Welcome Guest (Log In | Create Account)
New Member? Join for free.
There are 1048 Removal Guides.
Sort By:

Wajam Ads Image
Read 6,374 times | Last updated on April 1, 2015

Wajam, also known as WNetEnhance, is adware that displays advertisements on social and shopping sites that you visit. When installed, Wajam will configure your browser to use a Proxy server that allows it to inject ads into various sites that you visit. These ads are inserted into the header of a site and are labeled Wajam Ads. The ads will be for products that are in the same category as to what you are viewing or searching for on the site.

Read Entire Removal Guide


Powered by Priceless Adware Image
Read 6,886 times | Last updated on April 1, 2015

Priceless is an adware program that injects advertisements and deals when browsing shopping sites. While browsing shopping sites, such as Ebay or Amazon, Priceless will inject advertisements that offer deals or lists other sites where you can purchase the same item. These advertisements will be labeled Powered by Priceless or Best Deals Powered by Priceless and will be placed on the web site in an intrusive manner, which makes it difficult to read the content or navigate the affected site.

Read Entire Removal Guide


MyBestOffersToday Image
Read 6,412 times | Last updated on March 31, 2015

MyBestOffersToday is a program that displays daily free offers and also displays advertisements directly on your desktop. It shows these offers and advertisements using multiple methods such as desktop pop-ups, the MyBestOffersToday widget, and by opening your browser and displaying them. When installed, MyBestOffersToday will be configured to run automatically and listen in the background with no indication that the program is running other than the randomly displayed advertisements.

Read Entire Removal Guide


Epic Scale Image
Read 6,605 times | Last updated on March 30, 2015

Epic Scale is a program that mines digital currency when your computer's CPU is idle. Epic Scale then donates a portion of the profits from the sales of this generated digital currency to charities such as Watsi, WaterIsLife, Immunity, Blood:Water, and One Degree. Epic Scale by itself is an admirable program, but when it is bundled with other programs it could be considered a potentially unwanted program as people may not realize what they are installing. Epic Scale first became a concern when it started being included as a bundled offer when installing uTorrent as a method to generate revenue for the uTorrent developers. There was also rumors that the uTorrent setup was installing Epic Scale without first notifying the user that this was being done.

Read Entire Removal Guide


Do-search.com Image
Read 5,436 times | Last updated on March 30, 2015

The Do-search.com adware is a program from the Adware/ShortcutHijacker family of browser hijackers that are bundled with free programs you download off of the Internet. Many free programs are wrapped in an adware installer that installs programs like this hijacker in order to generate revenue for the freeware developer. Unfortunately, many of these programs are just as bad as normal computer malware and can have a harmful effect on your computer. The Do-search.com adware is a browser hijacker that changes browser shortcuts, your browser search provider, and browser start pages to Do-search.com without your permission. Furthermore, this adware will append the argument http://www.do-search.com/?type=hp&ts=&from=&uid= to various web browser shortcuts and sometimes shortcuts that are for non-Internet related program. This causes the Do-search.com web page to open when you launch one of these hijacked shortcuts. Unfortunately, the method they use to change the shortcuts does not allow you to easily fix them by just going into their properties and you have to instead use special tools to clean them.

Read Entire Removal Guide


Mystartsearch.com Image
Read 6,648 times | Last updated on March 29, 2015

The Mystartsearch.com adware is a browser hijacker that is bundled with free programs you download off of the Internet. Many free programs are wrapped in an adware installer that installs programs like this hijacker in order to generate revenue for the freeware developer. Unfortunately, many of these programs are just as bad as normal computer malware and can have a harmful effect on your computer. The mystartsearch.com adware is a browser hijacker that changes browser shortcuts, your browser search provider, and browser start pages to mystartsearch.com without your permission. Furthermore, this adware will append the argument http://www.mystartsearch.com/?type=hp&ts=&from=&uid= to various web browser shortcuts and sometimes shortcuts that are for non-Internet related program. This causes the mystartsearch.com web page to open when you launch one of these hijacked shortcuts. Unfortunately, the method they use to change the shortcuts does not allow you to easily fix them by just going into their properties and you have to instead use special tools to clean them.

Read Entire Removal Guide


TabNav Image
Read 6,380 times | Last updated on March 27, 2015

TabNav is a program that displays advertisements and collects information on the sites that you visit. It does this by installing a Layered Service Provider that is able to examine and manipulate all the network data that you transmit and receive on your computer. Using this ability, TabNav can easily inject ads into the web sites that you visit and collect information about your browsing habits. TabNav also installs a root certificate into Windows called appimaker. This root certificate allows it to see SSL traffic so that it is able to inject ads even into encrypted connections. Unfortunately, this also gives it the ability to see all data you transmit over an encrypted SSL connection including login information.

Read Entire Removal Guide


SpeeditUp Ads Image
Read 5,806 times | Last updated on March 26, 2015

SpeeditUp is a program that claims it checks your Internet connection for speed and performance issues. This in itself is not a bad thing, but SpeeditUp also displays intrusive advertisements on your desktop and on web sites that you visit. When visiting web sites, SpeeditUp will display ads in a way that makes it difficult to navigate or read the site. These ads will be labeled Ads by SpeeditUp and take up a large amount of a site's visibility and are typically displayed over the the site's content. Even more concerning, many of the ads that are displayed by SpeeditUp are for further adware installers that would cause even more damage to your computer.

Read Entire Removal Guide


Luckysearches.com Image
Read 7,014 times | Last updated on March 26, 2015

The Luckysearches.com adware is a browser hijacker that is bundled with free programs you download off of the Internet. Many free programs are wrapped in an adware installer that installs programs like this hijacker in order to generate revenue for the freeware developer. Unfortunately, many of these programs are just as bad as normal computer malware and can have a harmful effect on your computer. The Luckysearches.com adware is a browser hijacker that changes browser shortcuts, your browser search provider, and browser start pages to Luckysearches.com without your permission. Furthermore, this adware will append the argument http://www.luckysearches.com/?type=hp&ts=&from=&uid= to various web browser shortcuts and sometimes non-Internet related programs. This causes the Luckysearches.com web page to open when you launch one of these hijacked shortcuts. Unfortunately, the method they use to change the shortcuts does not allow you to easily fix them by just going into their properties.

Read Entire Removal Guide


Security Defender Image
Read 10,204 times | Last updated on March 25, 2015

Security Defender, or Defender Pro 2015 as it's shown on the program's web site, is a rogue anti-spyware program that displays fake security alerts, false scan results, and blocks you from running your legitimate programs. This program may look familiar as it tries to impersonate Microsoft Security Essentials by using the same graphical user interface. This scareware is distributed through web sites that have been hacked to run exploit kits that try to install the program by exploiting vulnerabilities on your computer. It is also distributed by Trojans that pretend to be programs required to view an online video, but instead install the infection. These types of Trojans are typically encountered on adult web sites.

Read Entire Removal Guide


Advertise   |   About Us   |   User Agreement   |   Privacy Policy   |   Sitemap   |   Chat   |   RSS Feeds   |   Contact Us
Tech Support Forums   |   Virus Removal Guides   |   Downloads   |   Tutorials   |   The Computer Glossary   |   Uninstall List   |   Startups   |   The File Database


© 2003-2015 All Rights Reserved Bleeping Computer LLC.
Site Changelog