How to REMOVE VIRUS URSELF:-
1) Goto Run>cmd.
2) Type “:” in the
command prompt and hit “Enter“.
(“Drive_name” is where the problem
occurs, it may be any USB drive)
3) Type “attrib” and hit “Enter“. (This
shows the files that are present in
the currently working directory. You
can also use the command “dir/w/
o/a/p“)
4) If there are any file named
autorun.inf or some .exe file that
you are unaware then go for next
steps else the drive is not affected
with any autorun.inf file.
5) Type “attrib -h -r -s -a *.* ” then
hit “Enter“. (This command removes
the Hidden, Read Only, System and
Archive attributes over any file)
6) After unhiding and removing
attributes you can see the files. So
you can delete the file now.
7) Type “del ” in the
Command Prompt and hit “Enter“.
8) you can also rename the file by
typing " rename autorun.inf aa"(aa
is new name) to delete the file.
Categories
- 000 frnds (1)
- 12 UNKNOWN programming language (1)
- Alibaba (1)
- Amazon (1)
- Amd (1)
- Android (7)
- Apple (5)
- Bank (1)
- Bing Maps Preview is Microsoft's answer to Google Earth (1)
- Blackberry (3)
- Breaking News (1)
- Breathalyzer Could Detect Drugs (1)
- Business (2)
- Computer (2)
- Database Leaked (1)
- defacing websites (1)
- ebay (1)
- facebook (3)
- First smart phone for blind people (1)
- Game news (2)
- getting 5 (1)
- Gigabytes (1)
- Google (5)
- Google+ (1)
- Hack (3)
- Hacker can control aircraft system with Android Smartphone (1)
- hacker news (3)
- Hacking Concept (1)
- hacking with smart phone (2)
- How to disable/delete your victim's Antivirus? (1)
- How to sent message on fb if anyone is blocked? (1)
- HP (1)
- Imortant news (1)
- instagram (1)
- Intel (1)
- internet (3)
- iOS (1)
- iphone (1)
- iPhone history (1)
- IT (1)
- Lenovo (1)
- Mac (1)
- Microsoft (11)
- Microsoft Surface 2 A Competitive Offering (1)
- Microsoft's Windows 8.1: When will users get the final bits? (1)
- military (1)
- Mobile (4)
- Modern-style Firefox for Windows 8 pushed back to March (1)
- motorcycle (1)
- New LED Streetlight Design Cuts Light Pollution (1)
- Nokia (1)
- Nokia Asha (1)
- Nvidia (1)
- One Windows Store Is The Key (1)
- Paint your TV on your own style (1)
- Paint' a TV Remote onto Your Coffee Table (1)
- pc facts (2)
- Robot (1)
- Samsung (3)
- Samsung Galaxy S3 hack (1)
- Samsung Galaxy S3 Lock screen bypass vulnerability (1)
- Smartphone (1)
- Smartphone security (1)
- Space (5)
- The 100 Best Android Apps of 2013 (1)
- The first 1 GB hard (1)
- Thinkpad (1)
- This is a list of SQL dorks can use to help you find (1)
- Top 10 PC Games Chart (1)
- Turkish Ajan Hacker Group (1)
- twitter (3)
- Ubuntu forums hacked (1)
- UFC Fight Night: HENDERSON VS. THATCH (1)
- UFC Fight Night: Rockhold vs Bisping (1)
- Video formats (1)
- Windows (5)
- World cup 2014 (1)
- World's Biggest DDoS attack (1)
- Xbox (1)
Text Widget
Tuesday, April 9, 2013
Subscribe to:
Post Comments (Atom)
Popular Posts
-
SQL injection vulnerable websites using google search. Simply goto google and type trainers.php?id= article.php?ID= play_old.php...
-
> Using GOOGLE Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured...
-
stealing $14 million from a bank It can be easier than most people think. The alleged thieves who made headlines last week for their...
-
Satellite It sounds like the opener to a sci-fi B-movie plot: Scientists find an old, dead satellite from the 1970′s orbiting Earth...
-
Video Formats and their Abbreviation A knowledge for u all Video Formats with abbreviation AAF – mostly intended to hold edit dec...
-
A Security Researcher Hugo Teso at Hack In The Box security conference has demonstrated that it is possible for a hacker to take control o...
-
UFC FIGHT NIGHT BROOMFIELD UFC Fight Night: HENDERSON VS. THATCH Main Event Time Event: UFC Fight Night: HENDERSON VS. THATCH ...
-
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes = 1 Gigabyte 1024 Gigaby...
-
How to Create Quality Content in 7 Steps Your audience wants quality content. Avoid getting lost in the details and stay on the proven p...
-
The U.S. National Security Agency (NSA) may be hiding highly-sophisticated hacking payloads in the firmware of consumer hard drives ove...
0 comments:
Post a Comment