473,769 Members | 7,408 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to detect and remove the TROJAN HORSE from the system

1 New Member
System affected by Trojan horse virus. Anti-virus is having in the system but it is detecting the virus but not removing the virus...
Tell some antivirus to remove it....
when the system is logged on, the notification will that there is a virus each time i am deleting the virus but its coming again and again ...

and so the system is slow...
Feb 23 '08 #1
2 2706
sicarie
4,677 Recognized Expert Moderator Specialist
I like Avast myself, but the best way to overcome a virus is to reinstall - I even like switching hard drives, but that's because I have encountered hardware virii.
Sep 16 '10 #2
ashitpro
542 Recognized Expert Contributor
You said you have anti-virus and it even detects the threat. That's enough. Now, for quick solution just browse through the 'threat history' or 'log files' or whatever your anti-virus calls its reports. Note the name of the threat and search google for 'removing <virus name>'. It should come up with some unit tool to remove that threat.
Sep 16 '10 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

5
27373
by: Chris Fynn | last post by:
Is there an easy way to detect the local language settings of a client browser or system? I want to for example determine if the users browser or system is set to English, French, or Italian and display a message in the appropriate language. -- Christopher J. Fynn
18
12737
by: Mad Programmer | last post by:
I'm writing a destructive trojan with C++ and I need to know how I can destroy the target's monitor and format the target's harddisk before the target can stop the program. What do I need to do?
87
5352
by: Sony Music CDs install Malware | last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be cautioned about SONY music CDs. They contain 'viewer' type software that is actually a trojan horse for a "rootkit". The licence agreement gives no indication whatsoever that the 'viewer' software contains the implementation of a nasty near-impossible to remove rootkit software. http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html ...
1
5400
by: Roy | last post by:
Hi, I have a problem that I have been working with for a while. I need to be able from server side (asp.net) to detect that the file i'm streaming down to the client is saved completely/succsessfully on the client's computer before updating some metadata on the server (file downloaded date for instance) However, All examples i have tried, and all examples I have found that other people says works - doesn't work for me :-(
2
1931
by: eBob.com | last post by:
I've got the basics of an XML ini file working. I.E. I can stash away and retrieve user preferences. (Code below.) But how do I handle a new preference? Say I have A and B. And then I invent C. The first time the new version with C is run the XML file will not have a value for C. How do I detect that case? Somewhere I got the impression that I could use IsNull, but I was unable to find an example which I could apply to my code. My...
2
1849
by: =?Utf-8?B?bXkgY2F0IGtub3dzIG1vcmU=?= | last post by:
* your browser was infected by trojan.win.32.obfuscated.gx. you need to clean your system immediately or it will crash. Okay so this is what keeps popping up every so often. I've downloaded windows defender... and scanned my computer...Nothing. No virus detected. I don't know what to do.. :( can someone...ANYONE....please help. I'm not computer savvy so I need step by step help on this .
0
1691
by: =?Utf-8?B?UmFuZ2VyODAx?= | last post by:
Hi All My virus software detected a trojan horse virus in the smss.exe and winlogon.exe files that were located in my C:\Program Files\Common Files\ Since then I can no longer log onto my MS network nor can I modify any of the settings in 'Tools" "Folder Options" "View" Hopefully someone can help me here. Thanks, -- Ranger801
4
2682
by: pangsans | last post by:
hai i have a problem here because of a trojan attack..its called trojan agent horse.ACNS i googled it and could not find any relevant information. this trojan does not let me run anything.for running any application it asks for open with. then it has disabled running exe files and control panel.i dont want to reinstall my os.can you tell me how to clean up without using removers as i tried quite a few of them and none worked... thanx for the...
0
9423
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10214
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
9996
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8872
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7410
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6674
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5304
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5447
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3563
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.