Question about Computers & Internet
You do not want to restore. You want to extract the trojan. REstore actually means reload. EVERYTHING, and you have all data lost.
Tons easier to extract trojan.
Posted on Oct 06, 2010
A Trojan may start as only a single variant, but might be modified by other attackers into different variants. By using the Heuristics analysis technique, Norton can identify a number of variants of a Trojan using a single signature file. Heuristics is a technique that detects viruses using a generic signature. The Symantec research team finds common areas that all variants of a Trojans share uniquely and create a single generic signature. These signatures often use wildcard characters that contain non-contiguous code. The wildcards allow the scanner to detect Trojans with extra or meaningless code.
Posted on Oct 07, 2010
a 6ya expert can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of.(from cars to computers, handyman, and even drones)
click here to download the app (for users in the US for now) and get all the help you need.
Posted on Jan 02, 2017
Tips for a great answer:
Mar 19, 2017 | Acer Computers & Internet
Mar 31, 2011 | Computers & Internet
Mar 16, 2011 | Microsoft Computers & Internet
Oct 13, 2017 | Computers & Internet
Oct 27, 2010 | Acer Aspire 3680 Laptop
Aug 06, 2010 | Acer Aspire One Netbook 8.9" Notebook
Aug 02, 2010 | Acer Aspire 5100 Notebook
Jun 13, 2010 | Acer Aspire 5335-2257 Notebook
Dec 04, 2009 | Microsoft Computers & Internet
Sep 10, 2008 | Computers & Internet
96 people viewed this question
Usually answered in minutes!