You do not look lightly on this one virus. Never mind the usual administrators, Vaksinis (Vaksincom technicians) who every day struggling with the virus and the daily food (other than rice) is to conduct onsite visits to eradicate the virus Vaksincom corporate customers throughout Indonesia, if the customer gets the task of visiting an infected Virut, they directly excited. This is not because there is an estimated or because the employee visited the office beautiful, but because, kalaukomputer Virut already infected, that means they will almost certainly overtime. Just look at the action. After successfully infected, she will direct the host to delete it.
Virut will infect all exe files, not to mention the Windows OS files and, in so many files that were infected and so the complexity of the problems caused, some antivirus vendors even suggest aka Pasopati step format and reinstall Windows if you are infected Virut.
In addition, Tanah Abang like thugs who once controlled a territory would invite his friends, Virut also be downloaded belasanvirus, new spyware from dozens of sites on the Internet. That way, once infected Virut, cleaner needed Virut not only cleaner, but also cleaner semuavirus and malware.
If you think have suffered enough, you're wrong. Virut also replace the file tcpip.sys and NDIS.sys which resulted in you will not be able to connect to the network if you delete files hosted Virut.
More sophisticated, Virut not change the original date of files so you can not detect the files on the infection of it by seeing "Date Modified" or the last modified file in Windows Explorer. However, what happens is changing the size of infected files it, be increased by about 22 KB. To know this, you should compare the same files your computer with other computers.
Sunday, March 13, 2011
Subscribe to:
Post Comments (Atom)
Popular Posts
-
On Wednesday, Microsoft warned of a gap in the browser Internet Explorer made they can make an attacker to access files stored on compu...
-
Total losses from cyber crime were reached hundreds of billions of dollars. It was so 'whip' for the manufacturer of anti virus, ...
-
Excess antivirus smadav: SmadAV very easy to operate. The process is very fast scan. Can be used instantly (previous versions) without...
-
Advantages and Disadvantages of AVG Antivirus. AVG Antivirus excess are as follows : 1. AVG Installation is quite easy 2. Auto updat...
-
New Panda Antivirus Pro is not part of the best antivirus in 2012, then the antivirusPanda Antivirus Pro 2012 is worth your sandingkan wi...
-
Want to know anyone who saw your profile on Twitter ? Do not be easily fooled by 'tempting offer' like that. The problem now many...
-
More than 10 sites owned by Microsoft under attack Domain Name System (DNS) from the hackers. As quoted from Win Rumors, hack attack is p...
-
Almost the majority of computer users do not want to name a computer virus. A computer virus is in the sense of a diverse program of its ...
-
Tips on Overcoming Impaired Computer Device. THERE six myths about computer viruses. 1. Monitor blinks This is one form of misunderst...
-
Although long enough AVI update server is not active. The problems that we face are often experiencing server overload facing a flood of use...
0 comments:
Post a Comment