Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply
Answers were Sorted based on User's Feedback
First of u can scan hard disk through cmd chkdsk
then after used K7 total security cetre 2010.
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / bijender bhan
You have got Brontok or a similar kind deadly trojan on
your pc.
it cannot be removed by antivirus scan.
you can do it by Malwarebytes antimalware. Or Super
Antispyware.
However, since you would use free version of Malwarebytes-
it might not delete the virus. It resides in registry keys.
The simple thing u can do is without wasting time----
Collect all the software installations that you installed
on your pc like -- MS Office, and all programs and Windows
XP Operating system.
Then transfer the C Drive data to D drive.
Now reinstall the operating system.
while reinstallation is going on C Drive, it would ask for
format option----- chose format and format your C Drive
only ntfs as usual. Dont format D or E drive.
Now xp is fresh on c drive, now install AVG freeware
latest version. You can predownload it on blank cd from
cybercafe. Also, install Malwarebytes.
Scan all drives with malwarebytes.
Then copy back your data from D to C drives that u had.
Or if u wish keep it in D drive instead.
you can install Ms-Office and other little programs that u
had like adobe, winzip, revo etc.
Is This Answer Correct ? | 3 Yes | 1 No |
Answer / neeraj
Pls install symantic antivirus on ur server this antivirus
remove all trozen like .exe
Is This Answer Correct ? | 0 Yes | 0 No |
What device has content-addressable memory (CAM) and what is stored in it? 1 A: Switch, learned IP addresses 2 B: Router, learned IP addresses 3 C: Switch, learned MAC addresses 4 D: Router, learned MAC addresses
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
can anyone tell me which r the companies hiring freshers ( ccna ) in mumbai
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
What is the ieee standard for wireless networking?
Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999
Why OSPF uses 2 Multicast IP
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
Explain the difference between tracert and traceroute?
1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spid