Thank you, magna86, I hope this will be instructive for those that read this thread,
Given that BHOs can do absolutely anything to your system, and (b) they are often installed without your knowledge, there is a distinct potential for abuse by vendors. The problem is, until now you had no way of knowing which BHOs are on your machine, who put them there, and what they do,
polonus