![]() |
|
論壇說明 | 標記討論區已讀 |
歡迎您來到『史萊姆論壇』 ^___^ 您目前正以訪客的身份瀏覽本論壇,訪客所擁有的權限將受到限制,您可以瀏覽本論壇大部份的版區與文章,但您將無法參與任何討論或是使用私人訊息與其他會員交流。若您希望擁有完整的使用權限,請註冊成為我們的一份子,註冊的程序十分簡單、快速,而且最重要的是--註冊是完全免費的! 請點擊這裡:『註冊成為我們的一份子!』 |
![]() ![]() |
|
主題工具 | 顯示模式 |
![]() |
#1 |
長老會員
![]() |
![]() 我電腦內有個W32.Spybot.Worm這種病毒,刪除不了,我是用WIN2000,我找過NORTON的網站,找不到中文的解決法,只有連結到國外的NORTON站去,但一看到很多字我頭就昏了,找不到真正的解決法,請好心的大大幫幫忙,指點迷津,謝謝!!
|
__________________ 問我為何來了卻不說話?!問我為何潛水?! 其實, 並非如此。 只是回復本性! |
|
![]() |
送花文章: 3144,
![]() |
![]() |
#3 (permalink) |
|
![]() 解法:(文章太長,沒時間幫您翻譯...)
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1.Disable System Restore (Windows Me/XP). 2.Update the virus definitions. 3.Restart the computer in Safe mode. 4.Run a full system scan and delete all the files detected as W32. Spybot.Worm. 5.Delete the value that was added to the registry. 6.Delete any zero-byte files in the startup folder. For specific details on each of these steps, read the following instructions. 1. Disabling System Restore (Windows Me/XP) If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer. Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations. Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles: "How to disable or enable Windows Me System Restore" "How to turn off or turn on Windows XP System Restore" For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, "Antivirus Tools Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455. 2. Updating the virus definitions Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions: Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate). Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater). The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions. 3. Restarting the computer in Safe mode Restart the computer in Safe mode. All the Windows 32-bit operating systems, except for Windows NT, can be restarted in Safe mode. NOTE: The following instructions are basic and can vary slightly depending on the operating system. If the computer is running, shut down Windows and then turn off the power. Wait 30 seconds, and then turn on the computer. Start tapping the F8 key. When the Startup Menu appears, ensure that the Safe mode option is selected. In most cases, it is the first item in the list and is selected by default. (If it is not selected, use the arrow keys to select it.) Press Enter. The computer will start in Safe mode. This can take a few minutes. When you are finished with all the troubleshooting, close all the programs and restart the computer as you normally would. 4. Scanning for and deleting the infected files Start your Symantec antivirus program and make sure that it is configured to scan all the files. For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files." For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files." Run a full system scan. If any files are detected as infected with W32.Spybot.Worm. Write down the filenames, and then click Delete. 5. Deleting the value from the registry CAUTION: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions. Click Start, and then click Run. (The Run dialog box appears.) Type regedit then click OK. (The Registry Editor opens.) Navigate to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run In the right pane, delete any values that refer to the filename that was detected as infected with W32.Spybot.Worm. Navigate to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce In the right pane, delete any values that reference the filename in step d. Exit the Registry Editor. 6. Delete the zero-byte files from the Startup Folder Follow the instructions for your operating system: NOTE: There may be legitimate files on your system that start with "tftp." Make sure to only delete the zero-byte files from the Startup folder. Windows 95/98/Me/NT/2000 Click Start, point to Find or Search, and then click Files or Folders. Make sure that "Look in" is set to (C ![]() In the "Named" or "Search for..." box, type, or copy and paste, the file name, tftp*.* Click Find Now or Search Now. Delete the files that are zero-bytes and contained within any folder that ends with "Startup." Windows XP Click Start, and then click Search. Click All files and folders. In the "All or part of the file name" box, type, or copy and paste, the file names tftp*.* Verify that "Look in" is set to "Local Hard Drives" or to (C ![]() Click "More advanced options." Check "Search system folders." Check "Search subfolders." Click Search. Delete the files that are zero-bytes and contained within any folder that ends with "Startup." |
送花文章: 0,
![]() |
![]() |
#6 (permalink) |
長老會員
![]() |
![]() 其實...最大的問題不是在於我看不懂英文,是在於我進了REGEDIT之後,我找到了指示刪除修改的地方,我找不到Navigate to the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run In the right pane, delete any values that refer to the filename that was detected as infected with W32.Spybot.Worm. Navigate to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce In the right pane, delete any values that reference the filename in step d. Exit the Registry Editor. 6. Delete the zero-byte files from the Startup Folder Follow the instructions for your operating system: 我電腦中找不到這個東西啦!! W32.Spybot.Worm.還有驅勢的網站我也看過,我找不到指示修改中的這個eth0 driver = EXEC.EXE ,所以病毒依舊存在,問題也沒解決,有沒好心點的高手大大幫個手啊!! |
![]() |
送花文章: 3144,
![]() |
![]() |
#12 (permalink) |
長老會員
![]() |
![]() |
__________________ CPU : Intel Core2 Duo E6550 MB : Gigabyte GA-P35-DS3 RAM : Transcend DDRII800 1GB *2 HD : WD 2500AAKS SATAII 250G *2 DVDRW: Pioneer A8 + LiteOn LH-20A1H VGA : ELSA 8600GT PH2 256M DDR3 POWER: SeaSonic S12II 430W |
|
![]() |
送花文章: 2847,
![]() |