Jump to content
Posted 25 January 2014 - 11:16 AM
Posted 25 January 2014 - 11:18 AM
Posted 25 January 2014 - 11:32 AM
Posted 25 January 2014 - 11:35 AM
Posted 25 January 2014 - 11:40 AM
Posted 25 January 2014 - 12:35 PM
Posted 25 January 2014 - 12:47 PM
What are some signs that my computer may be infected or hacked into?
* If you see pop-ups that run automatic scans and says that your computer is infected with a ridiculous amount of viruses, this is a sign you may have a fake antivirus program
* If your screen turns black and all of your start menu items and desktop icons disappear.
* If you start up your computer and see random 'black screens' (command prompts) pop up and close.
* If your computer is running unusually slowly. This could mean that your computer is running programs in the background that you don't know about.
* If you are getting a lot of emails returned with virus warnings.
* If you see your computer icons running away from you as you try to click on them, or if your computer decides to 'chat' with you.
* If you see black console screens open and close when you boot up your computer.
Posted 25 January 2014 - 12:58 PM
Posted 25 January 2014 - 01:21 PM
Posted 25 January 2014 - 01:42 PM
Posted 25 January 2014 - 01:47 PM
That's good nothing was found.
Now try doing an online scan to see if it finds anything else that the other scans may have missed.
Please perform a scan with Eset Online Anti-virus Scanner.
If using Mozilla Firefox, you will be prompted to download and use the ESET Smart Installer. Just double-click on esetsmartinstaller_enu.exe to install.
Vista/Windows 7/8 users need to run Internet Explorer/Firefox as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
-- Note: If you recognize any of the detections as legitimate programs, it's possible they are "false positives" and you can ignore them or get a second opinion if you're not sure. Eset's detection rate is high and can include legitimate files which it considers suspicious, a Risk Tool, Hacking Tool, Potentially Unwanted Program, a possible threat or even Malware (virus/trojan) when that is not always the case. Be careful what you choose to remove. If in doubt, ask before taking action.
Posted 25 January 2014 - 03:47 PM
Edited by Bulbasaurs, 25 January 2014 - 03:48 PM.
0 members, 0 guests, 0 anonymous users