Instantsafepage.com
- IntermixMedia.KeenValue
- Internet Auto Config URL
- Internet Connection Wizard
- Internet Explorer Settings Hijacker
- internetsearchservice.com
Hi Jean,
Keep up the excellent work,all done. I presume it went smoothly as the computer has not disintegrated into a pile of twinkling dust.
Very many thanks for you help and patience at Exterminate-it. When I contacted Exterminate-it and loaded down your software I was on to my third antispyware company to solve a problem. Two companies had refunded subscription fees to my credit card rather than persevere to fix the problem.
Your team has guided me through the problem. My system has continued to operate through the whole procedure and you have been endearing patient with an old computer geek.