Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply
Answers were Sorted based on User's Feedback
First of u can scan hard disk through cmd chkdsk
then after used K7 total security cetre 2010.
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / bijender bhan
You have got Brontok or a similar kind deadly trojan on
your pc.
it cannot be removed by antivirus scan.
you can do it by Malwarebytes antimalware. Or Super
Antispyware.
However, since you would use free version of Malwarebytes-
it might not delete the virus. It resides in registry keys.
The simple thing u can do is without wasting time----
Collect all the software installations that you installed
on your pc like -- MS Office, and all programs and Windows
XP Operating system.
Then transfer the C Drive data to D drive.
Now reinstall the operating system.
while reinstallation is going on C Drive, it would ask for
format option----- chose format and format your C Drive
only ntfs as usual. Dont format D or E drive.
Now xp is fresh on c drive, now install AVG freeware
latest version. You can predownload it on blank cd from
cybercafe. Also, install Malwarebytes.
Scan all drives with malwarebytes.
Then copy back your data from D to C drives that u had.
Or if u wish keep it in D drive instead.
you can install Ms-Office and other little programs that u
had like adobe, winzip, revo etc.
| Is This Answer Correct ? | 3 Yes | 1 No |
Answer / neeraj
Pls install symantic antivirus on ur server this antivirus
remove all trozen like .exe
| Is This Answer Correct ? | 0 Yes | 0 No |
what is burst rate
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values
What is the name of best path in eigrp protocol?
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Which of the following is a valid TCP/IP socket for an Email connection? 101.34.2.125:25 00-00-03-1B-CA-6F:143 202.167.23.101:21 60.4:110
what is bgp, and what its attributes (thanks to sahin he sende me notes) Please try to give answer it will help you in future. after giving the answer most of them i am selected foro\ 2nd round of interview thanks
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
why we twist the cable in case of twisted pair cable?plz give me technical answer.
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy