How to remove (uninstall)

Editmysite[.]com was a platphorm used by designers to create new websites or change the old one. If you try to load help tutorial (help[.]editmysite[.]com) from this domain now, you only see an inactive ssl certificate warning. It looks like site owners stop to support their website and scammers use it for their aims. Subdomain is a part of marketing network that shows pop-ups in the system. In the article, we will tell you how to remove redirects from the computer and the browsers^ Google Chrome, IE, Mozilla Firefox, Opera and Safari.

Ads on the Web have gone pretty annoying in recent years, and people are starting to tolerate it. Ads are all around – starting from well-known social networks and ending with deserted portals. We remember a time when you could see five pop-ups each day, but now there is a dozen per each webpage. People did finally find out that the Net is the plentiful place to find new customers, and web-criminals thought in the same fashion. They've created questionable utilities to sneak into the PC so that it will show you unwanted, fraud ads. One of those tools simply took over your computer, and it's called adware. Ads by adware program are not for selling anything – they’re just a bait for trustful users. If you're clicking on one of those banners, you will appear on a scammers' page, where you cannot get any real deal. Usually, there are no goods at all, apart from an offer to get a miraculous toll-free utility, which will screw up your machine and show a bunch of pop-ups to you. If you want to put an end to this – on our page you’ll find everything you need to delete it.


We're talking about an adware, made with the only aim: to display pop-ups to users. It’s not even a complete utility, since it’s just a simple piece of code, capable of switching the browser settings and appending new entries to the system registry. Here's a thorough report of the common infection method:

  • During the installing process of adware, you have to opt between recommended method and the method for expert users. The first option is already selected, and sometimes you cannot select another one, since it’s unreachable. By marking the recommended option operator accepts to install each hazardous utility from the bundle, and the "not recommended" option allows you choose the useful utility and decline the rest. If you've checked the second manner and removed additional suggestions – you wouldn’t be here. On the base of this, we suppose that you didn’t spot that box. In your case, the installation ran on and started functioning.
  • The basic malware’s job is complete after it changes the controls of your browser, so it only has to take some safety measures. It inserts new lines into the registry and creates system tasks to prevent you from resetting browser controls.
  • The first thing that advertising utility does after crawling onto the machine is getting your browser under complete control. It switches the default homepage and search engine and substitutes them with the swindlers' fake site. Then you won't see real search results – you’ll get what scammers allow you to see and to click.

That’s what adware infects the machine. After the fifth turn, is completely ineffective, as all main job, meaning the display of pop-ups, gets done by scammers' website. It is somehow familiar to your search engine, and customer can enter anything in the search bar, but there won’t be any proper results. Hackers use a unpaid feature, called Google Custom Search Engine to put their adware to work, and its fundamental feature is to limit the search area to a few websites. This service is used to display you fraud search results and make customers think that they’re real.

How to protect the system

The security of user's system is such a goal that can't be achieved with the help of single super-measure. Without a doubt, the antivirus will help a lot, yet you there is a great job to do besides it. We’ll list these measures below.

  • You better don't download gratis programs, but if you want to install it anyway – download it from an official website.
  • Don’t cut shut the AV program off under no circumstances. In particular if a suspicious site suggests you to disable it.
  • Upgrade your tools in time, especially, your OS and your antiviral tool. It will decrease the odds of infection.
  • Don’t click on annoying banners, and do not attend strange pages. we mean the ones which distribute counterfeit tools and video content, 18+ content, and other suchlike stuff.

The list above may assist you to avoid adware and most of the other viruses. Still, certain examples of adware can get into the OS via other techniques, and you have to purchase a high-quality antivirus to eliminate them.

Methods to remove

Method 1. Use special removal software

Method 2. Remove manually

Step 1. Uninstall the unfamiliar programs from Control Panel

Step 2. Check hosts file

Step 3. Remove from the browser (Google Chrome/Mozilla Firefox/IE/Opera/Safari/Edge)


If you are MAC user, follow this guide How to remove virus from MAC


As with the removal of any other malware, you have a choice between two proven options. It can be the deletion in hand mode, where you'll have to perform everything by yourself, or an automatic method that will save you time and efforts. Either of them is totally safe and effective, but you need to learn more about them before you choose. In the first place, if you're going to eliminate adware manually – you won’t need to buy any antiviruses. You should understand that if you have some other dangerous programs to get rid of except – it might be not so easy. The automatic technique includes the download of a decent antivirus. It's called Spyhunter. We propose you to install it as it’s not only lightweight, tried, reliable and swift but has lots of other conveniences. Its viral database is updated each day so that no adware could sneak into the machine unnoticed. And it comes at a democratic price! You don’t need to make your decision as you read this, and if there are any concerns about its potential – just install a gratis trial version. removal tool

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

bwd  Instructions 1/2  fwd

Instructions for manual deletion

Step 1. Uninstall software from the system

Windows 7

1. Uninstall the unfamiliar programs from Control Panel

  • Start
  • Control Panel
  • Programs
  • Programs and Features
  • Uninstall a program
  • Select a program and press Uninstall

2. Check the following folders for the suspicious elements

  • C:\Program Files\
  • C:\ProgramData\
  • C:\Users\YOUR_USER\AppData\Roaming\
  • C:\Users\YOUR_USER\AppData\Local\

3. Clean registry:

  • Click Start
  • Type Regedit.exe
  • Search for "" and delete these elements


bwd  Instructions 1/2  fwd

Windows 10

1. On the field Search Windows type 'Control Panel'

2. Click Uninstall a program

3. Select the program and press Uninstall


Windows 8

1. Point to the upper-right corner of the screen, move the mouse pointer down, and tap Search.

2. Enter control panel in the search box, and then click Control Panel.

3. Under View by:, select Large Icons, and then click Programs and features.

4. Click the program, and then click Uninstall.

5. Follow the instructions on the screen.

6. Delete unfamiliar programs from Control Panel

  • Start
  • Control Panel
  • Programs
  • Programs and Features
  • Uninstall a program
  • Select a program and press Uninstall

7. Remove elements like on Win7.


Step 2. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 3. Remove from the browser

Internet Explorer

Step 1. Disable strange extensions:

  • Tools
  • Manage add-ons
  • Remove

Step 2.Change homepage:

  • Tools
  • Internet Options
  • General
  • Home page
  • Put “about:blank”

Step 3. Change new tab page:

  • Tools
  • Internet Options
  • General
  • Tabs


Google Chrome

Step 1. Remove unfamiliar add-on:

  • Customize and Control Google Chrome
  • More Tools
  • Extensions
  • Remove add-on

Step 2. Change homepage:

  • Customize and Control Google Chrome
  • Settings
  • Open a specific page or set of pages
  • Delete all specific pages


Mozilla Firefox

Step 1. Delete suspicious extensions:

  • Open menu
  • Add-ons
  • Extensions
  • Remove add-on

Step 2. Change homepage:

  • Open menu
  • Options
  • Home
  • Choose “Blank page” into Homepage and new windows


Opera browser

Step 1. Disable strange add-ons:

  • Open Opera;
  • Customize and Control Opera;
  • Extensions;
  • Choose add-on and press button "Disable"

Step 2. Change homepage:

  • Open Opera browser;
  • Customize and Control Opera;
  • Settings;
  • On Startup;
  • Open a specific page or set of pages;
  • Press button "Add a new page" and change Homepage to your favorite one.



Step 1. Start Safari browser

Step 2. Display a menu of General Safari Settings

Step 3. Reset Safari...

Step 4. Press "Reset"


Microsoft Edge

Step 1. Delete the suspicious extensions.

  • Menu
  • Extensions
  • Choose unfamiliar extension
  • Press Uninstall

Step 2. Change homepage.

  • Go to the website of the search engine you want
  • Select More actions
  • Settings
  • View advanced settings
  • Change search engine
  • Select search engine you want and Set as default


Video how to reset browser and remove all extensions


This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.