• Windows XP: TrojanByte.Verify

    I understand about restoring the computer. However, for right now, how do I rid this virus from my computer? Norton finds it, but when I click "remove" it doesn't remove it like it usually does. I'm not sure how to set up firewalls, but I'll find that out later too. Any tips about removing it from...

    Question125 pointsBadges:
  • Malware removal software vs hard drive sanitation software

    My computer has slowed to a snails pace. Suspecting spyware or a virus I tried downloading free removal software from the internet such as AVG, Noadware, etc. Some were bait and switch offering scans but charged for removal. Usable free removal software had not effect and did not work. Would...

    ChcukT5 pointsBadges:
  • Malware removal from a Windows XP laptop

    My question: How do I remove malware in a Windows XP laptop? The malware appears to be a Trojan horse. The registry seems to be affected. What is the best resolve? thanks

    Golfer2110 pointsBadges:
  • Mutiple security programs

    Is it okay to have 3 different security programs. To make sure as much spyware, viruses, and worms be identified as possible?

    Quietthyme5 pointsBadges:
  • TROJAN deletion

    I acquired a TROJAN that has become a bit of a problem to get rid. I have tried reformatting my flash drive since that's where it originated with no results. It has jumped to my laptop and though it does not seem to be causing a problem I still would like to clear it. I have change virus protection...

    Triton5 pointsBadges:
  • Is win32.packed.krap.3 a virus file?

    Hi, this is nidhish from Delhi. I have a file which name is win32.packed.krap.3 if you know about this file, please tell me what is this? If you have solution to delete this file then please help me.

    Itbuddy15 pointsBadges:
  • any solution for this virus/spyware

    I got a weird symptom in my computer. Can not access Microsoft download website Can not get updated spyware data (Zone Alarm), but it works with anti virus data All of those symptom cause of connection failure. Sometimes if I click in browser, it will open another browser. I use Zone Alarm as...

    Hendi45 pointsBadges:
  • Help with errors

    I am getting critical system error announcements with my computer and says I need to get it fixed. It says I need to download some kind of repair site. Well I did and it told me the problems I have but in order to fix the problem I have to pay for it. I dont have the money right now. According to...

    Virginiakay5 pointsBadges:
  • confliker virus

    Just curious, has anyone encountered an issue with this today or was the rumor of this being a problem today just an April Foll's joke in itself?

    Technochic57,010 pointsBadges:
  • Hallmark virus attack

    Hi our organization is facing onslaught of the HALLMARK virus.Symantec has no TA\update on this latest variant as of today i.e. JAN 13-2009 If anyone has experienced this Virus in corporate environment please share your comments and suggestions for mitigating the adverse impact of this Virus.By the...

    Paramnarang5 pointsBadges:
  • Do I have malware on my system?

    I have been told that if you cannot see your start-up item in the system configuration utility window under the start-up tab, that's an indication that you have spyware. Is there any true to this?

    Windows Security ATE160 pointsBadges:
  • Cure for Malware Antivirus 2009

    Anybody know a cure for malware Antivirus 2009?

    jfa0215 pointsBadges:
  • Connect to a Vista laptop in the field without any remote software.

    How can we connect to a remote laptop running Vista Pro in the field to run an AV scan and a Malwarebytes scan? Can we initiate this over the net without any pre-installed software?

    Karl Gechlik9,860 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • Removable media scanned for malware

    Why should removable media be scanned for malware “on-demand” and/or “upon insertion?”

    lorenlamam5 pointsBadges:
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • What are some of the best practices in handling computer viruses?

    I know this might sound like a broad question but I'm looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I'm not looking to talk about the prevention of viruses but...

    ITKE352,580 pointsBadges:
  • Transmitting encrypted PDFs via email

    Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

    ITKE352,580 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE352,580 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following