Solved

How to detect non-process virus(trojan)

Posted on 2004-04-25
6
1,433 Views
Last Modified: 2013-12-04
Hello Everybody

Can anyone teacher me how to detect non-process virus(ex: Perfect Keylogger) without using software because i'm using user account in Window 2000
0
Comment
Question by:clbitman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 12

Accepted Solution

by:
trywaredk earned 125 total points
ID: 10916478
No i can't, but ...

Cleaning your computer  - and protecting it in the future -  can't be answered with one issue.

As you can see in my url below there are at least 7 different issues, where you should decide 1 of each, or else you does'nt protect your computer at all.

The reason is, that the many different programs not always protects against each other, and each of them does'nt protect equally.

It's very important, that you study all of these issues in my knowledgebase (some of them are freeware):
http://www.tryware.dk/English/Knowledgebase/HowToProtectYourComputer.html

BTW: I'm using the Trend Micro virus-suite, and SoftScan , and haven't got any of my servers or computers infected since 1999.

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open

0
 

Author Comment

by:clbitman
ID: 10916710
thank u very much

but i can't use software to detect and kill virus...

Any way!!??
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10917641
By using software , did you mean install software ?

without software it is going to be difficult to figure virus out. You can check the task manager or process of what is running and if it is a genuine process or not. Removing would be easy with software.

Why dont you ask your system admin to install the software and then you execute it ?

He is the one who should take care of this if he/she doesnot want to give executing or installing permissions to user.

All the best
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 
LVL 67

Expert Comment

by:sirbounty
ID: 10917812
Try Start->Run->Taskman to gain access to Task Manager.
Now make a note (jot down) all the running processes.
If you ever experience any quirkiness in the future - repeat this process and compare the running processes.  If something is there that wasn't before - you may suspect something is amiss.
To remove it temporarily, click Start->Run->MSconfig and deselect it on the startup tab...
0
 

Author Comment

by:clbitman
ID: 10935487
First, tx to sunray_2003 for advice

Reply to sirbounty: I using Win2k ,i can't use taskman and can run msconfig in win2k


0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10966996
:o) Glad I could help you - thank you for the points
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Nessus Scan 1 73
Move Event Log in windows 2012 3 115
Does enabling / running  "Net logon" service in Win 2008 / 2012 pose any security impact 5 81
is this a virus? 3 85
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question