473,395 Members | 1,468 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Standard Registry locations affected by Virus's ,Spyware and Adware

Hai All

Can anybody please tell me what are the standard registry locations that are
affected by Virus's , Spyware and Adware Programs.

Thanks in advance

Regards
Vighneswar
Mar 21 '06 #1
3 2133
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run

this is the most obivous one.

Mar 21 '06 #2
HI,

I don't see ther relation with either csharp or VB , why r u posting this
here?

It does depend of the malware in question, download a very good utility to
monitoring the registry from sysinternals.com
--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"vighnesh" <vi******@nannacomputers.com> wrote in message
news:O4**************@TK2MSFTNGP12.phx.gbl...
Hai All

Can anybody please tell me what are the standard registry locations that
are affected by Virus's , Spyware and Adware Programs.

Thanks in advance

Regards
Vighneswar

Mar 21 '06 #3
"vighnesh" <vi******@nannacomputers.com> wrote in message
news:O4**************@TK2MSFTNGP12.phx.gbl...
Hai All

Can anybody please tell me what are the standard registry locations that
are affected by Virus's , Spyware and Adware Programs.

Thanks in advance

Regards
Vighneswar


Adding to the pile here.... if there were a published "Standard" for virus
writers, I assume everyone would simply make sure that part of the registry
was emptied before logging off each night.... then, we wouldn't need AV
software.

--
Ken Halter - MS-MVP-VB (visiting from VB6 world) - http://www.vbsight.com
Please keep all discussions in the groups..
Mar 21 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: msnews | last post by:
Hi, All i really want to make a program that protect my system like Ad-aware or Spybot.. socalled Spyware.. but i don't know about developing these program. how can i have to do? could...
5
by: Dale Bradford | last post by:
Is it possible with C# to find out which program is changing certain keys in the registry? I've already searched for "registry watchers" code examples or downloads, but they seem to only take...
3
by: vighnesh | last post by:
Hai All Can anybody please tell me what are the standard registry locations that are affected by Virus's , Spyware and Adware Programs. Thanks in advance Regards Vighneswar
5
by: Tull Clancey | last post by:
Hi. Does anyone have a way of creating a registry entry during the VB Net 2003 installation process? I can't rely on the application adding the entry on first run. Any help gratefully...
2
by: jsundberg | last post by:
My computer was attacked by spyware and adware, After it was supposedly cleaned up of all these, all of my MS apps disappeared. All of the folders are there, but they all say empty. I tried...
0
cyberking
by: cyberking | last post by:
Hi all, Firstly, I am very little knowledgible when it comes to Windows OS (Client OS or Server OS). But offlate my urge to get myself in terms with it increased and soon I was meddling with the...
0
by: yuxuy501 | last post by:
Noadware.net - Spyware/Adware Remover http://zoneweb.freeweb7.com/noadware.html
1
by: =?Utf-8?B?RnJ1c3RyYXRlZCBPbGQgUm9ja2V0IFNjaWVudGlz | last post by:
Does anyone know of an excellent book that can teach a person about the registry contents? Specifically, I need to learn how to edit and delete information placed by malicious programs. My...
5
by: disappearedng | last post by:
Hi guys, I am planning to write a web crawler in standard C. I can't seem to find standard libraries provided by C that deals with networks and regular expression. Anyone here knows a good engine...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.