Link to home
Create AccountLog in
Security

Security

--

Questions

--

Followers

Top Experts

Avatar of Nathan Yu
Nathan Yu🇺🇸

Keeps duplicating

Temp file virus keeps on popping up 

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Avatar of Gerwin JansenGerwin Jansen🇳🇱

We need more information to be able to help you. 


Avatar of serialbandserialband🇺🇦

Do you have a virus scanner?  Run a scan.

If you can remove the disk and run a scan from a clean system, that would be better.


Here is the first step in case of a virus in memory.

 

Try to look at the name of the executable that use the virus (Use task manager, or tasklist in command line).

 

Then use a command like:

 

TASKKILL /F /IM Executable.exe /T

 

Put this command in a script file and create a loop if necessary.

 

If that doesn't work, it better to restart the computer in Safe mode, and try to clean bad files before restarting.

 

 


Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.


Avatar of john reasejohn rease🇺🇸

can you explain the virus?

for example, is it one of those viruses that just kinda displays diologs when you turn on the computer?

or has it done any, real, harm, like has it, say, stolen your files?


This question needs an answer!
Looks like this question is still being worked on. Think you can help?
Create your account and start contributing!
Create Account
Security

Security

--

Questions

--

Followers

Top Experts

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.