Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply
Answers were Sorted based on User's Feedback
First of u can scan hard disk through cmd chkdsk
then after used K7 total security cetre 2010.
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / bijender bhan
You have got Brontok or a similar kind deadly trojan on
your pc.
it cannot be removed by antivirus scan.
you can do it by Malwarebytes antimalware. Or Super
Antispyware.
However, since you would use free version of Malwarebytes-
it might not delete the virus. It resides in registry keys.
The simple thing u can do is without wasting time----
Collect all the software installations that you installed
on your pc like -- MS Office, and all programs and Windows
XP Operating system.
Then transfer the C Drive data to D drive.
Now reinstall the operating system.
while reinstallation is going on C Drive, it would ask for
format option----- chose format and format your C Drive
only ntfs as usual. Dont format D or E drive.
Now xp is fresh on c drive, now install AVG freeware
latest version. You can predownload it on blank cd from
cybercafe. Also, install Malwarebytes.
Scan all drives with malwarebytes.
Then copy back your data from D to C drives that u had.
Or if u wish keep it in D drive instead.
you can install Ms-Office and other little programs that u
had like adobe, winzip, revo etc.
Is This Answer Correct ? | 3 Yes | 1 No |
Answer / neeraj
Pls install symantic antivirus on ur server this antivirus
remove all trozen like .exe
Is This Answer Correct ? | 0 Yes | 0 No |
Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup
Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet technology? A. one B. two C. none D. several
You create the following standard access-list access-list 1 deny 1.1.1.1 access-list 1 deny 2.2.2.2 int e0 ip access-group 1 in Which of the following statements are true, with regard to traffic flowing into E0? A.) This will stop IP packets with a source address of 1.1.1.1 only. B.) This will stop all IP packets. C.) This is an invalid configuration. D.) This will stop no IP packets. E.) This will stop IP packets with a source address of 2.2.2.2 only. F.) This will stop IP packets with a source address of 1.1.1.1 and 2.2.2.2.
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
what is difference between hub and router.....
You have OSPF traffic flooding your network via one of your router interfaces. Write the access list line that will deny all ospf traffic. Don't worry about the other lines of the access list.
what is distance vector protocol link state protocol and what is the diffrence between them
What port does rip use?
"sap" is used by the Cisco IOS for which encapsulation types? A. Ethernet_802.2 B. Token-Ring C. FDDI_SNAP D. Ethernet_802.3 E. FDDI_802.2
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down