To do this, take several steps including:
1. By using regedit: type regedit in the run and then go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, the registry is usually a virus attached to be used in calling him so that he could "shake and dance" interfere with our computer, if it has met the notice whether there is a registry key is considered strange, if there immediately just delete the registry key;
2. Utilizing the taskbar: Ctrl + Alt + Delete is a step to create processes that are active on our computers, well look at whether there are processes out of the ordinary, if there is then try to turn it off
3. Disable msvbvm60.dll: most viruses are made usually using visual basic, Well it could be turned off by disabling msvbvm60.dll, just rename the file so that the services can not vb active, while the location of the file usually in C: \ windows \ system32
4. store word documents in the form. rtf: although impressed complicated and a little troublesome, but this step is usually considered to be potent, it could minimize the spread of the virus, because the word macros will not be active in this mode
5. Utilizing safe mode: sometimes the virus can not be active in this mode, use safe mode to remove the files that are considered vulnerable
6. Turn off System Restore: this solution is good enough to worry about, because we can not restore our system. But most viruses save itself in the system restore which resulted in him can not be deleted.
7. if still going, then could be a reliable antivirus solution ...
8. Lastly of course continue to update information on the development of viruses with the often asked, browsing the Internet and other things that might be considered could provide a solution in overcoming the virus .....
Good luck hopefully useful ..
Share
Popular Posts
-
At this time with more and more links and documents circulating on the internet , it is very difficult to search for a topic or documents ...
-
Though a little annoying, but sometimes this is very disturbing us when going to work or get into windows because the windows are often noti...
-
Apple iPod Touch 32 GB (4th Generation) NEWEST MODEL, Apple iPod Touch, Apple iPod Touch 32 GB 4th Generation, iPod Touch : The developm...
-
Image : Twitter for I-Pod Chief Technology Officer (CTO), Twitter , Greg Pass, leaving the microblogging site to continue his career els...
-
Once aware of the weaknesses in the security of their Android platform, which allows the username and password for Google Calendar, Facebook...
-
Value of a love is fantastic. Recently, Kim Kardashian received her engagement ring with Kris Humphries worth U.S. $ 2 million. A number of...
-
A day after Google announced that the attacker hacking of gmail in the area of Jinan , China , the Chinese government immediately denie...
0 Comment