I used one pen drive of some one else, there was so many viruses like trojan horse. From then till now - all the softwares which are already loded in my system not open, one window open when ever I try to open them i.e. choose the program you want to use to open this file. Actually I tell you I am working with WHO project, I can't get the permissin to format the system easily, mean to say it is to harder to get the permission for format the system, and which the software are installed in the system not available, because these are program based modified softwares which are provided by WHO to us. So please tell me the easy way without format the system, how can I use those softwares which are provided by WHO for reporting purpose.
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need. goodluck!
- If you need clarification, ask it in the comment box above.
- Better answers use proper spelling and grammar.
- Provide details, support with references or personal experience.
Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only.
Tip: The max point reward for answering a question is 15.
<br />Description<br /><br />The Trojan horse virus is a computer virus that
attaches itself to certain files and programs downloaded from the
Internet. Once it finds its way onto a computer, it Downloads Fake Rogue
Antivirus Application attaches to other files and multiples. This makes
the computer slow down, and some users may even find that they can't
Open exe Files or perform certain actions. The only way to fix this is
to manually remove the Trojan horse virus by removing all of the
infected files and programs from the computer.<br /><br />Malwarebytes' Anti-Malware Free Download<br /><a href="http://www.malwarebytes.org/">http://www.malwarebytes.org/</a><br /><br />Free Remote Desktop Help <br />Because
the Trojan horse virus can be hard to remove please add me to one of
the following resources for free remote desktop help <br /><utube src="1ZV1UK5s608">
A virus is program that has malicious content in it and replicates itself and a Trojan horse is program that will only work if the user executes it. Sometimes, a Trojan horse covers itself as a fake folder while in fact, it's an .exe file. The good thing about Trojan horse is that it is not that hard to get rid of them. But the bad thing about Trojan horse is that it is a little bit difficult to find them. Although, it does not corrupt files or delete data stored on your hard disk until you execute it.Once executed, it will allow the hackers to indentify your credit card number, social security number, bank account details or some other private information. You can delete or remove the hidden Trojan horse with the help of antivirus software. Either, you can also try the manual process to delete it or you can follow these steps: STEP 1 Open the System Information Utility (msinfo32.exe). You can find the System Information Utility by typing “msinfo32.exe” in ‘Run’. This program lists all the processes running on any Windows system, even those processes that are hidden from the task list. Now open your virus scanner and run the executable or .dll through it. STEP 2 Open your antivirus software and run a virus scan. If you don't have a antivirus software installed, download AVG Anti-Virus Free Edition 7.5. And run a scan using it. After the scanning process is completed, delete the value that was detected from the registry (before doing this step, take a backup of the registry files): A) Click ‘Start’ > ‘Run’. B) Type "regedit". C) Click "OK". D) Go to the subkey: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices E) Now delete any value from the right pane that was detected during the scan process. F) Exit the Registry Editor.
A Trojan Horse is full of as much trickery as the mythological Trojan
Horse it was named after. The Trojan Horse, at first glance will appear
to be useful software
but will actually do damage once installed or run on your computer.
Those on the receiving end of a Trojan Horse are usually tricked into
opening them because they appear to be receiving legitimate software or
files from a legitimate source. When a Trojan is activated on your
computer, the results can vary. Some Trojans are designed to be more
annoying than malicious (like changing your desktop,
adding silly active desktop icons) or they can cause serious damage by
deleting files and destroying information on your system. Trojans are
also known to create a backdoor
on your computer that gives malicious users access to your system,
possibly allowing confidential or personal information to be
compromised. Unlike viruses and worms, Trojans do not reproduce by
infecting other files nor do they self-replicate.
Virus or trojans can run some process that keeps running in background. This not only harms the computer, but also prevents the pen drive from formatting as it shows that the drive is in use. Remove and re-insert thepen drive, don't double click on drive and cancel autorun operations if it starts automatically. Run a virus scan on pen drive, this will help fix the issue. Now format the pen drive.
Always take precautions while using pen drives on other computers. See the some of our posts below on protecting your pen drive from viruses:
If the pen drive is not detected at all, or shows a less capacity, then there are high chances that its a chip corruption. Flash chips are the actual hardware components that save the data. A physical or electrical or electromagnetic damage to these chips make the pen drive faulty. This can happen because of voltage fluctuations and faulty USB ports. In such case, get the flash drive replaced if its under warranty as it can not be fixed otherwise.
FAKE PEN DRIVES:
Sounds a bit un-believable but true. There are a lot of pen drives in the market which are of very cheap quality which are fake copies of some known brands. Beware of such pen-drives. Always purchase pen-drives or memory-cards from a reliable source with bill and warranty to avoid any mess later.
First, go in Control Panel, after System, then System Restore, and desactive all.
Restart the machine in Safe mode, and run a AntiVirus (like a Norton) restart again, check the file, if not missing, the solutions is search in web (or in Symantec.com) a Virus Remove Tool, OR, in DOS delete a infected file, for full asistance install a HiJack Free and send a email to me email@example.com
1st thing would be to virus check the drive and remove any viruses you find, if it does not remove it try using this one it seems to remove everything, we used to use f-secure or norton 2007 but it wasnt picking up or removing half of the viruses we removed for customers.
its a 30 day trial so download it, uninstall your virus checker and install that one and it should remove anything. PS make sure the switch on the pen drive is set to unlock so u can make changes on the drive.
all the best