One can also check their hosts file.  Normally it should contain only one host,
127.0.0.1, what is called the local host.

You can also make the hosts file read only, that should prevent most things
from being able to update it.

There is some good information on this at
http://www.mvps.org/winhelp2002/hosts.htm

Marshall

David Bearrow wrote:

> At 11:19 PM 11/10/04, you wrote:
> >If the targeted computer has not been updated with security patches, the
> >virus will exploit an ActiveX control to run a script. The script will
> >rewrite the computer's HOSTS file, causing all connections to certain
> >banks to be redirected to the scammer's site. Unfortunately, since Outlook
> >and Outlook Express enable the preview pane by default, all you have to do
> >is click the email for it to launch the script. You don't even have to
> >open it. Just attempting to delete the email may cause it to be activated.
>
> Another thing you can do is go here
> http://www.safer-networking.org/en/index.html and download a copy of
> Spybot, run advanced Spybot, click tools, then host, then add the Spybot
> host list. Then go here http://www.javacoolsoftware.com/spywareblaster.html
> and download spyware blaster. Run it. Go to tools, host safe. Then backup
> your host file! Now run Spybot at least once a week. Spybot will warn you
> if someone has tampered with your host file.
>
> David Bearrow
>
> --
> The Silver List is a moderated forum for discussing Colloidal Silver.
>
> Instructions for unsubscribing are posted at: http://silverlist.org
>
> To post, address your message to: silver-list@eskimo.com
> Silver List archive: http://escribe.com/health/thesilverlist/index.html
>
> Address Off-Topic messages to: silver-off-topic-l...@eskimo.com
> OT Archive: http://escribe.com/health/silverofftopiclist/index.html
>
> List maintainer: Mike Devour <mdev...@eskimo.com>