Mikec2500, RW, and TARFU have given you some good answers. If you can, download the Ewido security suite and see if this can take care of the problem for you. Make sure that you update whatever security program you use and if you can't boot from a floppy, like Tarfu said, then try to do it in safe mode. Symantec has a good variety of tools for specific viruses that are downloadable if you know which you are dealing with. I recently answered a similar question on this subject. perhaps, you can get some more info from this:
http://ca.answers.yahoo.com/question/index;_ylt=Ajs7.94D61quEBfTVXuNzAbAFQx.?qid=20060823164956AAkEdIv
You could also do a search for questions ^ up there under the ASK ANSWER DISCOVER bar. Type in the terms and see if you can find information that you understand and can follow the procedures. Remember...some virus etc. are harder to get rid of than others, so be prepared to format and reinstall if all else fails! This should only be done as last resort!
2006-08-24 20:01:16
·
answer #1
·
answered by *ღ♥۩ THEMIS ۩♥ღ* 6
·
2⤊
0⤋
This will work if you have access to another uninfected system.
Make an antivirus disk (floppy) on the uninfected system (the procedure varies between anti-virus brands but can usually be found in the help files), it does not matter what brand you make the disk from (Symantec, McAfee, Panda etc). The disk will need to be bootable but that is usually taken care of when the anti-virus disk is made.
Boot the system on the floppy you created. Run the antivirus executable and have it do a complete system scan. Normally the reason an antivirus program can not clean or quarantine a virus / trojan is the program is resident in system memory. When you boot off a floppy the only running programs are those on the floppy, there by the trojan is domant and able to be removed.
2006-08-24 23:16:24
·
answer #2
·
answered by TARFU 3
·
2⤊
0⤋
The phrase Trojan Horse Virus is just a description of the way you can get it. A trojan horse virus is a virus that disguises itself as something else (a song file for example). When you try to listen to that song file, you might get a couple seconds of the song (if you are lucky) or there might just be an error. However, in the background, the virus starts running and installs itself or does whatever else it might have been created to do.
You should remove all viruses from your computer any time you find one. If McAfee isn't working (which doesn't surprise me), download and install Avast anti-virus from http://www.download.com for free and after installing it have it run a boot scan (you will be promted during the install). You can then remove your McAfee program as it is pretty much useless, and run Avast instead.
2006-08-24 22:36:41
·
answer #3
·
answered by John J 6
·
3⤊
0⤋
Well if Mcafee wont delete it try getting a spyware remover like adaware it should remove that trojan right away try it http://www.lavasoftusa.com/software/adaware/ or spybot http://www.safer-networking.org/en/index.html a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. For example it may be a song you downloaded but actually it may be a trojan once you click it it activates and may install keyloggers on your computer and even hidden spying infromation that can lead hackers into your computer .You can read about trojan horses here http://en.wikipedia.org/wiki/Trojan_horse_(computing)
2006-08-24 22:34:50
·
answer #4
·
answered by Mike 3
·
3⤊
0⤋
Trojan Horses are not virus, same idea as malicious code, but it is a fixed piece permanently attached to a benign-looking program that probably originate from the same programming author, to actually remove it delete the program itself. It cannot propagate.
There are few instances a program only achieved its intended action by tricks, those tricks mistakenly reported as part of malicious chain of actions by a Trojan.
2006-08-24 22:39:16
·
answer #5
·
answered by Andy T 7
·
0⤊
2⤋
A Trojan horse program has a useful and desired function, or at least it has the appearance of having such. Trojans use false and fake names to trick users into dismissing the processes. These strategies are often collectively termed social engineering. In most cases the program performs other, undesired functions, but not always. The useful, or seemingly useful, functions serve as camouflage for these undesired functions. A trojan is designed to operate with functions unknown to the victim. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind, but typically they have malicious intent.
In practice, Trojan Horses often contain spying functions (such as a packet sniffer) or backdoor functions that allow a computer to be remotely controlled from the network without the owner's knowledge, creating a "zombie computer". The Sony/BMG rootkit Trojan, distributed on millions of music CDs through 2005, did both of these things. Because Trojan horses often have these harmful behaviors, there often arises the misunderstanding that such functions define a Trojan Horse.
In the context of Computer Security, the term 'Trojan horse' was first used in a seminal report edited/written by JP Anderson (aka 'The Anderson Report' (Computer Security Technology Planning, Technical Report ESD-TR-73-51, USAF Electronic Sysstem Division, Hanscom AFB, Oct, 1972), which credits Daniel J Edwards then of NSA for both the coinage and the concept. One of the earliest known Trojans was a binary Trojan distributed in the binary Multics distribution; it was described by PA Karger and RR Schell in 1974 (Multics Security Evaluation, Technical Report ESD-TR-74-193 vol II, HQ Electronic Systems Division, Hanscom AFB, June 1974).
The basic difference from computer viruses is that a Trojan horse is technically a normal computer program and does not possess the means to spread itself. The earliest known Trojan horses were not designed to spread themselves. They relied on fooling people to allow the program to perform actions that they would otherwise not have voluntarily performed.
Trojans implementing backdoors typically setup a hidden server, from which a hacker with a client can then log on to. They have become polymorphic, process injecting, prevention disabling, easy to use without authorization, and therefore are abusive.
Trojans of recent times also come as computer worm payloads. It is important to note that the defining characteristics of Trojans are that they require some user interaction, and cannot function entirely on their own nor do they self-propagate/replicate.
2006-08-24 22:37:02
·
answer #6
·
answered by Anonymous
·
0⤊
3⤋
There are many different Trojan viruses...copy the exact name of the virus, then go to Symantec.com and Mcafee.com, and type it in "search" to research it...if theres any repair , either site should list it...they also explain what damage they do...hope this helps.
2006-08-24 22:38:52
·
answer #7
·
answered by R W 4
·
2⤊
0⤋
Dont care a niddle...
That is a gentle horse!
2006-08-25 12:28:03
·
answer #8
·
answered by ? 1
·
0⤊
2⤋
You need to use your restore disc or your windows CD and reformat.
2006-08-24 22:36:49
·
answer #9
·
answered by Anonymous
·
0⤊
4⤋
trojan good hold!!!
2006-08-24 22:35:44
·
answer #10
·
answered by Anonymous
·
0⤊
3⤋