"Best not to browse Microsoft Office 2010

this kind of posts, and update antivirus software." According to rising company staff introduced, recently Edison, Cecilia cheung, gillian chung etc enthusiasm of hackers using pictures into objects, they have found more than 200 contain Trojan virus web pages. Users browse the web Office 2010 –save your time and save your money.

hackers established poisoned web pages, QQ passwords, network game password will be stolen.

Because running program, so the virus protection by Windows even after being found also often can't kill, delete. Antivirus software can't kill virus? The past generally recommend in safe mode Microsoft Office is so great!

or DOS mode killed. Now there is a new method, called "in the image file specified debugger executive options," using this method antivirus should is feasible. Its principle is modifying registry, let the virus in computer restarts, then antivirus unable to start. The procedure is as follows:

1. The discovery of the virus. If use anti-virus software to search, or in task manager (Ctrl, Alt, Del three key neat press) suspicious procedures.

2. Click "start", "run", fill in "regedit", click ok, into the registry editor.

3. In the registry path HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ Microsoft outlook 2010 is convenient!

CurrentVersion \ add this File in a new build a PC (literally call what), in a new string within a descriptor value, named "Debugger", double click, input to ban File path.

For example, found that process, the path has Trojan virus or for C: \ aaa \ 123. In just, the exe a The invention of Microsoft Office 2010 is a big change of the world.

Debugger input in C: \ \ aaa \ \ 123. Exe (here in double diagonal line through path diagonal line through).

4. Close the registry editor and restart the computer. Then the virus cannot start, then delete it directly.

Exploit. Agent. "proxy" jk variant "agency" script is jk one of the newest member family of viruses, using the operating system and an application spread other malicious programs of loopholes, using javascript script language, and encrypted processing. "Agent" variant jk general Outlook 2010is powerful.

embedded in the page, if users normal computer not to upgrade repair operating system corresponding loophole patch and some applications, then the corresponding loophole patch when users use the browser visit with a "proxy" variant of malicious website, visit our jk in the current user computer background connection, download site of designated hackers and malicious programs on the infected computers running is invoked automatically. Downloaded malicious programs may contain is online Trojan, malicious AD program, the back door, etc, to bring different degree of loss user.

9/11/2011 06:08:02 am

keep on posting

Reply
12/4/2011 05:37:39 pm

SysTools OST Recovery tool - Repair Outlook OST Tool for repair every corrupt exchange OST to PST file instantly.

Reply



Leave a Reply.