Solved

false remote operstion

Posted on 2003-11-04
3
249 Views
Last Modified: 2010-04-12
Using a widows machine progams have been launching and shutting down by themselves. Norton antivirus and ad-adware did not detech any problems. The virus/ad is spreading to other machines on the network.

Looking for a solution.
0
Comment
Question by:dpctechhelp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 125 total points
ID: 9691214
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9691217
Have you checked your system for viruses , downloading the latest virus definitions

Sunray
0
 
LVL 3

Expert Comment

by:ydirie
ID: 9845200
can you please post the solution to this one. thanks
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question