SlideShare a Scribd company logo
1 of 18
CAMBO TECH YOUTH GROUP Viruses Elimination Professional Lecturer: KEAN TAK Trainer:  - LEANG PENGAN - THACH MONIROTH Team : CHEAT  SOVANNARA, BUN CHANTHEARA, CHAP SOVANYUTH, HEL SOMBO.
VIRUS ELIMINATION
What is Computer Viruses? Computer Viruses is a program  made by the programmer to do some malfunctions in computer, can delete documents, and make your system run slowly. Type of Computer Viruses ,[object Object]
Spyware: Collect information and send to spyware author.
Malware:Infiltrate in to system without owner’s informed.
Worms:A self-replicating  malware program.
Trojan: None self-replicating.
RAT: Remote Administrator Toolkits.,[object Object]
The Computer is crashing and restarting by itself.
RAM overgrow
Your disks and drives are not working properly.
There are error messages popping out
The Computer running slower than normal.
Your files and folders are getting deleted automatically.
You are unable to install a new antivirus program.,[object Object]
Special Folder: Folder created by System.,[object Object]
How to Remove Viruses  Kill all running viruses process.  Delete all Viruses associated files.  Remove and correct some Registry Key & Value. > How to Kill Virus Process ,[object Object]
Using Third Party Program : Process XP, Win XP Manager, Win Vista Manager, Win 7 Manager … ,[object Object]

More Related Content

What's hot

Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computerheidirobison
 
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?sherireid89
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your Systemcostamary
 
so big 22
so big 22so big 22
so big 22cainem
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceDanladi Gambo
 
so big
so bigso big
so bigcainem
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slowcrissy
 
Remove Windows Pro RescuerAutomatically From Your System
Remove Windows Pro RescuerAutomatically From Your SystemRemove Windows Pro RescuerAutomatically From Your System
Remove Windows Pro RescuerAutomatically From Your Systemcostamary
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer systemRachel Espino
 

What's hot (20)

Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?
Fix Qtnetcomp.dll Missing or Damaged Error Message on Windows 10/ 8.1/ 8?
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your System
 
so big 22
so big 22so big 22
so big 22
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
so big
so bigso big
so big
 
Coupon chaser
Coupon chaserCoupon chaser
Coupon chaser
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 
RANSOMWARE
RANSOMWARERANSOMWARE
RANSOMWARE
 
Pc dianosing
Pc dianosingPc dianosing
Pc dianosing
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slow
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Trouble Shooting PC
Trouble Shooting PCTrouble Shooting PC
Trouble Shooting PC
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Remove Windows Pro RescuerAutomatically From Your System
Remove Windows Pro RescuerAutomatically From Your SystemRemove Windows Pro RescuerAutomatically From Your System
Remove Windows Pro RescuerAutomatically From Your System
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 

Similar to Virus Elimination Course

How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Miraideniallorance65
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamexdeniallorance65
 
How to remove Trojan.Vimnaspu
How to remove Trojan.Vimnaspu How to remove Trojan.Vimnaspu
How to remove Trojan.Vimnaspu deniallorance65
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructionsitwebresources
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_salityGustav Kato
 
Delete How tosimplified toolbar
Delete How tosimplified toolbarDelete How tosimplified toolbar
Delete How tosimplified toolbarkingh05
 
How to remove Trojan.Kulekmoko
How to remove Trojan.KulekmokoHow to remove Trojan.Kulekmoko
How to remove Trojan.Kulekmokodeniallorance65
 
Intermediate computer skills
Intermediate computer skillsIntermediate computer skills
Intermediate computer skillsTHickox
 
1234mokuit
1234mokuit1234mokuit
1234mokuitdadabah
 
Win32patched blogspot in
Win32patched blogspot inWin32patched blogspot in
Win32patched blogspot inIrisPhilme
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Remove zip opener packages
Remove zip opener packagesRemove zip opener packages
Remove zip opener packagesIvy Scofield
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computerTechnetweb
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 

Similar to Virus Elimination Course (20)

Computer virus
Computer virusComputer virus
Computer virus
 
How to remove Trojan.Mirai
How to remove Trojan.MiraiHow to remove Trojan.Mirai
How to remove Trojan.Mirai
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamex
 
Antivirus
AntivirusAntivirus
Antivirus
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
 
How to remove Trojan.Vimnaspu
How to remove Trojan.Vimnaspu How to remove Trojan.Vimnaspu
How to remove Trojan.Vimnaspu
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
 
Delete How tosimplified toolbar
Delete How tosimplified toolbarDelete How tosimplified toolbar
Delete How tosimplified toolbar
 
How to remove Trojan.Kulekmoko
How to remove Trojan.KulekmokoHow to remove Trojan.Kulekmoko
How to remove Trojan.Kulekmoko
 
Intermediate computer skills
Intermediate computer skillsIntermediate computer skills
Intermediate computer skills
 
1234mokuit
1234mokuit1234mokuit
1234mokuit
 
Win32patched blogspot in
Win32patched blogspot inWin32patched blogspot in
Win32patched blogspot in
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Remove zip opener packages
Remove zip opener packagesRemove zip opener packages
Remove zip opener packages
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computer
 
Win32 trojan gen
Win32 trojan genWin32 trojan gen
Win32 trojan gen
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 

Recently uploaded

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Virus Elimination Course

  • 1. CAMBO TECH YOUTH GROUP Viruses Elimination Professional Lecturer: KEAN TAK Trainer: - LEANG PENGAN - THACH MONIROTH Team : CHEAT SOVANNARA, BUN CHANTHEARA, CHAP SOVANYUTH, HEL SOMBO.
  • 3.
  • 4. Spyware: Collect information and send to spyware author.
  • 5. Malware:Infiltrate in to system without owner’s informed.
  • 6. Worms:A self-replicating malware program.
  • 8.
  • 9. The Computer is crashing and restarting by itself.
  • 11. Your disks and drives are not working properly.
  • 12. There are error messages popping out
  • 13. The Computer running slower than normal.
  • 14. Your files and folders are getting deleted automatically.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Search for viruses extension (.exe, .com, .bat, .pif, .scr ) from all drives. Use boot CD to delete Viruses files: eg. ERD commander(optional), Bart PE or any live CD. Search and Delete all registry key or value created by Viruses.
  • 20. Introduction to Useful Built-in Windows Tools
  • 21. 1- System Configuration (msconfig) To open it: Start > Run > Type: msconfig
  • 22. 2- Task Manager (taskmgr) To open it: Start > Run > Type : taskmgr Or right click on Taskbar > Task Manager Or Press CTRL + ALT + Del key.
  • 23. 3- Group Policy (gpedit.msc) To open it: Start > Run > type : gpedit.msc
  • 24. 4- Command Line (cmd) To open it: Start > Run > type: cmd ( For new version of command line) Start > Run > type : command (For old version of command line).
  • 25. Value Data Value Name Root Keys Sub keys Contents pane Key Pane
  • 26. How to Read Registry Key No warning when delete or modify of key or value Data Type of Registry Hive Key in Registry How Registry work Working with permission Registry Value How to Import/Export Registry Value How to safely modify key or value in registry 5- Registry (regedit)
  • 27. Batch File and Script File Batch File (.Bat File) : Using Windows Command line. Script File (VbScript File): Using Microsoft VB language.
  • 28. Thanks You Contact me : moniroth@live.com Twitter/moniroth Facebook/roth999 Skype: roth999 HP: 017 877 855 Website: http://bestpctips.co.cc Blog: http://moniroth.wordpress.com