Skip to main content

Removing virus manually in windows XP

Start->Run->type cmd
in each drive type attrib /s /d it will display the list of all files in that drive along with folders.concentrate on files having SHR attribute.normally virus files have two characteristics
1.SHR attribute
2.Queer name like amvo.exe,r6r.exe,autorun.inf etc.

Note:some system files also have this attribute like MSDOS.SYS,IO.SYS etc so before deleting goggling about that file will help.

to delete these files type c:\>del /f /s /a

>> to view the content of files with .inf,.vbs,.c etc i.e files which r not batch files or executables.goto explorer n then goto the required drive or folder n type the file name with extension it will open up in notepad.

>>there is another method also.goto the required location n type attrib -s -h -r file name
then use gui to see that hiiden file.if it is not n exe or .bat or then open it with notepad.Here you will get some information like a file name or a registry key which the virus affects or a start up item or process.Change this or unchecked the start up.

if file is not deleted like it says access denied it means it already used by some process.open task manager n find a process of the same name or some process which is not a valid windows process(better google) n end that process.

if not found open msconfig goto start up tab n look at if a start up items seems queer(u will have this feeling if u r n experienced windows user otherwise all da startup items may seem queer.)unchecked that.u may also learn about the startup item by goggling.after unchecking restart the computer then restart the computer.

This method is effective in removing some spywares or some small but annoying virus like masquerader etc. which r sometimes not detected by antivirus software.

Comments

Popular posts from this blog

Place Files Inside EXE and Execute them using Gamemaker

I am fond of creating games in Gamemaker and Mugen. However I found an interesting way to create executable files that may contain anything inside them (may be a whole cracked Program) and may act as extractors or copy protectors Tools required  GameMaker 7 or above Procedure  1) Download and Install Gamemaker and start a Game Project by going to File -> New.  2) Every game consists of a Room in which all objects shall act and interact with each other.So Create a new room by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Room.Name it anything you want.In my case ROOM0  3)Every Game consists of Objects which are responsible for all interactions. So create a new object by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Object.Name it anything you want.In my case VIRUS  4)Now create a new script (Press CTRL+ALT+C or Resources Menu -> Create Script),Name it SCRIPT0...

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass....

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou...