Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply
Answers were Sorted based on User's Feedback
First of u can scan hard disk through cmd chkdsk
then after used K7 total security cetre 2010.
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / bijender bhan
You have got Brontok or a similar kind deadly trojan on
your pc.
it cannot be removed by antivirus scan.
you can do it by Malwarebytes antimalware. Or Super
Antispyware.
However, since you would use free version of Malwarebytes-
it might not delete the virus. It resides in registry keys.
The simple thing u can do is without wasting time----
Collect all the software installations that you installed
on your pc like -- MS Office, and all programs and Windows
XP Operating system.
Then transfer the C Drive data to D drive.
Now reinstall the operating system.
while reinstallation is going on C Drive, it would ask for
format option----- chose format and format your C Drive
only ntfs as usual. Dont format D or E drive.
Now xp is fresh on c drive, now install AVG freeware
latest version. You can predownload it on blank cd from
cybercafe. Also, install Malwarebytes.
Scan all drives with malwarebytes.
Then copy back your data from D to C drives that u had.
Or if u wish keep it in D drive instead.
you can install Ms-Office and other little programs that u
had like adobe, winzip, revo etc.
Is This Answer Correct ? | 3 Yes | 1 No |
Answer / neeraj
Pls install symantic antivirus on ur server this antivirus
remove all trozen like .exe
Is This Answer Correct ? | 0 Yes | 0 No |
If line up, but protocol down which layer should be troubleshot?
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
Which configuration task must you complete if a remote Frame Relay router does NOT support Inverse APP? A.configure static maps B.define an IP address locally C.disable DHCP on the Frame Relay router D.configure a static route to the remote network
What metric does rip use? How is the metric used to indicate an unreachable network?
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
What is ping utility?
Select the fields for the Cisco HDLC protocol: A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory
Operation of two PC connecting with brand new switches. (they expecting step by step arp ,broadcast,MAC table, RARP operation)
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables