?
Solved

I deleted the java cache folder

Posted on 2006-04-21
3
Medium Priority
?
241 Views
Last Modified: 2012-05-05
My computer was infected with virus Java\ByteVerify, virus Java\OpenStream and trojan horse Java\ClassLoader.

I deleted the java cache folder to delete the viruses and the trojan horse.

How do I reinstall java?
0
Comment
Question by:locke2005
  • 2
3 Comments
 
LVL 29

Accepted Solution

by:
blue_zee earned 400 total points
ID: 16507978

Start by uninstalling ALL the J2SE runtimes you find in Add/Remove Programs and reboot.

Delete the folder C:\Programs Files\Java.

Now download and install the latest runtime (JRE5.0 update 6) from here:

http://java.sun.com/j2se/1.5.0/download.jsp

After installation rebootr and test.

Zee
0
 

Author Comment

by:locke2005
ID: 16513546
How do I test it, Zee?
0
 
LVL 29

Expert Comment

by:blue_zee
ID: 16513753
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question