how can i remove the malware "text enhance" that pops up in internet explorer?/
Abuse history
Answer
Abuse history
Answer
http://www.youtube.com/watch?v=bp0O4dDIeMc
Abuse history
Hi,
I would suggest you to download and run the latest Microsoft Safety Scanner on your computer and check if it helps:
http://www.microsoft.com/security/scanner/en-us/default.aspx
Note: Any data files that are infected may only be cleaned by deleting the file entirely, which means there is a potential for data loss.
Abuse history
how can i remove the malware "text enhance" that pops up in internet explorer?/
Hi,
Are you referring to underlined words with little pop-up ads?
First try the procedure here:
What the Tech- Disable Vibrant Ads
http://www.whatthetech.com/2010/09/15/how-to-disable-vibrant-ads
Another option:
Internet Options> Security> Restricted Sites> Sites, place these URLs in Restricted Sites:
*.us.intellitxt.com
*.vibrantmedia.com
*.cdn.optmd.com
*.txtsrv.com
Another option:
Add an entry in the HOSTS file.
Make sure that Windows is showing hidden files and is not hiding file extensions for known file types (access these settings from Control Panel> Folder Options> View) then find the HOSTS file
at [C:\Windows\System32\Drivers\etc] Open the HOSTS file with notepad. Add these lines, each on a separate line, just below "127.0.0.1 localhost" and "::1 localhost"
127.0.0.1 us.intellitxt.com
127.0.0.1 vibrantmedia.com
127.0.0.1 cdn.optmd.com
127.0.0.1 txtsrv.com
Click on File> Save and close the HOSTS file.
More on the HOSTS file at
http://mvps.org/winhelp2002/hosts.htm and
http://www.accs-net.com/hosts/
This (frequently updated) HOSTS file will block many ads *and* sites hosting malicious software. It will occasionally block a site you want to access- read the article so that you know how to temporarily disable it.
http://mvps.org/winhelp2002/hosts.htm
Hope this helps,
Don
Abuse history
Answer
Abuse history
Go to Tools > Tracking Protection
Select Tracking Protection then select "Your Personalized List" on the right and make sure it's enabled
Click "Settings", this will open a new window "Personalized Tracking Protection"
In the new window click the radio button "Choose content to block or allow"
Scroll down the list, you should see "txtsrv.com", click on that to select it then click on the "Block"
button.
Then click "Ok"
I'm still working on Firefox to get this disabled, will share if I figure it out.
I also have the free Avast Antivirus and have added textsrv.com to the blocked list. Not sure if that does
anything other than block that specific webpage though as I still have the Text Enhance links on Firefox.
Abuse history
Abuse history
Abuse history
I disabled all addons and then it was gone. I reenabled one by one and find out that it was this addon that had the "text-enhance", now I have all enabled again besides this one and everything works great!
Name: Shockwave Flash Object
Publisher: Adobe Systems Incorporated
Type: ActiveX Control
Version: 11.2.202.233
File date:
Date last accessed: den 20 april 2012, 10:46
Class ID: {D27CDB6E-AE6D-11CF-96B8-444553540000}
Use count: 1460552
Block count: 176
File: Flash32_11_2_202_233.ocx
Folder: C:\Windows\System32\Macromed\Flash
Abuse history
Name: Shockwave Flash Object
Publisher: Adobe Systems Incorporated
Type: ActiveX Control
Hi,
That's the Flash Player Plugin and I am surprised that disabling it stopped the Text Enhance pop-ups.
I recommend that you try uninstalling/reinstalling Flash Player.
Run the uninstaller in Step #5 here
http://kb2.adobe.com/cps/191/tn_19166.html#main_Uninstall_the_older_Flash_Player_version
Check security settings and follow other instructions here
http://kb2.adobe.com/cps/191/tn_19166.html#main_Download_and_install_the_latest_Flash_Player_version
*except* download the Flash Player installer then right-click it and run as administrator. Don't simply run the installer from the website.
If Text Enhance returns, work through add-ons troubleshooting again. See if you get the same results.
Don
Abuse history
* Please try a lower page number.
* Please enter only numbers.


