Skip to main content

How to find out and Remove Masked Viruses (Rootkits) from a Computer?

Nowadays malware are takes advanced technologies to hide their presence from virus scanners. For example, being well masked, they dodge firewalls and virus scanners, they use hidden ADS to infect a computer (ADS - Alternate Data Stream - is a good method to hide data which is attached to a regular file or directory. So, it is a great place for malware to hide), etc. This type of malware is known as Rootkit (programs, including viruses, spyware, and Trojans), which enable administrator-level access to a computer or a network system.

This dangerous programs monitors traffic and keystrokes and make a backdoor into the system for the hacker's use. Rootkits are often hiding their presence from virus scanners, so, only a scanner specialized in this type of malware can help.

Here is a good program, Radix Anti-rootkit that uses sophisticated methodologies and removes pests and manipulated drivers, system files and processes from your system.

How to use it? Download Radix Anti-rootkit (free, 162Kb), unzip and run it from a USB stick (so windows file protection doesn’t get in the way of the tool). Check all options under ‘1-click Check’ tab. Ignore all warning messages (it is advisable to back up the registry before doing anything, because in some exceptional cases it result in a malfunctioning system)

Now click on ‘Check’ button for scanning. It will take some time to finish the scanning. After all tests complete, select all to fix the problem. After all, the program will display a list of files that have been repaired and modified.

Comments

Post a Comment

Please leave your valuable comment below

Popular posts from this blog

Surf the Web Anonymously With Firefox Add-on Phproxy

There are several web based proxy servers available to surf the internet anonymously or as from another country. The Firefox add-on (Firefox 3 – 4) Phzilla helps you view a webpage or surf the internet using the PHProxy (a type of web based proxy server) proxy servers. It is very easy and convenient to use.

Restore Lost Capacity Of Your USB Flash Drive (How to)

Some malware can hide full capacity of your USB flash drive. For example, a 4GB pen drive sometimes shows only 500kb or less. An interesting part of this situation is that, even after removing the malware or formatting the USB flash drive, you will not get back its original capacity. Therefore, the question here is how to restore a USB flash drive to its full capacity.

Privacy Policy

We at www.jkwebtalks.com give prime importance to our users’ privacy and are committed to protecting it always. If you have any doubt concerned with our website privacy policy or software, please feel free to contact us. Please read our Privacy Policy below to learn more about how we treat personally identifiable information, how it is protected and used. Log Files: www.jkwebtalks.com does NOT collect any personally-identifiable information, such as name, address, phone number or email address from users of this web site without their knowledge, and takes measures to protect their privacy. However, like other standard web site servers, we use log files to collect information purely to identify the number of visitors to this web site, what those visitors looked at and how long they spent browsing. These information will only be used to judge the popularity of this web site and to make future improvements.These includes IP address, internet service provider, type of browser, date/ti