Computer experts - how do I remove this "trojan"?

1 Answer

Answer :

The only way to get rid of a trojan (in my experience) is to completely wipe the hard drive (e.g., format). But, I’ve lived with trojans for a few years… they never seemed to hurt any of my files or internet connection.

Related questions

Description : Computer Trojan/Rootkit virus problem please help me?

Last Answer : Have you deleted what MalwareBytes found?

Description : Semi-urgent - What is a trusted site that would tell me if a file I have is a virus, keylogger, trojan, etc?

Last Answer : Try Virus Total

Description : How can I track down the person who made a certain trojan [virus]?

Last Answer : And what would prevent people like myself from falsely claiming to be said author in order to receive your bounty?

Description : What's the difference between a Trojan and a regular virus?

Last Answer : Wikipedia has great descriptions of trojans: http://en.wikipedia.org/wiki/Trojan_horse_(computing) and computer viri.

Description : Computer experts I need your help! (more details inside)

Last Answer : answer:Bad memory (RAM) or a bad chip on the graphics card. Give more information: How much memory is it supposed to have? How much memory does it say it detects? Go into device manager ( ... pushed all the way into the angled slots. Somewhere you have a memory problem. The question is: where.

Description : Computer Experts: Please help me this issue with prl_disp_service.

Last Answer : Sorry about the typo in the question title… my bad. It should be “Please help me with this issue…” (if a mod can fix that for me and then delete this post, that would be great)

Description : Any computer experts out there? (Do you build them, fix them, know the quality of them?)

Last Answer : It won't void the warranty, but you won't be able to get tech support from the computer vendor on an OS you install yourself. Vista's principal issues were: understated hardware requirements for ... you need a Microsoft OS around because it makes some things easier (I mean besides getting malware).

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : Excel experts: how do I make this kind of a dropdown list (details inside)?

Last Answer : while in Excel, hit F1 key. Type in drop down. This is the MS help function to get you there

Description : Windows 7 experts - a video card question?

Last Answer : answer:Have you tried swapping your gpu’s into opposing pcie slots on your motherboard? Your Bios maybe detecting the 2250 as primary and win7 is just playing along.

Description : Any video card experts out there? (see details for problem)

Last Answer : The ATI control panel tools don’t let you select which card should be primary?

Description : Vista Task Scheduler Experts - I can't get the program "Tray Status" to run automatically.

Last Answer : I don't really know Windows. But TrayStatus.exe isn't really telling it where the file is. Try a complete path or cd into into the directory the file is in before running the command. Example: Microsoft ... (s) 0 bytes 2 Dir(s) 5,222,629,376 bytes free C:\Documents and Settings\johnpowell\Desktop>

Description : An analogy similar to Trojan Horse that describes letting in an attractive enemy?

Last Answer : wolf in sheep’s clothing ? or is that about as subtle as trojan horse ?

Description : Any ideas on how to get rid of the Antivirus Soft trojan?

Last Answer : http://www.avast.com/free-antivirus-download The best.

Description : Trojan Virus?

Last Answer : I don't use any of the windows protection programs instead of the firewall because I don't trust them. In all my years, I've never ever had a virus penetrate my system with AVG free edition ... and your windows one care just recognized it wrong or is being overly cautious (thats what windows does).

Description : Why the Trojan war was fought?

Last Answer : over the king of troy's new wife

Description : What is Trojan Horse ?

Last Answer : Trojan horses are a type of malware. Which, like a computer virus, enters and harms the computer in the guise of good software.

Description : I know it's a pighouse that gets into the PC, but why is it a Trojan and why a horse?

Last Answer : Hmmm ... Read the Iliad - and it will be clear to you ...: o Today, people read very little ...: D

Description : Who was kidnapped that caused the Trojan war?

Last Answer : Helen was not kidnapped, she enthusiastically ran off withParis, and stole her husband's Menelaus' treasures as well to takewith her..

Description : What city was the Trojan horse left?

Last Answer : Need answer

Description : Who was the wise old king of Troy in the Trojan War?

Last Answer : Priam.

Description : What is the modern day country where Trojan War occurred?

Last Answer : Turkey.

Description : Never Accept a Trojan Horse?

Last Answer : The original Trojan horse was sent as a gift and when opened,revealed hundreds of armed soldiers who wreaked havoc. Today'sTrojan horses are computer malware that appear to be usefulsoftware, ... a virus.Viruses, by their very definition, replicate themselves and attachto legitimate files and progr

Description : Are Trojan condoms one of the best birth control methods?

Last Answer : Male condoms are one of the most common methods of birth control, with a success rate of 85-98% effective. Male condoms are currently the only reliable and reversible Birth Control method available ... of styles of condoms including, condoms for her pleasure, trojan ecstasy, and pleasure for both.

Description : What is Trojan. Zbot?

Last Answer : Malware do not download

Description : Who led the Trojan War?

Last Answer : Prince Hector, son of King Priam.

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb

Last Answer : C) Logic Bomb

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus

Last Answer : A) Trap doors

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm