you can use Process Explore from SysInternals:
http://www.sysinternals.com/ntw2k/freeware/procexp.shtml
You can use Process Explorer to kill the process by taking note of the filename and location of the file that you want to delete. After killing the process, you can proceed to deleting the...
well, we need to validate first if it is really a virus. Aside from this, certain attacks that are flagged in a machine does not exactly means that the system is infected. For example, if he has an open network share and another computer drops a copy of a malware there, it will be flagged and...
most antivirus products already incorporate scheduled scanning tasks as well as spyware, adware detection and personal firewall capabilities. but if you want to run different programs in a specific schedule then you can use the Scheduled Tasks feature of windows.
what happened is basically the difference between traditional AV's and the new breed of AV's. basically the malwares of today are more complicated than before. Before, whenever you detect a malware you can just delete them. recent malwares cling to the system thru INI files, registry and active...
which malware was detected? If the malware was able to modify the system it could have added some entries that makes the system dependent on the trojan. If the cleaning did not include the removal of these entries, instability arises. Please provide the malware name so that we could help you more.
Most antivirus products do have Rescue disks. As for the updates, some has programs that allows you to create them with the latest definitions. thry this one:
http://www.trendmicro.com/download/emg-disk.asp
as mentioned by FaiTHLeSS, check your hosts file. The system queries the hosts file prior to checking the DNS servers. Any rogue entry in the hosts file will definitely redirect your browser or any other internet app.
make sure that the parallel port is configured properly from the bios. Check your floppy's manual for the configuration. Then try "Add/Remove Hardware"
mmm...it sounds like an infection by the swen.a worm,
though it could be an aftermath of another malware.
You can refer to the manual cleaning for swen.a:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SWEN.A
Everytime windows starts an application it queries a special...
mmm...if protecting the clients from email is not an issue for your ISP, then you might as well look for an ISP that cares for their clients. Look for an ISP that has an antivirus product on their mail server such as ScanMail from Trend Micro.
Well, I suggest you look for an ISP with a better Antivirus product in their mail server. In our case, my company uses ScanMail to sort out these worm emails.
It is a backdoor named BKDR_CALYPS.A. you can remove it by following the instructions in the site:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_CALYPS.A
In choosing an av product, you can refer to certification bodies like:
http://www.virusbtn.com
http://www.av-test.org
But I highly suggest that you try them out yourself. Download
an evaluation copy and do some metrics like performance overhead, file scan throughput, false-positives. you...
Dear viper123,
If I got you right, You have three machines. One with two NICs and two with one NIC each. The two machines connects to each NICs of the machine with two NICs.
============== ===============
|computer1 NIC | <=====> | NIC computer2 |
| |...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.