To do this, take several steps including:
1. By using regedit: type regedit in the run and then go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, the registry is usually a virus attached to be used in calling him so that he could "shake and dance" interfere with our computer, if it has met the notice whether there is a registry key is considered strange, if there immediately just delete the registry key;
2. Utilizing the taskbar: Ctrl + Alt + Delete is a step to create processes that are active on our computers, well look at whether there are processes out of the ordinary, if there is then try to turn it off
3. Disable msvbvm60.dll: most viruses are made usually using visual basic, Well it could be turned off by disabling msvbvm60.dll, just rename the file so that the services can not vb active, while the location of the file usually in C: \ windows \ system32
4. store word documents in the form. rtf: although impressed complicated and a little troublesome, but this step is usually considered to be potent, it could minimize the spread of the virus, because the word macros will not be active in this mode
5. Utilizing safe mode: sometimes the virus can not be active in this mode, use safe mode to remove the files that are considered vulnerable
6. Turn off System Restore: this solution is good enough to worry about, because we can not restore our system. But most viruses save itself in the system restore which resulted in him can not be deleted.
7. if still going, then could be a reliable antivirus solution ...
8. Lastly of course continue to update information on the development of viruses with the often asked, browsing the Internet and other things that might be considered could provide a solution in overcoming the virus .....
Good luck hopefully useful ..
Share
Popular Posts
-
Apple iPod Touch 32 GB (4th Generation) NEWEST MODEL, Apple iPod Touch, Apple iPod Touch 32 GB 4th Generation, iPod Touch : The developm...
-
Valentino Rossi was an opportunity to earn the title of champion in this season is still very difficult after only starting position at numb...
-
IOS 5, IOS5, iCloud, Apple Cloud, music cloud, iTunes: After waiting a long time and awaited by the various parties, Apple finally introd...
-
Once aware of the weaknesses in the security of their Android platform, which allows the username and password for Google Calendar, Facebook...
-
Currently, the flash is one of the most widely used media in spreading the virus. This can be understood considering the media is very easy ...
-
The dominance of Red Bull difficult to surpass by another team after successfully placing two drivers, Mark Webber and Sebastian Vettel in...
-
Image : Twitter for I-Pod Chief Technology Officer (CTO), Twitter , Greg Pass, leaving the microblogging site to continue his career els...


0 Comment