Toolbar boots out spies and pests

Yahoo has released a version of its internet-services toolbar that removes spyware and adware.

Yahoo has released a version of its internet-services toolbar that removes spyware and adware.

As users surf the web, such programs download to their machines without their consent or knowledge, tracking their web usage, launching pop-up ads or undertaking other undesirable activities.

When introduced last May, Yahoo's enhanced toolbar was criticised for failing to scan for adware by default - users had to enable the option. The new version default-scans for adware, spyware and other intrusive and stealthy software, such as cookie trackers.

Although many people regard spyware and adware as equally obnoxious, some point out that spyware is more intrusive and potentially dangerous. The Yahoo toolbar defines spyware as programs that track how you use your computer or surf online without your permission and adware as launchers of pop-up and pop-under ads.

After scanning for such programs, the toolbar lists those it finds and suggests which should be removed as potentially malicious and harmful, and which should be further evaluated. The scanning software comes from Pest Patrol.

The enhanced Yahoo toolbar can be downloaded free at It also contains a search engine box, a button for blocking pop-up ads and shortcuts to a variety of Yahoo internet services such as e-mail, calendar, notepad, games and the Launch online music section of Yahoo's portal.

Juan Carlos Perez writes for IDG



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT strategy

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...