Skip to main content

Remove 'Shortcut Virus' and 'Automatically creating undeleteable Folder Virus' Without any anti-virus

Being a hosteler I can understand how capable is a computer virus in spreading like a plague in a society. Many people who do not have a deep knowledge about working of a computer feel helpless in front of such viruses even after having some paid anti-virus softwares.
Its time that we take matter into our own hands..

  • Open task manager as administrator. To do this you can open command prompt as admin by typing 'cmd' at the start menu and then right click and choose 'Run as Admin' and type taskmgr and press enter.
  • Go to processes tab and find a process 'wscript.exe'. It is a process which execute the scipts on your windows computer. Its presence shows that a script is running on your computer.
  • To delete a shortcut virus you need to end this wscript.exe process.
  •  Now go to My computer or windows explorer and click organize on top left corner, Go to folder options and then View tab, and click on 'Show hidden files' and UNCHECK 'hide protected OS files', click yes and Ok. This is because mostly all the virus files are hidden using system attribute.
  • Go to the drive which has stored your Windows files (generally C:/). Search for any file with .vbs extension, you can do this by searching '*.vbs'. The virus file would GENERALLY be named according to the name of folder being created or some useless name like asdfgdnjd or csdafdsacd etc. inside C:/Users/Username/AppData folder. Beware of interfering with any wrong file, if you are suspicious about one, google its name.
  • Once you find a suspicious file, right click on it and select 'open file location', You will be redirected to the folder which contain that file with another file with .exe extension. Permanently delete both .vbs and .exe file by pressing shift+del keys.
After deleting the virus file to be able to see the infected files you need to set the attribute of 'infected' files back to normal, for this:

  • Open command prompt as admin.
  •  Go to the path where the files were infected by typing 'cd pathname.
 For eg: cd f:/folder

  • Now type 'attrib *.* -s -h'  and press enter. This will convert all your hidden system files back to normal. If a folder or file is left you can use attrib folder/filename -s -h -r
  •  Now delete all the shortcuts from the location by using command del *.lnk
Any other query or suggestions are welcomed as comments.




Comments

Popular posts from this blog

Testing React loader with React Testing Library

 I have came across this situation so many times where I need to write a unit test for a component pattern I have developed so many times that I can write the code with my eyes closed. BUT what about unit testing! That's something my mind thought is the best candidate to get rid of in order to store more cat memes. Even when these patterns are used almost everywhere and we write the tests for each one of them (I hope you do) but still we (it can't be just me) tend to forget them and get even more confused with those pesky `act` warnings. So I decided to curate a recipe book for some common unit tests which I come across and might be useful for future me. Happy to share the github repo and also would love to see if anyone has more such common unit testing patterns which they can add or suggest. https://github.com/Charchit26/react-testing-library-recipes Now, let's talk about the one I have coded a dozen times and still take half an hour to struggle with its unit tests - Load

Send Anonymous Mails!

Ever thought of a mischievous act like sending a mail with  a fake identity or using someone else's identity?? Sure, if you have that naughty prankster hidden in you! So there are ACTUALLY two common sites which may help you in such pranks.. They are... 1: http://www.sendanonymousemail.net/ Its got a pretty easy and user-friendly interface which makes it so special.. 2:   https://emkei.cz/ It can be considered as the advanced version for sending fake mails.. Its got a good variety of options for "geeks" as well as an html editor for cutomizing the mails! But Do Remember that  these tools would let you   send anonymous emails   free of cost   and let you be  hidden   at the same time, but they Do store your IP addresses, just in case your anonymous email indulges in illegal activities! So, Do NOT even try to send scary threats or spam like messages because you may get caught very easily and can be charged with fraudulent charges and can be pu

Re-usability vs Readability

Recently while developing some features for a client's React app I faced this dilemma: What to prefer over another - Readability or Re-usability. My first reaction to it was what any other great developer in the history of web applications would have done - "Google it out". I found some good articles and blogs around it but still I had my doubts, since at many such places the examples used were heavily dependent on the individual's situation. So, my next move was to consult a peer or another dev from the community whom I trust, and who is better to trust then random people on twitter! I would admit that I did not expect some of those answers but it really taught me one most important thing in software development - "Everything is situational". In other words, I was introduced to "anti-patterns" in real life! Good read for the difference between patterns and anti-patterns . <*Insert a funny gif related to anti-patterns here(if you find one