After the WINXP system is turned on, generic host process for Win32 services will pop up. In this case, you need to disable it!
The preceding error may occur in three cases.
1. It is a virus. After the machine is started, the system prompts the problem that the generic host process for Win32 services is required.
Disable the remote rrocedure Call (RPC) Service to terminate unexpectedly, and then automatical
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it! However, this trojan is really "naughty", it can be no matter whether you welcome, as long as it is happy, it wil
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it! However, this trojan is really "naughty", it can be no matter whether you welcome, as long as it is happy, it wil
"Hacker" (Win32.PSWTroj. OnlineGames.73728)
I. Threat Level of "legendary hacker" (Win32.Troj. Delf.90112:★
Copy the virus to the system folder, release the virus file, and delete it in batches. A virus is triggered by generating system services. It uses system vulnerabilities to open the user's computer backdoor, control the user's computer, and execute malicious behaviors, such as collecting Computer In
"QQ account theft 139373" (Win32.Troj. AmorBc. c.139373) is a QQ account theft Trojan. After the virus runs, the virus file is released to the program folder and self-started by using ShellExecuteHooks. By injecting the process, you can monitor the user's QQ token tool and read the LoginUinList In the QQ directory. dat obtains the user number list and deletes ewh In the QQ directory. database to trick the u
Origin of Trojan name
Trojan viruses intrude into computer Trojans. The name is from the ancient Greek legend (the Trojan horse in the Epic of HOMA, the Trojan horse in the word Trojan was originally of the Trojan horse, that is,
EndurerOriginal1Version
Yesterday (July 19) at pm, a friend said that rising computer self-check always found viruses over the past few days.Trojan. psw. Agent. adw,Trojan. psw. zhengtu. CC.
After the examination, we found that the symptoms were similar to the descriptions described in Rising's report on the wikin worm:
------------------------------The virus scans all shared computers in the LAN, tries to guess their passwords, and tries to infect th
EndurerOriginal
1Version
Previously, this network was added to spread code such as worm. win32.viking. Jr. For details, refer:
A certain Hexi District Education Information Network was added to spread code such as worm. win32.viking. Jr.Http://endurer.bokee.com/6186405.htmlHttp://blog.csdn.net/Purpleendurer/archive/2007/03/26/1542040.aspxHttp://blog.sina.com.cn/u/49926d910100082w
Just now I made a transfer
Network viruses, especially Web Trojans, are already a street rat. It can be seen how much damage the Web trojan has brought to netizens. Some of them have even reached the point of changing things. In fact, Web Trojans are not as terrible as you think. You only need to select a suitable anti-Trojan tool to block Web Trojans. In this article, I will introduce how to choose a Web
I believe that friends who often play Trojans will know the characteristics of some Trojans and have their favorite Trojans. However, many friends still do not know what the "DLL Trojan" has emerged in recent years. What is "DLL Trojan? What is the difference between it and a general Trojan?
I. Starting with DLL technologyTo understand the DLL
Because many beginners do not know much about security issues, they do not understand their computer in the "Trojan" how to clear. Therefore, the most important thing is to know the "Trojan" working principle, so it will be easy to find "Trojan". Because many beginners do not know much about security issues, they do not understand their computer in the "
Last week, the Jinshan Anti-Virus center intercepted a theft "magic Domain", "perfect World" and "Hao Side game platform" for the purpose of the Trojan virus, the virus named win32.troj.onlinegames.ms.18432, since the advent of the Thursday has been derived from a number of variants. Jinshan Customer Service Center received a large number of user complaints, reflecting system restart can not display the des
Analysis on the trojan evolution Report of "Dancing moth"I. Overview
Recently, the 360 mobile security team detected that a cloud Control Trojan was exploding. The trojan family was first captured by February 2015 mobile security teams in 360, and more than 12 thousand samples have been collected. Since the trojan has
Trojan Horse is a remote control based virus program, which has a strong concealment and harmfulness, it can control or monitor the user's computer in an uninformed state. Here is a talk about the Trojan often hiding places and cleaning methods.
first check if there is a trojan in your computer
1, integrated into the program
actually
Author: Green Snow Source: Eighth Regiment
Since to create the perfect IE Web Trojan, first of all must give us a perfect standard, I personally think a perfect IE web Trojan should have at least the following four features:
One: Can avoid the killing of anti-virus software;
Two: can avoid the network firewall alarm;
III: Most versions of IE (mainly including WIN2003) can be applied to most Windows operatin
Kapsersky reportsTrojan-PSW.Win32.OnLineGames.fqThe rising report isTrojan. mnless. LXV
In addition, C:/Documents and Settings/Administrator found that:
C:/Documents and Settings/Administrator/msinfo. vbs content:/---Set shell = Createobject ("wscript. Shell ")Shell. Run ("msinfo.exe ")Set shell = nothing---/
File Description: C:/Documents ents and settings/Administrator/msinfo.exeAttribute: ---An error occurred while obtaining the file version information!Creation Time: 8:50:55Modification tim
As network security problems gradually enter people's eyes, network viruses, especially Web Trojans, are now crossing the street, showing how much damage Web Trojans have caused to netizens. The harm of Web Trojans is simply a matter of self-danger for Internet users. During Normal Internet use, they are all taken extra care and are afraid of being attacked by Web Trojans. In fact, Web Trojans are not as terrible as you think. You only need to select a suitable anti-
First, Trojan Virus background introductionA Trojan horse virus refers to a special function hidden in the normal program of malicious code, with the ability to destroy and delete files, send passwords, record keyboards and attacks, etc., can cause user system damage or even paralysis.b) The first computer Trojan in 1986 years. Second, the classification of
To implement the trojan service program, we mainly implement the following functions: running the background (hiding technology), receiving the control code, and modifying the Registry. We will introduce these three aspects:Private void InitializeComponent (){//// Form1//// Start point and size of the form displayThis. AutoScaleBaseSize = new System. Drawing. Size (6, 14 );This. ClientSize = new System. Drawing. Size (368,357 );// Form nameThis. Name
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.