Jump to content
Posted 24 January 2008 - 03:04 PM
Posted 24 January 2008 - 06:53 PM
Posted 24 January 2008 - 08:07 PM
Did your scan provide a specific file name associated with this malware threat and if so, where is it located (full file path) at on your system? If your scan saved a log file, it should show exactly what and where the malware was found so post that instead.
How to disable-enable Windows Scripting Host.
Posted 25 January 2008 - 08:14 AM
Posted 25 January 2008 - 10:47 AM
Posted 25 January 2008 - 12:12 PM
Posted 25 January 2008 - 02:04 PM
Rogue Remover would not create that.
The HOSTS file is found in these default locations:
Windows Vista -> C:\WINDOWS\SYSTEM32\DRIVERS\ETC
Windows XP -> C:\Windows\system32\drivers\etc\hosts
Windows 2K -> C:\WInnt\system32\drivers\etc\hosts
Windows 98 -> C:\Windows\hosts
Windoes ME -> C:\Windows\hosts
Posted 25 January 2008 - 04:23 PM
Caution: Be careful of what you copy and paste with this tool. OTMoveIt is a powerful program, designed to move highly persistent files and folders. Not following the directions as instructed or using incorrectly could lead to disastrous problems with your operating system.
Posted 25 January 2008 - 11:13 PM
Posted 26 January 2008 - 10:08 AM
0 members, 0 guests, 0 anonymous users