Microsoft Windows XP Professional With Servise Pack 2 (e8503040) for PC Logo

Related Topics:

Posted on Nov 01, 2008
Answered by a Fixya Expert

Trustworthy Expert Solutions

At Fixya.com, our trusted experts are meticulously vetted and possess extensive experience in their respective fields. Backed by a community of knowledgeable professionals, our platform ensures that the solutions provided are thoroughly researched and validated.

View Our Top Experts

Computer log-on I can't log-on in my account the computer will shot off before i can open my acount? i got a trojan horse and i need to remove it what should i do?

1 Answer

Anonymous

Level 2:

An expert who has achieved level 2 by getting 100 points

Hot-Shot:

An expert who has answered 20 questions.

Corporal:

An expert that has over 10 points.

Mayor:

An expert whose answer got voted for 2 times.

  • Expert 62 Answers
  • Posted on Nov 02, 2008
Anonymous
Expert
Level 2:

An expert who has achieved level 2 by getting 100 points

Hot-Shot:

An expert who has answered 20 questions.

Corporal:

An expert that has over 10 points.

Mayor:

An expert whose answer got voted for 2 times.

Joined: Oct 26, 2008
Answers
62
Questions
1
Helped
27179
Points
138

Boot windows in "Safe" mode by holding F8 key while turning computer on. Choose "Start windows in Safe Mode" option. From this mode, you might be able to return computer to previous restore point. If that doesn't help try running virus scan software or Lavasoft's Adaware, found at; http://www.lavasoft.com/products/ad_aware_free.php
hope this helps

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
2answers

I log into my g-mail account,another persons name & address keep appearing

HI Sharon,

Sounds like your email account with gmail has been hacked and under control by another person. However, im not sure about what you wrote about you logged into your email account by using your own email and password with gmail then ....what happened did you logged in successfully or not?
if you did logged in your gmail account successfully then after you logged in you see your profile name has been changed to another person name and so on the address also has been changed too then it definitely means your gmail account has been hacked by another person who did know your email address and password and that person logged into your gmail account and he or she changed your profile info and gain control to use your gmail account. This issues are not difficult all you need to do is logged in to your gmail account then on the upright conner you would see profile name of you or may be of another person name just click on it and click on MY ACCOUNT from there all you need to do is to review all of personal information and make correction back your your own profile. Once you finish to make correction then the last step is you MUST CHANGE YOUR GMAIL PASSWORD so that the hacker no longer can access your gmail account anymore.
Now you need to do a second step and this is very important it regarding why and how the hacker could gaining control of your gmail account because some of the computers you did use to get online and logged in to your gmail account ( it could be your home computer or laptop or it could be any computer outside your home but you did one time use it to check your email) Those computers or laptops you has used they has been infected by trojan or malware that is why the hacker could pull out your personal info such as email address or password. Now we are talking about your computer or laptop at home : to prevent those hacker again can gain control to access your computer without your knowledge so that they can pull out your new gmail password ! After you fix your gmail profile and change new gmail password you need to do next is to clean up and remove the virus, malware, trojan horse ....etc whatever it is which infected inside your computer. Then you will be safe.

If you can not do it by yourself ( to remove infected file on your computer) then you really need professional help to get your computer services by a computer tech.

Good Luck.
tip

How to Remove Trojan Horse Virus Quickly from Your PC?

Want to learn how to remove trojan horse virus from your computer quickly? This problem has affected most people throughout the world, and fortunately there are good solutions to this. Almost every computer user would come across in a malicious attack, which may be a virus, spyware or adware, etc.

What is actually a Trojan horse?

The biggest difference of a Trojan and a virus is a Trojan that can not reproduce the opposite of how viruses are capable of. Trojan Horse would be disguised executable files and attempts to install itself when you start. Many unsuspecting users to open these files, especially when they are assigned another interesting file or download someone else who feel they can download from the Internet. These Trojans are the name of the public favorite items (games, movies, names, etc.) and to attract the user to install a PC has become sores.

How to remove a Trojan virus quickly from your PC?

The best solution would be to download and run a scan with antivirus and antispyware software. It is able to run a scan of your system and thus allows users to clean spyware, adware, viruses or other malware that was discovered. It does its job automatically and not require the user to have technical knowledge. If you have such software, it is very important that you update it frequently to ensure it has capacity to defend itself against the latest threats. When my protection software has run a full scan, I restarted my PC at home, and it was like new again after.
on Mar 08, 2011 • Computers & Internet
tip

Manually Removing Any Trojan Horse Virus.trojan Zlob Virus Horse Removal

<br />Description<br /><br />The Trojan horse virus is a computer virus that attaches itself to certain files and programs downloaded from the Internet. Once it finds its way onto a computer, it Downloads Fake Rogue Antivirus Application attaches to other files and multiples. This makes the computer slow down, and some users may even find that they can't Open exe Files or perform certain actions. The only way to fix this is to manually remove the Trojan horse virus by removing all of the infected files and programs from the computer.<br /><br />Malwarebytes' Anti-Malware Free Download<br /><a href="http://www.malwarebytes.org/">http://www.malwarebytes.org/</a><br /><br />Free Remote Desktop Help <br />Because the Trojan horse virus can be hard to remove please add me to one of the following resources for free remote desktop help <br /><utube src="1ZV1UK5s608">
0helpful
1answer

Am looked out of all dur to trying to log onto my dds computer in another town

1. Your Dad's computer must have remote login enabled for you to get into it's file system. Generally, you must also have an administrator-level account (user name and password) on that computer.

2. If your Dad's computer is set up as a webserver, and you want to change the website remotely, then it would have to have a link for a site administrator login. This should be a secure (https) page.

Those things have to be set up at the computer by someone with administrator level access. If nobody knows the password for an administrator level account on that computer, there probably is not much that can be done other than to go to the computer and copy or e-mail whatever files are accessible. Some people sell "password unlocking" software, but I cannot vouch for its effectiveness, nor its security - if it contains a Trojan Horse it would make the computer open to whatever hacker installed the Trojan Horse.

On the other hand, if your Dad had a webpage set up on a web hosting service, you do not need access to your Dad's computer to get to it. If you don't have the administrator username or password for the page, you may be able to get the hosting service to provide you with access once you show your legal authority to do so. This also holds for e-mail accounts.
0helpful
1answer

Starting my laptop up

You can remove or change the Window's User or administrator's password and privileges. You need access to a computer with Internet access to download the Hiren's Boot CD and burn it onto a CD. Then insert this CD into the laptop/computer and boot up the laptop/computer with the Hiren's CD and follow the instructions. There are very useful utilities CD and it a Linux boot CD which contains quite a lot of Utility programs including a password removal program. Click on one of these links to download HIREN'S BOOTCD :- http://www.hirensbootcd.net/ http://67.20.82.163/
0helpful
4answers

How to remove win32/mebroot?

Hi there,
Well this Win32/mebroot is a trojan and you need a trojan killer to remove this. you can remove this by two ways -
1. Online - means when your computer runs the operating system and you can install the trojan killer and search for the trojan.
2. Offline - in this you don't need to start the operating system of your computer, you just need the offline CD of a trojan killer that starts automitally before windows start and then you just make a search for the trojan.
Please follow the below link to get your trojan killer -
http://trojan-killer.net/

Good Luck
0helpful
5answers

What is trojan horse virus

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Please rate the solution if helpful. Thank you

Source: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
0helpful
2answers

What's trojan horse .I found that name in after my scan.

The Trojan is a type of virus. You know, like the Trojan Horse legend ... the Greeks sheltered in a huge wooden horse presented as a gift to the people of the city they were trying to conquer and when the people of the city brought the horse in, the greeks killed them all. The same idea is with this Trojan virus. It hides in an suspicious program and when you run that program it starts to do some damage.
0helpful
1answer

The prdt coudnt repair the virus named trojan horses

pls AVG antivirus install it is very useful of these type of virus
Not finding what you are looking for?

46 views

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

k24674

Level 3 Expert

8093 Answers

Brad Brown

Level 3 Expert

19187 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...