ComputersSecurity

Virus in contact: what to do?

Every day more and more users complain that they have a virus in contact. Where did he come from and how to drive him?

Once, when you log into your social network on your account, you find a bright colorful window that blocks the interface you are familiar with. Such windows can differ both in design and in textual information, but the essence is one - you are trying to blame for spamming. In order to unlock the profile, you are sent to such and such an address (in the sense, it is strongly recommended to go to the above link). In fact, this is nothing more than a virus in contact. If you go where you were sent, then you will see another window where you are invited to send sms from your mobile, and do it completely for free. Do not send any messages anywhere, otherwise you will lose the good part of your balance on the phone, and rubles (as practice shows, in the amount of 200 to 600-800 rubles) will safely settle in the virtual pocket of the swindler.

But you should not sit with your hands folded, since once there is such a window on your page, it means that you have already picked up a certain virus, most likely the Trojan, which today has simply blocked you access to the contact, and tomorrow it paralyzes the entire computer .

If you have a virus in contact, urgently carry your computer device into the service to be diagnosed and cured.

You can also try to cope with the problem yourself if you can not wait to look at your account on the social network. So, if the virus has blocked the profile in the contact, you should pay attention to the file called "hosts". Typically, a virus in a contact changes its contents. Seeking is easy to find. We go to drive C, look for a folder called "WINDOWS", it contains the folder "system32", then the folder "drivers". In the last folder, look for the name "etc". Here it is, and is the desired "hosts", which is a file without an extension. Note that the file can be hidden, then it will not be displayed in the explorer. In this case, you must enable the display function of these hidden files in the system settings.

Now check the attributes of the hosts file by clicking on Properties. If it says that the file is read-only, then this attribute must be removed. Now open the "hosts" with the help of some text editor and unwaveringly begin to delete everything that will get, except the entry "127.0.0.1 localhost".

However, there may be a situation where a virus in a contact blocks access to this file. Then it makes sense to do all of the above, but booted from the Live-CD. Instead of editing the "hosts" file, you can simply delete it.

The changes you made to the system must take effect without restarting the computer, so immediately try again to go to the social network.

The virus can act differently. If the "hosts" is empty, then check in the browser settings if the proxy is not registered. After opening the Explorer, open the "Tools" menu, then "Internet Options", then "Connections" and, finally, "Network Setup". If in the field called "Address" something is written-mercilessly delete.

If none of the above described has helped you, then on your virtual path you met a rarer and, of course, a more "thoughtful" virus. In this case, the question of how to remove a virus in a contact, experts will help you find the answer.

If at you all turned out and you managed to go into your profile in contact, do not rush to rejoice. The virus can still be alive and well in your computer system. To permanently and irrevocably remove it, we strongly recommend that you use such treatment utilities as Kaspersky Removal Tool or CureIT, which must be downloaded only from official sites, in this case from Kaspersky Lab and, accordingly, from Doctor Web.

Always remember that preventing a problem is a much easier process than solving it. Remember about the prevention of viruses - install a good antivirus on your computer, disable the autorun function from the USB flash drive, do not wander through unknown links sent to you by familiar and unfamiliar people, and in no case do you enter your data on third-party resources, even if you are very -very ask.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.