Skip to main content

Remove 'Shortcut Virus' and 'Automatically creating undeleteable Folder Virus' Without any anti-virus

Being a hosteler I can understand how capable is a computer virus in spreading like a plague in a society. Many people who do not have a deep knowledge about working of a computer feel helpless in front of such viruses even after having some paid anti-virus softwares.
Its time that we take matter into our own hands..

  • Open task manager as administrator. To do this you can open command prompt as admin by typing 'cmd' at the start menu and then right click and choose 'Run as Admin' and type taskmgr and press enter.
  • Go to processes tab and find a process 'wscript.exe'. It is a process which execute the scipts on your windows computer. Its presence shows that a script is running on your computer.
  • To delete a shortcut virus you need to end this wscript.exe process.
  •  Now go to My computer or windows explorer and click organize on top left corner, Go to folder options and then View tab, and click on 'Show hidden files' and UNCHECK 'hide protected OS files', click yes and Ok. This is because mostly all the virus files are hidden using system attribute.
  • Go to the drive which has stored your Windows files (generally C:/). Search for any file with .vbs extension, you can do this by searching '*.vbs'. The virus file would GENERALLY be named according to the name of folder being created or some useless name like asdfgdnjd or csdafdsacd etc. inside C:/Users/Username/AppData folder. Beware of interfering with any wrong file, if you are suspicious about one, google its name.
  • Once you find a suspicious file, right click on it and select 'open file location', You will be redirected to the folder which contain that file with another file with .exe extension. Permanently delete both .vbs and .exe file by pressing shift+del keys.
After deleting the virus file to be able to see the infected files you need to set the attribute of 'infected' files back to normal, for this:

  • Open command prompt as admin.
  •  Go to the path where the files were infected by typing 'cd pathname.
 For eg: cd f:/folder

  • Now type 'attrib *.* -s -h'  and press enter. This will convert all your hidden system files back to normal. If a folder or file is left you can use attrib folder/filename -s -h -r
  •  Now delete all the shortcuts from the location by using command del *.lnk
Any other query or suggestions are welcomed as comments.




Comments

Popular posts from this blog

Testing React loader with React Testing Library

 I have came across this situation so many times where I need to write a unit test for a component pattern I have developed so many times that I can write the code with my eyes closed. BUT what about unit testing! That's something my mind thought is the best candidate to get rid of in order to store more cat memes. Even when these patterns are used almost everywhere and we write the tests for each one of them (I hope you do) but still we (it can't be just me) tend to forget them and get even more confused with those pesky `act` warnings. So I decided to curate a recipe book for some common unit tests which I come across and might be useful for future me. Happy to share the github repo and also would love to see if anyone has more such common unit testing patterns which they can add or suggest. https://github.com/Charchit26/react-testing-library-recipes Now, let's talk about the one I have coded a dozen times and still take half an hour to struggle with its unit tests - Load...

Send Anonymous Mails!

Ever thought of a mischievous act like sending a mail with  a fake identity or using someone else's identity?? Sure, if you have that naughty prankster hidden in you! So there are ACTUALLY two common sites which may help you in such pranks.. They are... 1: http://www.sendanonymousemail.net/ Its got a pretty easy and user-friendly interface which makes it so special.. 2:   https://emkei.cz/ It can be considered as the advanced version for sending fake mails.. Its got a good variety of options for "geeks" as well as an html editor for cutomizing the mails! But Do Remember that  these tools would let you   send anonymous emails   free of cost   and let you be  hidden   at the same time, but they Do store your IP addresses, just in case your anonymous email indulges in illegal activities! So, Do NOT even try to send scary threats or spam like messages because you may get caught very easily and can be charged with fr...

Recipe for chaos in an XP team

Our team failed! We failed in delivering value to the client, value to our users as well as we failed in showing the benefits of XP - eXtreme Programming to not only other teams but our managers as well. So here I am listing some of the factors which I think lead to the fall of the project, the practices and eventually the team itself. We were quite fine an year ago. We used to pair, practice TDD, interview users frequently and release awesome features to production almost weekly. I would not go to the extent of saying we were living in perfect times, since we faced some very common problems - Some people felt that TDD made them slow. Management kept questioning whether pair programming is really "fast enough" and not slowing us down. This gave birth to some "Duct Tape Programmers" in the team. (That's a real term! Google it.) "The Duct Tape Programmer is someone who is able to cobble together software that solves the immediate problem, but witho...