Solved

How to detect non-process virus(trojan)

Posted on 2004-04-25
6
1,436 Views
Last Modified: 2013-12-04
Hello Everybody

Can anyone teacher me how to detect non-process virus(ex: Perfect Keylogger) without using software because i'm using user account in Window 2000
0
Comment
Question by:clbitman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 12

Accepted Solution

by:
trywaredk earned 125 total points
ID: 10916478
No i can't, but ...

Cleaning your computer  - and protecting it in the future -  can't be answered with one issue.

As you can see in my url below there are at least 7 different issues, where you should decide 1 of each, or else you does'nt protect your computer at all.

The reason is, that the many different programs not always protects against each other, and each of them does'nt protect equally.

It's very important, that you study all of these issues in my knowledgebase (some of them are freeware):
http://www.tryware.dk/English/Knowledgebase/HowToProtectYourComputer.html

BTW: I'm using the Trend Micro virus-suite, and SoftScan , and haven't got any of my servers or computers infected since 1999.

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open

0
 

Author Comment

by:clbitman
ID: 10916710
thank u very much

but i can't use software to detect and kill virus...

Any way!!??
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10917641
By using software , did you mean install software ?

without software it is going to be difficult to figure virus out. You can check the task manager or process of what is running and if it is a genuine process or not. Removing would be easy with software.

Why dont you ask your system admin to install the software and then you execute it ?

He is the one who should take care of this if he/she doesnot want to give executing or installing permissions to user.

All the best
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 67

Expert Comment

by:sirbounty
ID: 10917812
Try Start->Run->Taskman to gain access to Task Manager.
Now make a note (jot down) all the running processes.
If you ever experience any quirkiness in the future - repeat this process and compare the running processes.  If something is there that wasn't before - you may suspect something is amiss.
To remove it temporarily, click Start->Run->MSconfig and deselect it on the startup tab...
0
 

Author Comment

by:clbitman
ID: 10935487
First, tx to sunray_2003 for advice

Reply to sirbounty: I using Win2k ,i can't use taskman and can run msconfig in win2k


0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10966996
:o) Glad I could help you - thank you for the points
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question