Your Ad Here
You have encountered malware (virus / trojan / worm) that can not be lost with AntiVirus famous?
Perhaps the most computer users have problems, but according to the observations the author over the years, more computer users will not realize the existence of malware (virus / trojan / worm) in the engine computer, especially a trojan go through 'the door' at the back computer users, or viruses that are not too dangerous, in which the existence and actions of viruses that do not impact on the overall computer system.
Computer Operations Sitem if you are a Windows, a time you may find malware that is very difficult to not be deleted even in the environment due to the Normal Windows virus has been settled (resident) memory on your computer.

So what solution? Below are the options the solution that you can select as you wish / you need:

1. Remove malware from the Windows environment in Safe Mode with the 'equipment war' you prefer, eg ANSAV.EXE
Manually, try to turn off running Suspicious services were foreign to you and you do not need through the MMC - service.msc or through the service configuration in the Windows Control Panel.
2. If No. 1 above fails, the malware is still resident in memory even though the Windows in Safe Mode even though the situation as an effort from the creator of the virus to make the process pembasmiannya, then you can do havoc malware manually without any tool support. You can create REPAIR.INF file and / or own REPAIR.REG to delete and / or restore the registry settings-settings that have been modified by the virus, by adjusting the pattern of attacks carried out by a virus, so that the content file REPAIR.INF and REPAIR.REG can be different in each case of virus attack. You can learn eradication of the virus manually vaksin.com or from sites or a trusted computer security from computer security e-books. Your hard work is needed in learning about malware (existence, the pattern of life, attack patterns, and habits) and the operating system on the computer itself, especially in the Windows System hierarchy and hierarchy in the Windows Registry, as well as software-software that is used most often by the general public who often used the virus to unleash aksinya through social engineering techniques such as virus forgery icons with icons Microsoft Word, etc.. Hence, it is expected that skill and you will be feeling the presence of serious Threats such virus / trojan / worm on your computer or computer network.
3. Use the Live-CD as a means to combat malware manually. You can use Linux Live-CD or the Windows Live-CD. (highly recommended)
4. Create your own Live-CD with applications Bart's PE Builder (Bart's PE Builder is used to create a bootable Window CD-Rom/DVD Windows XP or Windows Server 2003) or you can Create a Bootable USB Flash Disk with tools such Flashboot (FlashBoot is a tool to create a Bootable USB Flash Disks) or other similar application integration with your favorite portable AntiVirus or made your own (highly recommended)
5. You can try to use Portable Anti Virus you have copykan (burn) on the CD or the vendor has provided a Flash Disk that already integrate Portable Anti Virus, or if not, you can use the u3 Smart Drive where you can install Portable Portable AntiVirus u3 in in it. On a normal Flash Disk, you can try to install the application from portableapps.com (recommended)
6. If your computer has BIOS Booting the computer's USB Removable Flash Disk Drives kind, you can use your USB Flash Disk as the Bootable Media, which has also been appointed as the media you for Autorun / Non-Portable Anti Virus Autorun (recommended).
7. Hardisk you loose the infected computer virus, and connect with the slot machine hardisk adjuvant is (as can be master or slave), the last scan your hard drives that have been infected with the Anti Virus from your computer's maid, the other way, you do not need to remove hardisk virus infected, but you live scan of the computer helpmate through the computer network connection. The most simple technique you are using the Cross-Link (connect 2 PC via cable). However, you should be careful when using a computer network, as many viruses do not only attack a single (stand-alone) PC units only, but at the same time in a computer network around them.

Note:

* Cakram Digital Media such as CD + R / DVD + R is suggested to be the author of eradication of the virus as the USB Flash Disk CD + R / DVD + R is Read-Only, so the virus can not delete / rename me-all the data in .
* To avoid blocking the application by Anti Virus virus attacker, before burning (burning) Anti Virus Portable media to CD + R / DVD + R, make sure you have me rename executable files Anti Virusnya eg ANSAV.EXE become 4N54V ~ ~. EXE .
* Turn off System Restore first
* Disconnect the relationship with the Internet and will be better also with the network (when the computer fell ill virus in a computer network)
* When the Master File has been virus activity and can be stopped / disabled, you can remove the children of the virus results
* Do not forget to backup your system files and all the databases on your Windows Registry (Export All Keys into single big. Reg file). protection registry backup file with compression and password. You can restore the file if the one in the Windows registry when you experience data corruption.

Comment

THERE ARE 0 COMMENTS FOR THIS POST

Post a Comment