472,328 Members | 1,056 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,328 software developers and data experts.

manual steps for removing these viruses/trojans

Hey guys,
i just wanna ask anyone who could help me with these 2 problems, i really prefer manual steps for removing these viruses/trojans
copy.exe
temp.exe
temp2.exe

thx anyway byeeeeeeeeeee
:)
Mar 16 '07 #1
3 2699
sicarie
4,677 Expert Mod 4TB
Hey guys,
i just wanna ask anyone who could help me with these 2 problems, i really prefer manual steps for removing these viruses/trojans
copy.exe
temp.exe
temp2.exe

thx anyway byeeeeeeeeeee
:)
There is no telling what those trojan or virus programs actually are. The best bet is to download something like Avast and run it with your computer off the network, and then downloading your preferred combination of Windows Defender, Ad-Aware, and Spybot (though I personally have had SpyBot mess up a few machines I ran it on), and have those burned to a disc or in a USB drive, and run those. Then fully update your computer through Windows updates, update all the AV and Spyware defs, and run everything again (just to make sure).

Of course, if you're that paranoid, and those three are different trojans that are already on your system, a re-image might also be in order...
Mar 16 '07 #2
Cyberdyne
627 Expert 512MB
Manually go into safe mode and delete any files you perceive as viruses by holding shit and hitting delete =)

But as above stated, there are many things affected by a virus and a typical manual removal of a virus usually consists of at least 20 steps (registry, hidden files, system files, temp files and so on)

I use norton corporate edition and I am very happy with it - hint hint.

Good Luck, Cyber.
Mar 16 '07 #3
sicarie
4,677 Expert Mod 4TB
Manually go into safe mode and delete any files you perceive as viruses by holding shit and hitting delete =)
Don't you mean shift? ;)
But as above stated, there are many things affected by a virus and a typical manual removal of a virus usually consists of at least 20 steps (registry, hidden files, system files, temp files and so on)

I use norton corporate edition and I am very happy with it - hint hint.

Good Luck, Cyber.
Really? I've always had problems with it - especially if, for any reason, I had to use it on a network. There are people who love it and people who hate it (I guess I'm one of the ones who hates it...), I'm waiting for Symantec to get their client filesize back down... not that they're bloated or anything....
Mar 16 '07 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

14
by: Craig O'Shannessy | last post by:
Hi all, Just thought I'd mention that I really think this problem needs to be fixed. I I'm patching the 7.4RC1 JDBC drivers as we speak due...
5
by: Tim V. | last post by:
I was doing a FP8 (8.2) update on my db (Win XP 8.1 fp3) and the process hung (3 hours - no activity) at the end. The system was in la-la land and...
1
by: ad | last post by:
We must manually fill a dataset and bind a dataGrid when we want to display data in a datagird in the VS2003. The two steps will auto execute in...
0
by: Bill Gauvey | last post by:
I have a wizard control on a page with the first two setps are static, created in the VS2005 UI; the remaining steps are created dynammically. For...
0
by: sam | last post by:
I'd like to place a simple application, written with vb.net 2005, onto a linux server. The app is them "run" from a windows xp machine by clicking...
5
by: Nick Gilbert | last post by:
Hi, I'm using the asp:Wizard control and on some of the steps, I would only like the user to be able to progess to the next step by clicking an...
21
by: virtualadepts | last post by:
I have a theory how viruses work. My theory is you need one computer program to host another computer program, and once the program is hosted, and...
5
by: Firecore | last post by:
Hi. My brother is an expert at C & C++ He is always making small annoying programs similar to Worms and Viruses. I have learnt VB and some C....
11
by: brey_maastricht | last post by:
Thank you all for your replys ! Indeed I am using a vector<vector<nDimensionalPoint * as Hashtable. My requirement is to lookup the value of a...
4
by: pavanip | last post by:
Hi friends, I am developing one application like Anti spyware.how to get those spyware dlls present in our registry or our system.And what...
0
by: tammygombez | last post by:
Hey fellow JavaFX developers, I'm currently working on a project that involves using a ComboBox in JavaFX, and I've run into a bit of an issue....
0
better678
by: better678 | last post by:
Question: Discuss your understanding of the Java platform. Is the statement "Java is interpreted" correct? Answer: Java is an object-oriented...
0
by: teenabhardwaj | last post by:
How would one discover a valid source for learning news, comfort, and help for engineering designs? Covering through piles of books takes a lot of...
0
by: CD Tom | last post by:
This happens in runtime 2013 and 2016. When a report is run and then closed a toolbar shows up and the only way to get it to go away is to right...
0
by: CD Tom | last post by:
This only shows up in access runtime. When a user select a report from my report menu when they close the report they get a menu I've called Add-ins...
0
by: Naresh1 | last post by:
What is WebLogic Admin Training? WebLogic Admin Training is a specialized program designed to equip individuals with the skills and knowledge...
0
jalbright99669
by: jalbright99669 | last post by:
Am having a bit of a time with URL Rewrite. I need to incorporate http to https redirect with a reverse proxy. I have the URL Rewrite rules made...
0
by: Matthew3360 | last post by:
Hi there. I have been struggling to find out how to use a variable as my location in my header redirect function. Here is my code. ...
1
by: Matthew3360 | last post by:
Hi, I have a python app that i want to be able to get variables from a php page on my webserver. My python app is on my computer. How would I make it...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.