Well I appreciate your kind words. It brings a smile to my face when someone takes time out of their day to relay kind thoughts and words for something I have helped with.
As for where you got those spyware/adware infections, there could have been many different places. Some spyware is installed with a program you have installed by choice. You just weren't informed about the fact that by installing this certain software (usually something free) you would also be installing certain forms of adware/spyware (nice of them huh). A lot of times if you read the "fine print" in the EULA when installing something it will tell you about what else you are installing. Not always though. If you ever have any questions about a certain program or file you can always ask us here or doing a google search is always informative. Also if your wife needs help with her work pc, you know which direction to point her in. Check out my website, you can find the link in my signature, there's lots of information about spyware and links to other useful sites.
Congratulations! Your system is CLEAN
How do you prevent spyware from being installed again? We strongly recommend installing
SpywareBlaster (it's free for personal use)
Click Here.
Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests.
Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
Restrict the actions of potentially dangerous sites in Internet Explorer.
Consumes no system resources.
Download, run, check for updates, download updates, select all, protect against checked. All done. Check for updates every couple of weeks. If you have any errors running the program like a missing file see the link at the bottom of the javacool page.
It's also very important to keep your system up to date to avoid unnecessary security risks.
Click Here to make sure that you have the latest patches for Windows.
These next two steps are optional, but will provide the greatest protection.
1. Use ANY browser besides Internet Explorer, almost every exploit is crafted to take advantage of an IE weakness. We usually recommend FireFox
.
2. Install
Sun's Java. It's much more secure than Microsoft's Java Virtual Machine .
It's okay to delete the Hijack This folder if everything is working okay.
After doing all these, your system will be thoroughly protected from future threats.
Browse safely
-=jonnyrotten=-