Software Listing: Infections

W32.Spybot.ACYR Removal Tool was designed to remove the infections of W32.Spybot.ACYR W32.Spybot.ACYR Removal Tool was designed to remove the infections of W32.Spybot.ACYR.Important: If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

Trojan.Linkoptimizer Removal Tool was designed to remove the infections of Trojan.Linkoptimizer Trojan.Linkoptimizer Removal Tool was designed to remove the infections of Trojan.LinkoptimizerImportant: If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

remove the infections of Trojan.Vundo.B This tool is designed to remove the infections of Trojan.Vundo.B.Trojan.Vundo.B Free Removal Tool does the following:- Terminates the Trojan.Vundo.B processes - Deletes the Trojan.Vundo.B files - Deletes the registry values that the Trojan addedFollow these steps to download and run the tool:- Download the FxVundoB.exe file - Save the file to a convenient location, such as your Windows desktop. Optional: To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step.

  • Platform: WinOther

Trojan.Abwiz Removal Tool is designed to remove the infections of Trojan.Abwiz.F Trojan.Abwiz Removal Tool is designed to remove the infections of Trojan.Abwiz.F. Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch.Usage:Close all the running programs.If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.If you are running Windows Me or XP, turn off System Restore.Before running the tool, restart the computer in Safe mode.

  • Platform: WinOther

Remove infections of the W32.Antinny virus W32.Antinny Removal Tool was designed to remove infections of the following threats:W32.HLLW.AntinnyW32.HLLW.Antinny.EW32.HLLW.Antinny.GW32.Antinny.KW32.Antinny.QW32.Antinny.AXTrojan.SientokTrojan.ExponnyImportant: If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

This tool is designed to remove the infections of W32.Reatle.C@mm This tool is designed to remove the infections of W32.Reatle.C@mm.Follow these steps to download and run the tool: - Download the FixReatle.exe file- Save the file to a convenient location, such as your Windows desktop. - Close all the running programs. If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet. If you are running Windows Me or+ XP, turn off System Restore.- Locate the file that you just downloaded. - Double-click the FixReatle.exe file to start the removal tool.

  • Platform: WinOther

This tool is designed to remove the infections of W32.Esbot This tool is designed to remove the infections of W32.Esbot.A.Follow these steps to download and run the tool: - Download the FixEsbot.exe file - Close all the running programs. - If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet. - If you are running Windows Me or XP, turn off System Restore. - Locate the file that you just downloaded. - Double-click the FixEsbot.exe file to start the removal tool. - Click Start to begin the process, and then allow the tool to run.

  • Platform: WinOther

W32.Pasobir Removal Tool was designed to remove the infections of W32.Pasobir W32.Pasobir Removal Tool was designed to remove the infections of W32.Pasobir.Important: If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

Free removal tool to clean the infections of W32.Erkez.B@mm Symantec Security Response has developed a removal tool to clean the infections of W32.Erkez.B@mm.The W32.Erkez.B@mm Removal Tool does the following: - Terminates the W32.Erkez.B@mm viral processes - Deletes the W32.Erkez.B@mm files - Deletes the registry values that the worm addedNote: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.HOW TODownload the FxErkezB.exe fileSave the file to a convenient location, such as your downloads folder or the Windows desktop, or removable media known to be uninfected.

  • Platform: WinOther

Trojan.Lodear Removal Tool is designed to remove the infections of Trojan.Lodear.B and Trojan.Lodav.A Trojan.Lodear Removal Tool is designed to remove the infections of: Trojan.Lodear.BTrojan.Lodav.AIf you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

free removal for W32.Envid.B@mm and W32.Envid.C@mm infections This tool is designed to remove the infections of W32.Envid.B@mm and W32.Envid.C@mm.The W32.Envid Removal Tool does the following:- Terminates the W32.Envid.B@mm processes - Deletes the W32.Envid.B@mm files - Deletes the registry values that the W32.Envid.B@mm addedIf you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet.

  • Platform: WinOther

This tool is designed to remove the infections of W32.Kiman.A This tool is designed to remove the infections of W32.Kiman.A.If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

W32.Spybot.ANDM-Tool was designed to remove the infections of W32.Spybot.ANDM W32.Spybot.ANDM-Tool was designed to remove the infections of W32.Spybot.ANDM.Important: If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

W32.Sasser Removal Tool - clean infections of all the variants of the W32.Sasser worm with this Symantec tool variants of the W32.Sasser worm: W32.Sasser.Worm, W32.Sasser.B.Worm, W32.Sasser.C.Worm, W32.Sasser.D.Worm, and W32.Sasser.E.Worm.The W32.Sasser family of worms can run on (but not infect) Windows 95/98/Me computers. Although these operating systems cannot be infected, they can still be used to infect vulnerable systems that they are able to connect to. In this case, the worm will waste a lot of resources so that programs cannot run properly, including our removal tool. (On Windows 95/98/Me computers, the tool should be run in Safe mode.

  • Platform: WinOther

W32.Davs Removal Tool was designed to remove the infections of W32.Davs W32.Davs Removal Tool was designed to remove any infections of W32.DavsIf you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

free tool designed to remove the infections of Trojan.Jasbom This tool is designed to remove the infections of Trojan.Jasbom.The Removal Tool does the following: - Terminates the associated processes - Deletes the associated files - Deletes the registry values added by the threatFollow these steps to download and run the Trojan.Jasbom Free Removal Tool:Download the FxJasbom.exe fileSave the file to a convenient location, such as your Windows desktop.Close all the running programs.If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.

  • Platform: WinOther

W32.Secefa Removal Tool is designed to remove the infections of W32.Secefa.A, W32.Secefa.B, W32.Secefa.C and Trojan.Gamqowi W32.Secefa Removal Tool is designed to remove the infections of the following threats: W32.Secefa.AW32.Secefa.BW32.Secefa.CTrojan.GamqowiIf you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. To ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection, because W32.

  • Platform: WinOther

Backdoor.Ryknos Removal Tool is designed to remove the infections of Backdoor.Ryknos, Backdoor.Ryknos.B & SecurityRisk.First4DRM Backdoor.Ryknos Removal Tool is designed to remove the infections of Backdoor.RyknosBackdoor.Ryknos.BSecurityRisk.First4DRMPlease disconnect the computer from the network and Internet first, if you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

  • Platform: WinOther

W32.Serflog.A Free Removal Tool - free removal for W32.Serflog.A infections This tool is designed to remove infections of W32.Serflog.A. The W32.Serflog.A Removal Tool does the following: - Terminates the W32.Serflog.A processes - Deletes the W32.Serflog.A files - Deletes the registry values that W32.Serflog.A has added - Deletes the values added to the Hosts file- Download the FixSflog.exe file- Save the file to a convenient location, such as your Windows desktop. Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the "Digital signature" section before proceeding with step 4.

  • Platform: WinOther

Free removal tool to clean the infections of the W32.HLLW.Gaobot variants Symantec Security Response has developed a removal tool to clean the infections of the following W32.HLLW.Gaobot variants: W32.HLLW.Gaobot.AGW32.HLLW.Gaobot.AOW32.Gaobot.SAW32.Gaobot.SYW32.Gaobot.ZXW32.Gaobot.ADXW32.Gaobot.AFJW32.Gaobot.AJDW32.HLLW.Gaobot.GenW32.Gaobot.BOWW32.Gaobot.BUUNote: W32.HLLW.Gaobot.gen is a generic detection that detects numerous variants of W32.HLLW.Gaobot. The removal tool will remove many but not all variants that are detected as W32.HLLW.Gaobot.gen.The W32.Gaobot Removal Tool does the following:Terminates the W32.

  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


WinLock

WinLock is a program that helps users lock down and limit access to certain functions of a Windows PC. Applications such as WinLock are crucial in environments where public access is allowed to PC’s, such as libraries or internet cafes, as ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...


Clear All History

Regardless of what you do online and who you share your computer with, its always has been and always will be a good idea to clear your traces and virtual footprints left behind on your system. Not only is this good practice to help protect your ...


Funny Photo Maker

It happens a lot of times that you capture a photograph, it is good enough but you still want to play with it and improve it. There are lots of programs available for photo editing and some might say that you should use Adobe’s Photoshop. Yes, ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


Slash Xonix

Slash xonix is a freeware game which takes the lesser known classic title xonix, and revamps and reworks it into a title for the desktop computer. Xonix (the game on which slash xonix is obviously based) is a game in which you must split the screen ...


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


Simple Sticky Notes

Simple sticky notes is a freeware note taking utility to appeal to users in the same way in which a physical sticky note would; by allowing you to write something down very quickly with very little effort (without having to open a program or pull ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...



New Downloads

Radio Master

Program for playing and
recording radio
channels. Main
features: - radio stations
(over 350, over 150
russian) - ...

Syncios Data Recovery for
Mac

Recover all lost data
including messages, contacts,
photos, videos, notes, app
data and much more. You can
selectively ...

Site Translator

Translate entire web sites or
localize software with a
single click! Site Translator
converts all HTML, ASP, ASPX,
ASCX, ...

Audials One

Find, Record, Download,
Convert & Enjoy Music,
Movies, Videos & Radios
Anywhere: Internet Radio
Recorder. Music ...

Surfblocker

Restrict Internet access at
specified times or on demand.
Block harmful content, disable
connection completely or limit
...

Directy CMF

ApPHP Directy CMF is an
open-source content management
framework (CMF), built on
ApPHP MVC Framework that
provides a ...

Bewitching Tropics

How do you think where is
paradise on the earth? Of
course it is tropical islands.
If you like exotic countries
you will ...

ByebyeData Eraser
AdminEdtition

Admin Edition is the ultimate
solution for administrators in
a company, unlimited usage in
one company, Yes, you can use
...

iRefone for Windows

Best iOS data recovery tool,
iRefone, which supports to
recover iPhone/iPad/iPod
deleted or lost data like
messages, ...



Related Searches

Infections The Nervous System