473,396 Members | 2,029 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to detect and remove the TROJAN HORSE from the system

System affected by Trojan horse virus. Anti-virus is having in the system but it is detecting the virus but not removing the virus...
Tell some antivirus to remove it....
when the system is logged on, the notification will that there is a virus each time i am deleting the virus but its coming again and again ...

and so the system is slow...
Feb 23 '08 #1
2 2689
sicarie
4,677 Expert Mod 4TB
I like Avast myself, but the best way to overcome a virus is to reinstall - I even like switching hard drives, but that's because I have encountered hardware virii.
Sep 16 '10 #2
ashitpro
542 Expert 512MB
You said you have anti-virus and it even detects the threat. That's enough. Now, for quick solution just browse through the 'threat history' or 'log files' or whatever your anti-virus calls its reports. Note the name of the threat and search google for 'removing <virus name>'. It should come up with some unit tool to remove that threat.
Sep 16 '10 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

5
by: Chris Fynn | last post by:
Is there an easy way to detect the local language settings of a client browser or system? I want to for example determine if the users browser or system is set to English, French, or Italian...
18
by: Mad Programmer | last post by:
I'm writing a destructive trojan with C++ and I need to know how I can destroy the target's monitor and format the target's harddisk before the target can stop the program. What do I need to do?
87
by: Sony Music CDs install Malware | last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be cautioned about SONY music CDs. They contain 'viewer' type software that is actually a trojan horse for a "rootkit". The...
1
by: Roy | last post by:
Hi, I have a problem that I have been working with for a while. I need to be able from server side (asp.net) to detect that the file i'm streaming down to the client is saved...
2
by: eBob.com | last post by:
I've got the basics of an XML ini file working. I.E. I can stash away and retrieve user preferences. (Code below.) But how do I handle a new preference? Say I have A and B. And then I invent...
2
by: =?Utf-8?B?bXkgY2F0IGtub3dzIG1vcmU=?= | last post by:
* your browser was infected by trojan.win.32.obfuscated.gx. you need to clean your system immediately or it will crash. Okay so this is what keeps popping up every so often. I've downloaded...
0
by: =?Utf-8?B?UmFuZ2VyODAx?= | last post by:
Hi All My virus software detected a trojan horse virus in the smss.exe and winlogon.exe files that were located in my C:\Program Files\Common Files\ Since then I can no longer log onto my MS...
4
by: pangsans | last post by:
hai i have a problem here because of a trojan attack..its called trojan agent horse.ACNS i googled it and could not find any relevant information. this trojan does not let me run anything.for...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.