Carefully stolen information with Trojan - How to disable Trojan

You are using the Internet with a password only you know, but somehow you are still using someone else's account. You suspect your mailbox has been previewed by other people even though you did not go to a public Internet service to get it, so you cannot reveal your login information. If so, it is very likely that your computer has been installed or infected with Trojan.

You are using the Internet with a password only you know, but somehow you are still using someone else's account. You suspect your mailbox has been previewed by other people even though you did not go to a public Internet service to get it, so you cannot reveal your login information. If so, it is very likely that your computer has been installed or infected with Trojan.

What is a Trojan?How does it work?Trojan is a computer virus, named from a Greek myth.The Greeks in the war gave their enemies a giant wooden horse which hid the brave warriors.The enemies of the Greeks accepted this gift and they brought it into the city, and that very night, the warriors came out of their horses and took over the city.

How Trojan Works: When you have been infected with a Trojan, the virus will automatically back up somewhere convenient for later execution (it will copy itself to the folder C: Windows or C: WindowsSytem depending on virus writer After self-replicating it will attempt to set the operating system registry parameter to activate itself every time the computer starts. There are all kinds of trojans: there are types when infected into the machine, it will silently open a back door (back door) so that its owner can attack by the default port opened earlier, there are types after executing will automatically Write down the configuration or record all passwords in the cookies on the infected device (usually this password is your e-mail password) or record what you type into the computer. It can also record your Internet connection password (this is why you keep the passwrod very well and be exposed) and then when you go online it sends what it records to an e-mail. configured in that Trojan.

So how to disable it? This article will show you how to do that:

Method 1:

First, click Start -> select Run . -> type in it 'regedit' (do not type quotes). You will see the Registry Editor dialog box appear. Find the key:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun or

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices

After entering these two keys, you will see the name and path to the program will be activated automatically every time Windows starts.

Carefully stolen information with Trojan - How to disable Trojan Picture 1Carefully stolen information with Trojan - How to disable Trojan Picture 1
Figure 1. Computer has been infected with trojan sub7

The thing to do here is: when looking for the above two keys, if you suspect any program, go to it and right-click it and select Delete (Figure 2). Figure 1 above shows that the computer has been infected with the sub7 trojan name and is saved to the folder C: Windows. Not only sub7 but also many other trojans such as Keylogger, Hooker, BackDoor can easily infect your computer.

Carefully stolen information with Trojan - How to disable Trojan Picture 2Carefully stolen information with Trojan - How to disable Trojan Picture 2
Figure 2. Right-click and click delete to delete the suspicious programs

If you are afraid that you have mistakenly deleted it, it will affect other programs, you can do it 2:

Method 2:

Click Start -> select Run . -> type 'msconfig' (no need to type quotes) -> Select Startup tab -> click the check box before the program name (Figure 3) then select OK -> the program will Make you reset the phone -> select Restart to reset the device.

If here you uncheck the wrong checkbox with other programs, you can mark it again on the next boot.

Carefully stolen information with Trojan - How to disable Trojan Picture 3Carefully stolen information with Trojan - How to disable Trojan Picture 3
Figure 3. Cancel selection of suspicious programs in sysconfig

These two ways are safe and very effective, but sometimes quite complicated for those who are not "familiar" about computers. If you are new to computers, you can do it the following way:

Method 3:

Use the program to find trojans and kill them, such as Trojan Remover v4.4.0. You can download this program very useful at: http://www.simplysup.com/tremover/ .

This program not only has the ability to find and remove trojans on all files at boot time but also can repair system files damaged by trojans. According to other websites, this program is considered the strongest and best. The program can edit WIN.INI files that have been changed by trojans and remove the keys that the trojan has added to the Registry.

Trojan Remover will scan all files and programs at boot time loaded from the Registry (according to the 2 keys I mentioned above) to find Remote access Trojans (remote access) or backdoors . Every time Detecting a suspicious program, Trojan Remover will display a message box to alert you. It tells you the name of the suspect program and the archive folder and will remove the dangerous trojans from the system file. In addition Trojan Remover also allows you to rename suspicious files to prevent further execution.

Most other Trojan programs execute in MS-DOS because while you are running Windows, you cannot interfere with system files. With this program you will be more comfortable because when you find out in the trojan memory, the program will ask you to Restart the computer and will erase them. And especially the program is smart in that it automatically assigns Read Only attribute (read-only attribute) to system files.

Using:

After downloading the program, you install the program. When running, the first interface of the program will look like this:

Click the Scan button (or the button with an ambulance icon) to let the program find and kill the Trojan as shown below:
Carefully stolen information with Trojan - How to disable Trojan Picture 4Carefully stolen information with Trojan - How to disable Trojan Picture 4
After the scan is complete, click the View Log button to see the details of the process that the program has Scaned. Then click the Close button to close the program.

Scan by folder: Click the button with the flashlight icon, then specify the folder or drive to scan and click the Start Scan button.

Review details when scanning: Click on the button with the icon of multiple stacked sheets of paper. Reprint log file details: Click the printer icon button.
Carefully stolen information with Trojan - How to disable Trojan Picture 5Carefully stolen information with Trojan - How to disable Trojan Picture 5
Configure the scan at startup: Click the Options menu -> select Enable Boot-time Scan (if this option is dimmed you are using this function).

Configure scan in Explorer: click menu Options -> select Enable Scanning Explorer. If you enable this option, you can scan directly by right-clicking on the folder or drive you want to scan -> select Scan with Trojan Remover (if this option is blurry you are using this function).

Wish you success and no Trojan infection.

Tran Tri Hien

4 ★ | 2 Vote