Solved

TROJAN

Posted on 2004-03-20
8
158 Views
Last Modified: 2010-05-18
Q1)  winnt\system32\keyword.exe  trojanspywin32.newrok how can I fixes

Q2)  can find C:\winnt32\bridge  how to fix

 software windows 2000
0
Comment
Question by:pokagon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
8 Comments
 
LVL 16

Accepted Solution

by:
JamesDS earned 168 total points
ID: 10643888
0
 
LVL 40

Assisted Solution

by:Fatal_Exception
Fatal_Exception earned 166 total points
ID: 10643918
Also, try these:

Trojan Remover :http://www.simplysup.com/

Online trojan scan www.trojanscan.com

FE
0
 
LVL 4

Assisted Solution

by:jcoppin
jcoppin earned 166 total points
ID: 10646244
http://housecall.trendmicro.com
Another online virus scanner.
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 11485910
One of these suggestions should have helped...
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 11570230
Thks
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article describes how to import Lotus Notes Contacts into Outlook 2016, 2013, 2010 and 2007 etc. with a few manual steps. You can easily export and migrate Lotus Notes contacts into Microsoft Outlook without having to use any third party tools.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question