Slide 1
Your Trusted IT Support Partner Since 2003

We deliver reliable and affordable IT solutions for the Small Business Community.

RSS feed for this section

virus removal

Trojan.GameThief.Win32.WOW.ggb

Trojan.GameThief.Win32.WOW.ggb Trojan.GameThief.Win32.WOW.ggb also changes the registry values to be automatically executed once a system is rebooted. It opens a backdoor for other malicious programs to infect the system. Once infected by this Trojan, the operating system may start responding very slowly after a while. In the infected system, “Not Responding” pop up frequently appears on …

Trojan.GameThief.Win32.WOW.ggb Continue Reading ->

Trojan.GameThief.Win32.WOW.ggb

Trojan.GameThief.Win32.WOW.ggb Trojan.GameThief.Win32.WOW.ggb also changes the registry values to be automatically executed once a system is rebooted. It opens a backdoor for other malicious programs to infect the system. Once infected by this Trojan, the operating system may start responding very slowly after a while. In the infected system, “Not Responding” pop up frequently appears on

Generic15.CJQN

Generic15.CJQN Generic15.CJQN is a computer virus that affects the Windows Operating System. It travels around the web forward via emails and pornographic websites. It causes the system to respond slowly and can even lead to a system crash. It copies itself to the registry values of the system and can even create, new infected files.

Generic15.CJQN

Generic15.CJQN Generic15.CJQN is a computer virus that affects the Windows Operating System. It travels around the web forward via emails and pornographic websites. It causes the system to respond slowly and can even lead to a system crash. It copies itself to the registry values of the system and can even create, new infected files.

Worm.Zimuse.A

Worm.Zimuse.A Worm.Zimuse.A is a worm that tricks the user into believing that it is just a zip file. To make itself look more legitimate, it even asks the user for password in order to unzip its contents. It can delete all registry keys and files. It usually stays inactive for a period of 10 days

Worm.Zimuse.A

Worm.Zimuse.A Worm.Zimuse.A is a worm that tricks the user into believing that it is just a zip file. To make itself look more legitimate, it even asks the user for password in order to unzip its contents. It can delete all registry keys and files. It usually stays inactive for a period of 10 days

Rootkit.Indag.A

Rootkit.Indag.A Rootkit.Indag.A is a virus which spreads through another malware. The main objective of this virus is to stop any antivirus program running on the system. The objective therefore is to knock off a system’s protection. It usually affects the drivers on the system and registers itself as a device on the system to terminate

Rootkit.Indag.A

Rootkit.Indag.A Rootkit.Indag.A is a virus which spreads through another malware. The main objective of this virus is to stop any antivirus program running on the system. The objective therefore is to knock off a system’s protection. It usually affects the drivers on the system and registers itself as a device on the system to terminate

Trojan.Fakealert.CAW

Trojan.Fakealert.CAW Trojan.Fakealert.CAW spreads by taking advantage of loopholes in the security settings of a system. This allows the system to be compromised by malware and offers control to malicious program. It creates an 8 digit name in documents and settings folder of the system. This makes the system respond by showing pop ups of new

Trojan.Fakealert.CAW

Trojan.Fakealert.CAW Trojan.Fakealert.CAW spreads by taking advantage of loopholes in the security settings of a system. This allows the system to be compromised by malware and offers control to malicious program. It creates an 8 digit name in documents and settings folder of the system. This makes the system respond by showing pop ups of new

Trojan.BAT.AACL

Trojan.BAT.AACL Trojan.BAT.AACL affects Windows based systems by trying to alter their DNS server settings. It entices users as being a legitimate updated version of the iPhone application called jailbreaking. The trojan operates without giving any hint to the user and changes his DNS server address. This makes the system vulnerable to be given instructions from

Trojan.BAT.AACL

Trojan.BAT.AACL Trojan.BAT.AACL affects Windows based systems by trying to alter their DNS server settings. It entices users as being a legitimate updated version of the iPhone application called jailbreaking. The trojan operates without giving any hint to the user and changes his DNS server address. This makes the system vulnerable to be given instructions from

Trojan.KillAV.RS

Trojan.KillAV.RS Trojan.KillAV.RS is a Trojan which hampers the security of the system by stopping verification of files. It deletes the cryptographic service (cryptsvc) built within the Windows OS; technically, this halts the verification of digital signatures. Also affected are Windows Updates and firewall settings due to removal of cryptsvc. It also takes several screenshots of

Trojan.KillAV.RS

Trojan.KillAV.RS Trojan.KillAV.RS is a Trojan which hampers the security of the system by stopping verification of files. It deletes the cryptographic service (cryptsvc) built within the Windows OS; technically, this halts the verification of digital signatures. Also affected are Windows Updates and firewall settings due to removal of cryptsvc. It also takes several screenshots of

Win32.Worm.Hakaglan.B

Win32.Worm.Hakaglan.B Win32.Worm.Hakaglan.B makes a copy of itself inside the system32 folder in the Windows OS. It disables the Task Manager, registry tools and folder options by altering the registry values of the Windows OS.This Trojan spreads around via Yahoo Messenger, removable media and shared networks. The Trojan usually increases its footprint by making itself look

Win32.Worm.Hakaglan.B

Win32.Worm.Hakaglan.B Win32.Worm.Hakaglan.B makes a copy of itself inside the system32 folder in the Windows OS. It disables the Task Manager, registry tools and folder options by altering the registry values of the Windows OS.This Trojan spreads around via Yahoo Messenger, removable media and shared networks. The Trojan usually increases its footprint by making itself look

RTL.805

RTL.805 RTL.805 is a Trojan which usually spreads via third party applications. Applications such as free gaming app or free software are its major carriers. This virus also alters the registry values to be rebooted every time the system is rebooted. It takes large amount of memory often resulting in programs not being executed. One

RTL.805

RTL.805 RTL.805 is a Trojan which usually spreads via third party applications. Applications such as free gaming app or free software are its major carriers. This virus also alters the registry values to be rebooted every time the system is rebooted. It takes large amount of memory often resulting in programs not being executed. One

Trojan.Fake.Av.Kyn

Trojan.Fake.Av.Kyn Trojan.Fake.AV.Kyn is a Trojan that pretends to be a security program. It claims to clean the system of any unwanted malware and files. The Trojan will create an .exe file in documents and settings from where the registry settings are altered. All this is done to ensure the Trojan is booted at every fresh

Trojan.Fake.Av.Kyn

Trojan.Fake.Av.Kyn Trojan.Fake.AV.Kyn is a Trojan that pretends to be a security program. It claims to clean the system of any unwanted malware and files. The Trojan will create an .exe file in documents and settings from where the registry settings are altered. All this is done to ensure the Trojan is booted at every fresh

Call DP Tech Group for your business IT needs. 630-372-0100

Give us a call or fill out our contact form for a quote.

Scroll to Top