Please make sure to finish all your posts before this time. The downtime should only last for a few minutes.
How to remove Delta-Homes
dvk-ru1 last edited by
- Control Panel, Remove program: Delta Toolbar
- Opera menu, Extensions: remove Delta Toolbar or Delta Search (if any).
- Opera search engines, opera://settings/searchEngines: remove Delta Search (if any).
- Opera launcher shortcut: remove any suspicious Delta-related command line options.
You can also use Avast! Browser Cleanup, from http://www.avast.com/en-gb/store
al3xutzu69 last edited by
I tryed everything, but still nothing. Any help?
davehawley last edited by
If you've checked the four things already mentioned, the obvious answer is that it's just set itself as the browser start page.
Check under Settings>On Startup.
joshl last edited by
And check your system for adware.
vichy41 last edited by
You have to follow the same steps as to clean IE:
- Right click on the Opera icon -> go to the "Properties"
- On the "Shortcut" tab look up to the "Target" line
- Change it from what you have there to : "C:\Program Files (x86)\Opera\launcher.exe"
- Click "Ok"
- Restart the Browser.
I got rid of that malware by doing this.
fangus last edited by
Thank you vichy41!
blackbird71 last edited by
@vichy41 It helped, thank you very much. But will it remove it from system, or just change starting web?
I couldn't find it in system, so I tried your idea
A lot of these kinds of adware/malware, among other things they might do, will attach a URL link to the command line of the browser shortcut so that when the browser is started, it opens a window (perhaps even fashioned like a pop-up) to the adware's site. In those cases, if any adware that manages to get itself installed onto a system gets removed by the user, the browser will still connect to the adware's site. Net result: in removing adware, you always have to be sure any system infection is removed as well as any alterations made to the browser shortcut command line.
I normally recommend taking the affected browser(s) offline, removing any infection(s), then manually checking and cleaning up any shortcut alterations before taking the affected browser(s) back on line. Depending on the nature of the adware/malware exploit, simply visiting their site via the corrupted shortcut has the potential to reinfect a disinfected system - so you want to get both avenues (system infection and altered shortcut) cleaned up before reusing the affected browser.
joshl last edited by
Some antimalware seems to watch and care for start-up items...
wniallw last edited by
I'm having this problem right now.. I have done all the steps, and the solution to go into the properties of Opera, I do exactly as it says and it tells me that what you have given me to put into the Target box is not valid.. any ideas? Thanks
sgunhouse Moderator last edited by
The point is to remove anything after ...launcher.exe" from the commandline. The exact path to launcher.exe (the part where the dots are) depends on your language and version of Windows. (Yes, leave the quote if you have it.)
If you have a 32-bit version of Windows, there will not be any " (x86)" in your path. If you have a non-English version of Windows, then the folder may not be named "Program Files". All that matters is removing the part at the end.