SlideShare a Scribd company logo
1 of 1
Download to read offline
If u insertpendrive there wil b a dialog box press cancel and dont double click the usb icon Click
on "Start," "Run"; type "cmd" and press "Enter" to open the command prompt window.
Type the drive letter, for example,C followed by a colon (":"), and press "Enter" at the
command prompt to open the root directory of the drive.
3. Type "dir/w/o/a/p" and press "Enter" to display a list of files and folders present on the
flash drive. Note the existence of any of the following in particular: Autorun.inf, New
Folder.exe, Ravmon.exe, New_Folder.exe, svchost.exe.
4. Delete each of the files that have been unprotected by typing "del", pressing the space bar
and typing the file name, for example, "del autorun.inf".
Then run the antivirus software or scanner and fix the bugs
2.Most malicious persons gets our mobile number while installation and send untrusted messages
and notifications also by getting our address book the malicious software can send unwanted
messages and ads to all our contact people.So its better not to install the software by accepting
the criteria.
Solution
If u insertpendrive there wil b a dialog box press cancel and dont double click the usb icon Click
on "Start," "Run"; type "cmd" and press "Enter" to open the command prompt window.
Type the drive letter, for example,C followed by a colon (":"), and press "Enter" at the
command prompt to open the root directory of the drive.
3. Type "dir/w/o/a/p" and press "Enter" to display a list of files and folders present on the
flash drive. Note the existence of any of the following in particular: Autorun.inf, New
Folder.exe, Ravmon.exe, New_Folder.exe, svchost.exe.
4. Delete each of the files that have been unprotected by typing "del", pressing the space bar
and typing the file name, for example, "del autorun.inf".
Then run the antivirus software or scanner and fix the bugs
2.Most malicious persons gets our mobile number while installation and send untrusted messages
and notifications also by getting our address book the malicious software can send unwanted
messages and ads to all our contact people.So its better not to install the software by accepting
the criteria.

More Related Content

Similar to If u insertpendrive there wil b a dialog box press cancel and dont d.pdf

Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceramsashu15
 
Penge, pølser und Ideen
Penge, pølser und IdeenPenge, pølser und Ideen
Penge, pølser und IdeenTorben Rick
 
Hosts setup
Hosts setupHosts setup
Hosts setupdragoj
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangEric Roberson
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Windows 7- Introduction and Features
Windows 7- Introduction and FeaturesWindows 7- Introduction and Features
Windows 7- Introduction and FeaturesRajashri Bhairamadgi
 
2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk errorZoey Chen
 
Batch file programming
Batch file programmingBatch file programming
Batch file programmingalan moreno
 
Batch file-programming
Batch file-programmingBatch file-programming
Batch file-programmingjamilur
 
Windows Basic Computer Skills
Windows Basic Computer SkillsWindows Basic Computer Skills
Windows Basic Computer SkillsMarvin Nurse
 
Optix Pro Bo2 K Trojan
Optix Pro Bo2 K TrojanOptix Pro Bo2 K Trojan
Optix Pro Bo2 K TrojanShinra
 
Tricks to hack notepad
Tricks to hack notepadTricks to hack notepad
Tricks to hack notepadVikranChauhan
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 

Similar to If u insertpendrive there wil b a dialog box press cancel and dont d.pdf (20)

Bruja
BrujaBruja
Bruja
 
Sphinx
SphinxSphinx
Sphinx
 
citigroup Financial Supplement
citigroup Financial Supplementcitigroup Financial Supplement
citigroup Financial Supplement
 
ff
ffff
ff
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Penge, pølser und Ideen
Penge, pølser und IdeenPenge, pølser und Ideen
Penge, pølser und Ideen
 
Hosts setup
Hosts setupHosts setup
Hosts setup
 
Computer terms
Computer termsComputer terms
Computer terms
 
Computer terms
Computer termsComputer terms
Computer terms
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
 
Windows xp(1)
Windows xp(1)Windows xp(1)
Windows xp(1)
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Windows 7- Introduction and Features
Windows 7- Introduction and FeaturesWindows 7- Introduction and Features
Windows 7- Introduction and Features
 
2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error
 
Batch file programming
Batch file programmingBatch file programming
Batch file programming
 
Batch file-programming
Batch file-programmingBatch file-programming
Batch file-programming
 
Windows Basic Computer Skills
Windows Basic Computer SkillsWindows Basic Computer Skills
Windows Basic Computer Skills
 
Optix Pro Bo2 K Trojan
Optix Pro Bo2 K TrojanOptix Pro Bo2 K Trojan
Optix Pro Bo2 K Trojan
 
Tricks to hack notepad
Tricks to hack notepadTricks to hack notepad
Tricks to hack notepad
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 

More from aradhana9856

First lets draw out the Lewis structure such that each atom has.pdf
 First lets draw out the Lewis structure such that each atom has.pdf First lets draw out the Lewis structure such that each atom has.pdf
First lets draw out the Lewis structure such that each atom has.pdfaradhana9856
 
Interest.javaimport java.util.Scanner; public class Interest.pdf
 Interest.javaimport java.util.Scanner; public class Interest.pdf Interest.javaimport java.util.Scanner; public class Interest.pdf
Interest.javaimport java.util.Scanner; public class Interest.pdfaradhana9856
 
13. The answer is C. 34Let D be the dominant allele and d be the.pdf
13. The answer is C. 34Let D be the dominant allele and d be the.pdf13. The answer is C. 34Let D be the dominant allele and d be the.pdf
13. The answer is C. 34Let D be the dominant allele and d be the.pdfaradhana9856
 
1) The Arrhenius Theory of acids and bases Acids are substances wh.pdf
  1) The Arrhenius Theory of acids and bases  Acids are substances wh.pdf  1) The Arrhenius Theory of acids and bases  Acids are substances wh.pdf
1) The Arrhenius Theory of acids and bases Acids are substances wh.pdfaradhana9856
 
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdfaradhana9856
 
Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf
                     Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf                     Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf
Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdfaradhana9856
 
purines are double ringed nitrogenous bases of DN.pdf
                     purines are double ringed nitrogenous bases of DN.pdf                     purines are double ringed nitrogenous bases of DN.pdf
purines are double ringed nitrogenous bases of DN.pdfaradhana9856
 
(i) Deques cannot be implemented using arrays. false    Justif.pdf
(i) Deques cannot be implemented using arrays.  false    Justif.pdf(i) Deques cannot be implemented using arrays.  false    Justif.pdf
(i) Deques cannot be implemented using arrays. false    Justif.pdfaradhana9856
 
no reaction note 1-butanol is a primary alcohol.pdf
                     no reaction  note 1-butanol is a primary alcohol.pdf                     no reaction  note 1-butanol is a primary alcohol.pdf
no reaction note 1-butanol is a primary alcohol.pdfaradhana9856
 
What type of variable is number of people in the roomNominal.pdf
What type of variable is number of people in the roomNominal.pdfWhat type of variable is number of people in the roomNominal.pdf
What type of variable is number of people in the roomNominal.pdfaradhana9856
 
What is the oxidation number for oxygen in H2O2; for OF2 Explain..pdf
What is the oxidation number for oxygen in H2O2; for OF2  Explain..pdfWhat is the oxidation number for oxygen in H2O2; for OF2  Explain..pdf
What is the oxidation number for oxygen in H2O2; for OF2 Explain..pdfaradhana9856
 
We all know humans are good at removing the competition and it is di.pdf
We all know humans are good at removing the competition and it is di.pdfWe all know humans are good at removing the competition and it is di.pdf
We all know humans are good at removing the competition and it is di.pdfaradhana9856
 
Theories devised by keynes and Minsky are similar in concept since M.pdf
Theories devised by keynes and Minsky are similar in concept since M.pdfTheories devised by keynes and Minsky are similar in concept since M.pdf
Theories devised by keynes and Minsky are similar in concept since M.pdfaradhana9856
 
They might have consumed cyanide.The pit of Apricot contains cyani.pdf
They might have consumed cyanide.The pit of Apricot contains cyani.pdfThey might have consumed cyanide.The pit of Apricot contains cyani.pdf
They might have consumed cyanide.The pit of Apricot contains cyani.pdfaradhana9856
 
The attacking of the nucleophile formed in the reactionof acetone an.pdf
The attacking of the nucleophile formed in the reactionof acetone an.pdfThe attacking of the nucleophile formed in the reactionof acetone an.pdf
The attacking of the nucleophile formed in the reactionof acetone an.pdfaradhana9856
 
Terry And Hill can develop a method of profit sharing on below facto.pdf
Terry And Hill can develop a method of profit sharing on below facto.pdfTerry And Hill can develop a method of profit sharing on below facto.pdf
Terry And Hill can develop a method of profit sharing on below facto.pdfaradhana9856
 
The algorithm to reverse a linked list by rearranging the required p.pdf
The algorithm to reverse a linked list by rearranging the required p.pdfThe algorithm to reverse a linked list by rearranging the required p.pdf
The algorithm to reverse a linked list by rearranging the required p.pdfaradhana9856
 
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdf
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdfSplicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdf
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdfaradhana9856
 
since both are strong acids we can add up their individual contribut.pdf
since both are strong acids we can add up their individual contribut.pdfsince both are strong acids we can add up their individual contribut.pdf
since both are strong acids we can add up their individual contribut.pdfaradhana9856
 
public int getPosition(T anObject) { int result = null; result .pdf
public int getPosition(T anObject) { int result = null;  result .pdfpublic int getPosition(T anObject) { int result = null;  result .pdf
public int getPosition(T anObject) { int result = null; result .pdfaradhana9856
 

More from aradhana9856 (20)

First lets draw out the Lewis structure such that each atom has.pdf
 First lets draw out the Lewis structure such that each atom has.pdf First lets draw out the Lewis structure such that each atom has.pdf
First lets draw out the Lewis structure such that each atom has.pdf
 
Interest.javaimport java.util.Scanner; public class Interest.pdf
 Interest.javaimport java.util.Scanner; public class Interest.pdf Interest.javaimport java.util.Scanner; public class Interest.pdf
Interest.javaimport java.util.Scanner; public class Interest.pdf
 
13. The answer is C. 34Let D be the dominant allele and d be the.pdf
13. The answer is C. 34Let D be the dominant allele and d be the.pdf13. The answer is C. 34Let D be the dominant allele and d be the.pdf
13. The answer is C. 34Let D be the dominant allele and d be the.pdf
 
1) The Arrhenius Theory of acids and bases Acids are substances wh.pdf
  1) The Arrhenius Theory of acids and bases  Acids are substances wh.pdf  1) The Arrhenius Theory of acids and bases  Acids are substances wh.pdf
1) The Arrhenius Theory of acids and bases Acids are substances wh.pdf
 
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf
1. Coenzyme A - C. A water soluble acyl group carrier.2. Thiamine .pdf
 
Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf
                     Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf                     Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf
Using Clausius-Clapeyron relation Ln(P2P1) = (D.pdf
 
purines are double ringed nitrogenous bases of DN.pdf
                     purines are double ringed nitrogenous bases of DN.pdf                     purines are double ringed nitrogenous bases of DN.pdf
purines are double ringed nitrogenous bases of DN.pdf
 
(i) Deques cannot be implemented using arrays. false    Justif.pdf
(i) Deques cannot be implemented using arrays.  false    Justif.pdf(i) Deques cannot be implemented using arrays.  false    Justif.pdf
(i) Deques cannot be implemented using arrays. false    Justif.pdf
 
no reaction note 1-butanol is a primary alcohol.pdf
                     no reaction  note 1-butanol is a primary alcohol.pdf                     no reaction  note 1-butanol is a primary alcohol.pdf
no reaction note 1-butanol is a primary alcohol.pdf
 
What type of variable is number of people in the roomNominal.pdf
What type of variable is number of people in the roomNominal.pdfWhat type of variable is number of people in the roomNominal.pdf
What type of variable is number of people in the roomNominal.pdf
 
What is the oxidation number for oxygen in H2O2; for OF2 Explain..pdf
What is the oxidation number for oxygen in H2O2; for OF2  Explain..pdfWhat is the oxidation number for oxygen in H2O2; for OF2  Explain..pdf
What is the oxidation number for oxygen in H2O2; for OF2 Explain..pdf
 
We all know humans are good at removing the competition and it is di.pdf
We all know humans are good at removing the competition and it is di.pdfWe all know humans are good at removing the competition and it is di.pdf
We all know humans are good at removing the competition and it is di.pdf
 
Theories devised by keynes and Minsky are similar in concept since M.pdf
Theories devised by keynes and Minsky are similar in concept since M.pdfTheories devised by keynes and Minsky are similar in concept since M.pdf
Theories devised by keynes and Minsky are similar in concept since M.pdf
 
They might have consumed cyanide.The pit of Apricot contains cyani.pdf
They might have consumed cyanide.The pit of Apricot contains cyani.pdfThey might have consumed cyanide.The pit of Apricot contains cyani.pdf
They might have consumed cyanide.The pit of Apricot contains cyani.pdf
 
The attacking of the nucleophile formed in the reactionof acetone an.pdf
The attacking of the nucleophile formed in the reactionof acetone an.pdfThe attacking of the nucleophile formed in the reactionof acetone an.pdf
The attacking of the nucleophile formed in the reactionof acetone an.pdf
 
Terry And Hill can develop a method of profit sharing on below facto.pdf
Terry And Hill can develop a method of profit sharing on below facto.pdfTerry And Hill can develop a method of profit sharing on below facto.pdf
Terry And Hill can develop a method of profit sharing on below facto.pdf
 
The algorithm to reverse a linked list by rearranging the required p.pdf
The algorithm to reverse a linked list by rearranging the required p.pdfThe algorithm to reverse a linked list by rearranging the required p.pdf
The algorithm to reverse a linked list by rearranging the required p.pdf
 
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdf
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdfSplicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdf
Splicing mechanismSmall nuclear ribonucleic acid (snRNA) It is al.pdf
 
since both are strong acids we can add up their individual contribut.pdf
since both are strong acids we can add up their individual contribut.pdfsince both are strong acids we can add up their individual contribut.pdf
since both are strong acids we can add up their individual contribut.pdf
 
public int getPosition(T anObject) { int result = null; result .pdf
public int getPosition(T anObject) { int result = null;  result .pdfpublic int getPosition(T anObject) { int result = null;  result .pdf
public int getPosition(T anObject) { int result = null; result .pdf
 

Recently uploaded

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 

Recently uploaded (20)

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

If u insertpendrive there wil b a dialog box press cancel and dont d.pdf

  • 1. If u insertpendrive there wil b a dialog box press cancel and dont double click the usb icon Click on "Start," "Run"; type "cmd" and press "Enter" to open the command prompt window. Type the drive letter, for example,C followed by a colon (":"), and press "Enter" at the command prompt to open the root directory of the drive. 3. Type "dir/w/o/a/p" and press "Enter" to display a list of files and folders present on the flash drive. Note the existence of any of the following in particular: Autorun.inf, New Folder.exe, Ravmon.exe, New_Folder.exe, svchost.exe. 4. Delete each of the files that have been unprotected by typing "del", pressing the space bar and typing the file name, for example, "del autorun.inf". Then run the antivirus software or scanner and fix the bugs 2.Most malicious persons gets our mobile number while installation and send untrusted messages and notifications also by getting our address book the malicious software can send unwanted messages and ads to all our contact people.So its better not to install the software by accepting the criteria. Solution If u insertpendrive there wil b a dialog box press cancel and dont double click the usb icon Click on "Start," "Run"; type "cmd" and press "Enter" to open the command prompt window. Type the drive letter, for example,C followed by a colon (":"), and press "Enter" at the command prompt to open the root directory of the drive. 3. Type "dir/w/o/a/p" and press "Enter" to display a list of files and folders present on the flash drive. Note the existence of any of the following in particular: Autorun.inf, New Folder.exe, Ravmon.exe, New_Folder.exe, svchost.exe. 4. Delete each of the files that have been unprotected by typing "del", pressing the space bar and typing the file name, for example, "del autorun.inf". Then run the antivirus software or scanner and fix the bugs 2.Most malicious persons gets our mobile number while installation and send untrusted messages and notifications also by getting our address book the malicious software can send unwanted messages and ads to all our contact people.So its better not to install the software by accepting the criteria.