Results 1 to 2 of 2

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Öèö Ëàãìèí LorDDemoniC's Avatar
    Join Date: Oct:2007
    Location: Ñàìîêîâ
    Posts: 370

    Âèðóñ èíôî ?

    Êàêâî ïðàâè òàÿ ãàä w32 AutoIT:Balero ??? ×å îáèêàëÿ ôèðìåíàòà ìðåæà è ñàìî ñåå íÿêâè exe-òà ïî øåðíàòèòå ïàïêè ? Ïðèíöèïíî ëîâè ãè exe-òàòà ñàìî àâàñòà , íî íå ãè ïðåìàõâà (òîåñò ìàõà ãè, íî âèðóñà ïðîäúëæàâà äà ñå ðåïëèêèðà)

  2. #2
    Registered User Jackson's Avatar
    Join Date: Dec:2008
    Location: Õàñêîâî
    Posts: 60
    Ïîíå äîêîëêîòî èíôî ìîæà äà ñå íàìåðè íà ñòðàíèöàòà íà AVG îòíîñíî ïîñî÷åíèÿ âèðóñ èçëåçå ñëåäíîòî :

    A Trojan Horse is a malicious application, which can not spread itself. Original Trojan Horses were programs which acted as a useful utility. Although, in fact, their start used to cause damage to disc content (or part of it).

    At the present time the most spreading Trojan Horses are BackDoor Trojans. They enable remote access to infected computers and PSW (Password Stealers) - they are trying to gather as much private information from the infected computer as possible and to send the info through the Internet.

    To remove the Trojan Horse, it is enough to delete the detected file.

    Êàêòî å íàïèñàíî â ïîñëåäíîòî èçðå÷åíèå, äîñòàòú÷íî å äà ñå íàìåðè çàðàçåíèÿ ôàéë è äà ñå èçòðèå.
    Ñàìî äâå íåùà ñà áåçêðàéíè - Âñåëåíàòà è ÷îâåøêàòà ãëóïîñò, êàòî çà ïúðâîòî íå ñúì ñèãóðåí.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 1999-2011 Õàðäóåð ÁÃ. Âúçìîæíî å ñúäúðæàíèåòî íà òàçè ñòðàíèöà äà å îáåêò íà àâòîðñêè ïðàâà.
iskamPC.com | mobility.BG | Bloody's Techblog | Êðèïòîâàëóòè è ìàéíèíã | 3D Vision Blog | Ìàãàçèí çà åëåêòðîííè öèãàðè