-
Norton is an anti-virus software developed based on server and LAN users, because the server may cause losses to users if they delete files, so many viruses can only be isolated, which will also make some viruses unable to kill, not completely killed. Now that you've quarantined, it means that the security threat has been eliminated, and if you want to delete it, you can wait for Norton to upgrade.
Also, it's normal for ewido to be undetectable, because the virus has already been placed in Norton's quarantine area, and any software will automatically recognize it and won't scan it.
Do you understand?
-
Can you go into safe mode?
Go to safe mode and run WinRAR (a compression software), why should I use it? Because it's better to browse folders than Explorer - at least, it can go no matter how hidden the files are, or folders that can't be accessed by conventional methods
To get back to the point, find this file with winrar in safe mode, move it to the desktop, and if it won't move, press del to delete it, and if it does, move it to the desktop, and then package it and send it to me, and also send it to Norton service to report the virus.
And then. Reboot.
My e-mail: feng
If you can't delete the safe mode... Can you find the pwin98 disc version? Load it down and engrave a disk, use it to boot up the computer, and do as described above.
If you can't load it, there's one last method: reload the system.
Give a suggestion: install the system, install anti-virus software, surf the Internet but don't open the browser, upgrade the virus database, this is the first step; Step 2: Install ShadowUser....
Viruses are always hard to prevent, and with shadowuser, after starting the computer, the write operations of the drive under its protection are ineffective - viruses, trojans, and rogue software are no exception.
My computer has been poisoned many times, but it is fine after restarting, maybe you don't believe it, but you might as well give it a try, it really works.
-
It is recommended to use antivirus software to enter safe mode to scan and kill
When the boot is on, after the system self-test is completed, press F8 continuously until the "Startup Menu" appears, use the cursor to select, select the first item, and press the Enter key to enter.
After entering, click "Yes" to work in safe mode, at this time, you can start the antivirus software as normal.
If the above does not work, it is recommended to use Kaspersky to enter safe mode to scan and kill
Free antivirus: Code Shipping.
Kaspersky (genuine):
It can be upgraded for free for half a year.
-
Any poison found by Norton does not kill just quarantine.
-
Under which folder? Just delete one. dll is no, he automatically runs this again. dll.
Way. I don't know
-
.DLL virus, if you can't solve it, I recommend that you still reinstall the system to save the trouble, and then get a ghost backup, and the next time you restore it, it will be done in a few minutes. The most important thing about online security is not to know how to delete it after being poisoned, but to have a good online habit.
-
I think there should be a program that automatically creates the file in your machine, and every time you delete it, it creates it again, so either try it with a Trojan scavenger, or manually find the program that created the dll file and delete it, so you can do it.
-
Upgrade the virus database to completely eliminate viruses, use Optimizer to check the startup items, and remove suspicious startup programs.
-
viruses cause loss of other system files, as well as theft of online game accounts. Now use Rising Free Antivirus for a full scan.
-
To deal with Trojans, I recommend a good tool for you, 360 Security Guard has created the "Trojan Firewall" function, relying on preemptive detection and cloud identification, it can comprehensively and intelligently intercept all kinds of Trojans and protect the user's account, privacy and other important information. At present, the threat of Trojans has far exceeded that of viruses, and 360 Security Guard uses cloud security technology to intercept and kill Trojans in terms of effect, speed and professionalism, which can effectively prevent personal data and privacy from being stolen by Trojans, and is known as "the first choice to prevent Trojans".
-
360 can't be killed, it is recommended to use Jinshan Poison Bully.
-
Hurry up and kill it, it's very powerful, I got it.
-
You can use this software to deal with it:
Follow the path provided by your antivirus software and write it down.
Click: Laughing Collapse Process Right-click the process module information on the right side one by one, carefully check which processes this dll has been inserted into (especially those system processes), try to use the "Force Release" on the right to try, can you release this DLL file from the process (you may encounter the phenomenon that the machine will restart when the bridge is forcibly released in a certain process).
If it doesn't work, run regsvr32 to deregister it from the system.
2.In the column on the left side of the Ice Blade, go directly to the folder where the file is located through "File" and find the file (the Trojan file is generally under system32).
3.Sort the files in this folder by clicking the "Created time" button, and carefully review all the files that are on the same day as this file (but not all of them are virus files like it, you need to judge). Right-click on them to delete them one by one.
5.Restart the computer and this thing should be cleared.
-
This is the Viking (some translated as Weijin) virus, Viking spreads through QQ, malicious balance and defeat**, and infects files, and the file is the virus itself. The virus automatically releases files named 'and tries to infect Windows executables.' At the same time, leave a file named " in the infected directory, and it will also infect your QQ, automatically **QQ virus.
At present, the Weijin worm is ravaging the Internet, 9,000 users, and more than 10 enterprises have been attacked!
Because you reinstalled the system, this file would not theoretically exist. Why does it appear so often? It has as many as n variants, which one of you is it? How do I remove the virus permanently?
With so many questions, I'm here to help you answer them.
It is a virus that will be cross-infected, infecting the executable file, and the installer of the software is an executable file, so as soon as you install it, Ma Ku Jingshang is infected with the virus again, or Li is ordered to enter the directory it infects, so that your fault ......
The virus is a worm that infects executable files, so as soon as you have it on your computer. exe files, it will be infected repeatedly!!
The solution This virus is too arrogant and has too much reputation, and general antivirus software can detect and kill it, which is the problem of whether it is clean or not.
Note: No matter what kind of antivirus software, be sure to do a full scan in safe mode (press F8 before booting into the system and then select enter)!! In this way, it can be thoroughly clean.
Other methods: You can use genuine big-name antivirus software to check and kill.
Workaround for iTunes not recognizing iPod:
1.Run the computer menu, enter "regedit", click to open hkey-current-user,software,apple computer inc (the beginning is apple), open the iTunes folder and quick folder, all that can be deleted and click delete, if there is a prompt error, it means that it cannot be deleted, remember that iTunes and quicktime folders have to be deleted. >>>More
The next optimization master, optimize the power on/off, easy!
According to your description: the situation identified by a certain housekeeper software installed in this mobile phone, the identified information is not necessarily accurate, check what type of application this app is, whether it is installed by yourself or a system program, if the system program does not move, you install it yourself, you want to uninstall it, and then reinstall it in the Tianyi space. >>>More
1。Try to boot up, after the computer brand is out, press F8, Safe Mode, Cursor Select: Last Correct Configuration, Enter, Enter, Press Down! >>>More
Web Authentication Process and Steps:,1、 Preliminary Preparation: >>>More