Thursday, December 6, 2007

3 Steps For Removing Outlaw Computer Viruses

A new type of worm is available on the cyberspace and it is best that you cognize how to take it. The Outlaw or Freedom Worm will disable your control on any system options that you have. It will assail and infect your music files, attempting to cancel them all.

To recover control of your personal computer you must be able to run your undertaking manager. You will necessitate to travel on the internet, happen and download a tool that enables you to take restrictions. Undertaking director can also be enabled from your registry.

Here is how you can make this:

1. You will happen and entree the register editor. Then you will happen a data file called the control elevation cancel option. When you attain this data data file you will see a new file labeled disable undertaking manager. Chink on this data file and then you will choose no or false. You may utilize the figure 1 for true, or the figure 0 for false this volition enable the undertaking director again.

2. After doing this, you will necessitate to free your computing machine of this worm by simply deleting all of the data files that are related to it. The data data files that the worm will put in on your files are: systems.com, autorun.inf and taskmger.com. These data data files are located on every contaminated thrust of your computer.

So if you have got numerous partitions, be prepared to happen a transcript of the worm's files on every partition. The data file system.com volition be located in a booklet called the recycler. The data file autorun.inf and taskmger.com are located first in the root of your thrust and are located 2nd in your windows/system32 folder.

3. The concluding measure in getting quit of this malicious worm is to entree your register again and take the register key that it have installed. The cardinal is located in the data files shell and the User unit of measurement area.

To travel there you will necessitate to follow the register path. The way will be labeled in this order (UserMicrosoftWindowsCurrentVersionWinlogon). Once you are there you will necessitate to chink on the data data files listed above and take any further information that is related to the worm, you may get with the way for running the files. These data data files will be labeled indistinguishable to the files you just deleted.

Labels: , , , ,

0 Comments:

Post a Comment

<< Home