Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply
Answers were Sorted based on User's Feedback
First of u can scan hard disk through cmd chkdsk
then after used K7 total security cetre 2010.
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / bijender bhan
You have got Brontok or a similar kind deadly trojan on
your pc.
it cannot be removed by antivirus scan.
you can do it by Malwarebytes antimalware. Or Super
Antispyware.
However, since you would use free version of Malwarebytes-
it might not delete the virus. It resides in registry keys.
The simple thing u can do is without wasting time----
Collect all the software installations that you installed
on your pc like -- MS Office, and all programs and Windows
XP Operating system.
Then transfer the C Drive data to D drive.
Now reinstall the operating system.
while reinstallation is going on C Drive, it would ask for
format option----- chose format and format your C Drive
only ntfs as usual. Dont format D or E drive.
Now xp is fresh on c drive, now install AVG freeware
latest version. You can predownload it on blank cd from
cybercafe. Also, install Malwarebytes.
Scan all drives with malwarebytes.
Then copy back your data from D to C drives that u had.
Or if u wish keep it in D drive instead.
you can install Ms-Office and other little programs that u
had like adobe, winzip, revo etc.
| Is This Answer Correct ? | 3 Yes | 1 No |
Answer / neeraj
Pls install symantic antivirus on ur server this antivirus
remove all trozen like .exe
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the 5-4-3-2-1 rule of network design?
Which is true regarding store-and-forward switching method? A.) Latency varies depending on frame-length B.) Latency is constant C.) It is default for all Cisco switches D.) It only reads the destination hardware address before forwarding the frame
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Router# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes
What is the utility of ping?
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
What command displays only OSPF routes?
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.
Which of the following is not a characteristic of link-state routing protocols? ❍ A. VLSM support ❍ B. Route summarization at any bit level ❍ C. Full routing updates at regular intervals ❍ D. Discontiguous network support