Donna,your post and the accompaning yahoo article is the best explanation Iv seen so far addressing the internet nightmare and how to avoid it.Thank you.I have had the need to use the tools listed on this site after being attacked and I do appreciate them but knowing how to avoid the attack is much better.Thank's again to you and to all the Moderators for being here for us. > )))*>
The ongoing Internet-security freakout for anybody using Windows keeps getting worse. Every other week yet another part of the online world gets a warning label slapped on it -- downloads, e-mail attachments, instant-messaging file transfers and now Web pages themselves.
"Browser hijacking" is as bad as it gets: Like the Blaster worm, this form of trickery can take over your software silently and invisibly.
Typically, users discover what has happened only after the actual hijacking: Their Internet Explorer home page and Web searches have been switched to strange sites, a flock of pop-up windows follows them around, their lists of favorite sites have become a catalogue of porn purveyors -- and none of these changes can be undone without tedious debugging.
These attacks differ from "spyware" invasions, which can have similar effects, in that victims never took the conscious step of downloading a program and then running its installer.
Read the steps to avoid browser hijacking at Yahoo News!

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic