Welcome to Browser Hijack Retaliator 4.5 Help?
|
A problem with the processlibrary search has been fixed in the Startup Manager.
IE Plus 's Browser Extension Icon refresh problem fixed.
Startup Manager now lists all the Winlogon Notify items under the Winlogon Page. Back to Main
Browser Hijack Retaliator 4.5
This is a freeware product. So you can do the following things
-
╗ You can distribute it freely to your friends and other known
persons.
╗ You can make any number of backup copies of this free Software for personal
use or Official use.
╗ Publishing
You may publish Browser Hijack Retaliator in a
Magazine or other media.
It is much appreciated if you let us know by an email before doing so.
Please DonÆt ..
╗ Rent, sell or copy to someone for commercial purposes.
By obeying these rules you can safely use this software.
Disclaimer
THE SOFTWARE PRODUCT IS PROVIDED "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED.
. ZamaanÆs Software IS NOT
RESPONSIBLE FOR ANY KIND
OF DAMAGE PRODUCED
WITH IT.
⌐ ZamaanÆs Software 2004-2006 All rights reserved. Back to Main
1.1 - This is the initial version.
> Protection for IE Home Page ,Search
Page, Search Bar under Current User.
> A notification when new items are
added to IE Favorites.
2.1 - >Complete protection for all
default page URL's of IE for Current User and All Users.
>Enhanced Internet Explorer Favorites protection.
>Browser Restore option
included.
>A small change has been made to the appearance of the
bugy that
appear with BHR alert Window.
>An inbuilt help portion has been
added to explain the terms of items that BHR protects.
>User has the ability to
enable or disable protection for selected Page URL's.
>Separate Window to list the
protection status of each default page URL's.
>Log file has been changed
from Last Activity Log to full History Log.
3.0 - >Real-time Protection for BHO's
(Browser Helper Objects)
>Startup Programs Manager.
3.5 - >Built in Host file Editor
with Host file Hijack recovery.
>Enhanced Startup Manager.
>BHO Alert window related bug
fixed.
>Visual Enhancements
4.0 - >Following issues has been fixed
in this version.
*System Tray Menu : In previous versions of BHR the users forced to click an
item on Windows System Tray Popup Menu to hide it.
This issue has been fixed in this version. So now as usual users may click
outside of the menu to hide it.
*Program Uninstall : In previous visions of BHR if the user
forgets to exit from BHR before uninstalling it, the BHR exe file is remain
in there Hard Drive even after the Un-Installation. This problem has been
fixed in this version. So now if the user
attempt to Uninstall the program while it is running, a message box will be
shown to remind the user to exit the
program before Uninstalling it.
>A small Text Link has been
created to insert "about:blank" from with in the program.
>Startup Programs Manager has
been completely redesigned for ease of use.
>Few visual Enhancements to the
program Windows & Menus.
4.1 - >A New MSN Style Notification Window for
"Automatic Retaliation" Function.
>Startup Manager with more functionalities.
4.5 - > Hosts File Guard with Host File Manager
>'Remember this decision' option for each IE page change alerter window.
>Enhanced IE Plus offers removal of unwanted IE Toolbars, Browser Extensions and Emergency Repair functions.
>Selective Cookie cleaner.
>Enhanced Startup Manager integrated with www.processlibrary.com to offer a comprehensive amount of information about
each startup items.
>Startup manager now lists all the services, win.ini, Winlogon & Userinit entries which are set to start automatically with Windows.
>Enhanced User Interface. Back to Main
4.5.0.471 - See what's New Back to Main
Hijacks and advertiser software take control of a users Internet Browser, for example Internet Explorer, Netscape, Opera. Brower Hijacks can take users to websites they did not request. You could enter one address and be taken to something completely different. If a browser becomes hijacked, a user may find they get large numbers of pop-up windows, re-directed to search websites, re-directed to online stores or may not be able to browse the internet at all. By clicking on the content in pop-ups or links, the website can use flaws in the design of the internet browser to install more spyware. Any adÆs relating to spyware removal or free tests should be closed by pressing the ôXö in the top right corner of the window. Not by any buttons contained within the advertisement as this is a common way of tricking people into allowing more spyware to be installed. In many cases, the hijack will also change a userÆs homepage or add links to favorites which return, if deleted, after a reboot of the computer.
Quoted from :
westnet.com
Back
to Main
Browser Helper Objects (BHO's) automatically run when you load Internet Explorer. Their location is stored in the registry. Internet Explorer does this purposely as most BHO's can be useful, like the Yahoo! companion. They give developers the chance to extend the browser which are suppose to 'help' the web experience for the user. But like most good things, people abuse this.
'Bad' BHO's can be a type of Spyware, and some abusers like AdBreak frequently display obscene pornographic pop-up adverts while surfing the net - this is completely unacceptable. Others could potentially do absolutely anything, they can be poorly programmed, and as they tend not to care about the well-being of your computer. They're scum - which gives them the right not to care. Therefore, if you've noticed that Explorer keeps crashing for so unknown reason, it's quite likely that you have BHO('s) running on your computer.
Unfortunately Windows doesn't make it easy to
detect and remove BHO's manually
Back
to Main
The Hosts file is like an Address Book. When we
want to make a telephone call we refer to the Telephone number of the Destine in
our address book. like that when you type an address in your browser the
computer refers to the Hosts file to see if you have the IP address of that
site.
if there is no entry for that address in your Hosts file the computer asks your
ISP (Internet Service Provider) Computer for the IP address before
visit that site.
The windows standard Host Name Resolution Method is as follows:
Local Host Name > Hosts File > DNS Server > NetBIOS Name Server > Broadcast >
LMHOSTS File
The Hosts file in Windows is a text file that contains IP Addresses separated by
at least one space and the Domain name.
Each entry is recorded on its own line. By default, the host name '127.0.0.1
localhost' is an entry in the Hosts file. Entry's are read in a linear fashion.
The most commonly used names should be near the beginning of the file.
Example of a new entry would be : 216.109.118.69
www.google.com
Browser Hijackers take advantage of your host file
by writing his IP Address in your Hosts file
to a Host name you frequently use.
i.e. imaging that a Hijacker wanted to make it so that if you typed in
www.google.com, instead of going to Google we would go to Hijacker specified
page.
So when you feel that youÆre under a hijack, The Hosts file is one of the main
place to look for.
Host file hijack recovery
The only entry in a normal Hosts file should be '127.0.0.1 localhost'
Eliminate any foreign entries using BHR Host File manager or you can click
'Restore' to restore an original copy of the Hosts File.
Note that in some cases, other programs such as Norton's email protection
software may insert their own entries into the Hosts file. So you should not
remove these entries.
Also if your in a computer that is part of a Network, then before doing changes
to the Hosts file you must contact your administrator. Because In network
environment there might me entries in Hosts which are created by Administrators.
Block Spyware or Ad Networks - This reason is becoming a very popular
reason to use the HOSTS file. By adding lists of known ad network and Spyware
sites into your Hosts file and mapping the domain names to the 127.0.0.1, which
is an IP address that always points back to your own machine, you will block
these sites from being able to be reached. This has two benefits; one being that
it can make your browsing speed up as you no longer have to wait while you
download ads from ad network sites and because your browsing will be more secure
as you will not be able to reach known malicious sites.
NOTE:- When creating entries in the hosts file there must be at least one
space between the IP address and the domain name. You should not use any web
notations such as \, /, or http://. You can disable a specific entry by putting
a # sign in front of it.
For example:
216.109.118.69 www.google.com
* You can find many good articles about Host file on the internet. Also you can
download and install a customized Host file which blocks spyware or Ad Networks.
Back to Main
Startup Programs
Many programs that you install are automatically run when you start your computer and load Windows. For the majority of cases, this type of behavior is fine. Unfortunately, there are programs that are not legitimate, such as spyware and potentially unwanted software, that load in this manner as well. It is therefore important that you regularly check for Startup Programs.
BHR Startup Programs shows the complete list of startup programs / Files that are collected from the following locations.
C:\Documents and Settings\All Users\Start
Menu\Programs\Startup
C:\Documents and Settings\LoginName\Start Menu\Programs\Startup
C:\windows\start menu\programs\startup
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Windows NT Services, win.ini, system.ini, Winlogon & Userinit
win.ini
Any programs listed after the run= or load= in the win.ini file will run when
Windows starts. This run= statement was used with older versions of Windows but
for backwards compatibility, this feature still exists. Most programs today do
not use this setting, and if you do not use older programs these entries should
not exist. The load= statement was used to load drivers for your hardware but no
longer used today.
system.ini
The shell = statement in the system.ini [boot] section is used to designate
which program would act as the shell for the operating system. The Shell is the
program that would load your desktop, handle window management, and allow the
user to interact with the system. Any program listed after the shell statement
is run when Windows starts, and acts as the default shell. There were some
programs that acted as valid shell replacements, but they are generally no
longer used. It is also possible to list other programs that run as Windows
loads in the same Shell = line, such as Shell=explorer.exe spyware.exe. This
line will make both programs run when Windows starts.
⌐ Zamaan's Software 2004 - 2006. Back to Main
Please send Product related questions, comments, suggestions etc. to
support@zamaansoft.com
We always well come your comments to improve this
freeware product.
Also you can visit our website (http://www.zamaansoft.com) to download more freeware.
When visiting the site please consider making a donation through the secure payment system available via our website.
Start Page
This is the URL of the web page that
will be displayed when a new Internet Explorer browser window is opened.
Search Page
This is the default search engine when you click the Search button in Internet
Explorer
Default Page URL
The is the default web page URL used by
Internet Explorer.
Local Page
This is the page that will load if a
website is not found when entering it in the Internet Explorer address bar.
Search Bar
This is the page that will be displayed when you click on the Search icon in
Internet Explorer. The Search bar provides the ability to store detailed
information.
Start Page
This is the page that will be displayed when a new browser window of Internet
Explorer is opened.
Search Page
This is the default search engine when
you click the Search button in Internet Explorer. This is for all users of this
computer.
Default Page URL
The is the default web page URL used by
Internet Explorer.
Local Page
This is the page that will load if a
website is not found when entering it in the Internet Explorer address bar.
Search Bar
This is the page that will be displayed
when you click on the Search icon in Internet Explorer. The Search bar provides
the ability to store detailed information.
Default Search URL
This is the page that will be displayed
when Internet Explorer attempts to perform a search.
Customize Search
This is the page that is displayed in
the Internet Explorer search box when you run a customized search.
Search Assistant
This is the Search Assistant page
displayed by Internet Explorer and is located located inside the Search bar.
Customize Search
This is the page that is displayed in
the Internet Explorer search box when you run a customized search. The Search
Assistant provides users with a single, unified search across different types of
searches.
Search Assistant
This is the Search Assistant page
displayed by Internet Explorer. The Search Assistant provides users with a
single, unified search across different types of searches.
Search URL
Search URLs are a convenient way to use
different Internet search engines. For example, you might have a search URL
called news that searches online newsgroups. If you type in a keword(s) in the
address bar to automatically search online newsgroups for all articles related
to these keywords.
Zamaan's Software Website Back to Main