|The one method is factory restore, or complete operating system reinstall. |
Malicious software writers are very quick to adapt their coding to circumvent any security measures provided by any one or a number of security applications.
The reason there is a process of scanning and rescanning an infected system is not only for removal but also analysis. If there is any remnant of malicious software left behind it is possible to become reinfected and not even know it.
The infection can hide and infect an entire network, make your PC part of a botnet, send spam emails, copy confidential files to an unknown server, keylog key strokes to steal credit card information and passwords, hold your PC to ransom, screen capture your PC and even watch you through a webcam while you're seated in front of your computer.
Unfortunately there is no third party holy grail which can fix everything all of the time.
In the case of a browser redirect it might be a simple fix, but it also could be indicative of more hidden nasties that may have come bundled with it.
I hope you can understand why most security experts request logs for analysis. It is not not just the obvious they endeavour to correct, the hidden also need dealing with too.
The peace of mind that is offered when told by a security expert that your PC has a clean bill of health must be worth the effort?
message edited by btk1w1