Computer And Internet, Personal, Tips & Trick

I really hate when people claimed using shared computers always not secure. To stop that words from spreading I do lot of software review and implemented it on my own cybercafe to attract people for use it.

1. I do reinstall all Windows XP home edition from zero (clean install) to make sure my windows on top performance I’m not doing any windows software update, I just updated the driver and security patch.

picture-001.jpgpicture-002.jpg

2. Buy deepfreeze standard edition from faronics company to help me keep my cybercafe computers keep clean from any virus, mallware, spyware or anything each time it reboot. That make me really bored on clean virus or spyware daily! after review deepfreeze with windows steady state I choose deepfreeze because it’s take more less memory resource.

3. Buy some accessories to make my computers more “beauty” this including optical mouse, mousepad gel, camac sound system, usb hub, etc I can’t write in here.

picture-003.jpg

4. Standard software for each computer including : Microsoft Office XP & Open Office, Winamp, Remote admin, Gunbound, mIRC, Yahoo Messenger, ICQ, Internet Explorer and anything usefull I can’t write it in here.

5. I create databank to collecting all people data on server by creating and shared some disk space on server I can save money and people can still save their data because I freeze all client computers to make sure it keep on top performance.

6. I installed programs to cheking all data in and data out from each ethernet to internet and do little modification on windows hosts file to stop people from accessing “p**n” site I redirected into local web server with warning message.

picture-005.jpg

7. The last thing is I do backup of each computer using Norton ghost to help me bring my windows back like new when there is a specific problem.

Now it’s done and time to coverting it. Traffic in last 7 days (I use indobilling to check statistic of visitor) after I change everything going up to 200-300% with daily income more than really enough to pay ISP connection and eletric bill. I save 70-150% from total profit 😀 geez I love my life he he he..

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS
Computer And Internet

There is virus attack my cybercafe server again yesterday. It’s identified as “Stargate” It’s Really hard to stop it first time my server got infected. I lost almost my public data caused by this virus 🙁

Here is the way for people looking to stop this virus, I’m not guarantee this way will make your system clean 100% but sure it will stop the virus.

1. Unplug all cable connected to and from your computers network.

2. Better clean your computer in safe mode

3. Kill Virus process, you can use KillVB to do this. Before you kill virus process better you rename that file from .exe to .scr to preventing stopped by virus.

killvb.jpg

4. Delete registry key made by virus, use this simple VBS script.

Dim oWSH: Set oWSH = CreateObject(“WScript.Shell”)
on error resume Next
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command\”,”””%1″” %*”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command\”,”””%1″” %*”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command\”,”””%1″” %*”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command\”,”””%1″” %*”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\lnkfile\shell\open\command\”,”””%1″” %*”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\Software\CLASSES\regfile\shell\open\command\”,”regedit.exe %1″
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools”)
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\AlternateShell”,”cmd.exe”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\AlternateShell”,”cmd.exe”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\SafeBoot\AlternateShell”,”cmd.exe”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\AlternateShell”,”cmd.exe”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell”,”Explorer.exe”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\”,”Application”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Classes\inffile\”,”Setup Information”
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug\Debugger”,””
oWSH.Regwrite “HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page”,”About:Blank”
oWSH.Regwrite “HKEY_CURRENT_USER\Control Panel\Desktop\SCRNSAVE.EXE”,””
oWSH.Regwrite “HKEY_CLASSES_ROOT\exefile\DefaultIcon\”,”%1″
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableSR”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Monitoring”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\DisableCMD”)
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\DisableCMD”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer\LimitSystemRestoreCheckpointing”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer\DisableMSI”)
oWSH.RegDelete(“HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Windows Title”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Monitoring “)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LogonNetworkService”)
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\st4rg4tE”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\NoFind”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\”)
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun\”)
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\DisallowRun”)
oWSH.RegDelete(“HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\NoFind”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansav.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansav32.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Avguard.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Avscan.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ClamWinPortable.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\command.com\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-SE.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe\debugger\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ViRemoval.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Winamp.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Winrar.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Winzip.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antv-md5-pattern.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Msconfig.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegistriEditor.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cclaw.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killvb.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nip.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nipsvc.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\njeeves.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvccf.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvcoas.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvcod.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zanda.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\”)
oWSH.RegDelete(“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\URemovalCRC32.exe\”)
oWSH.Regwrite “HKEY_CLASSES_ROOT\mp3file\DefaultIcon\”,”C:\Program Files\Windows Media Player\wmplayer.exe,-120″
oWSH.Regwrite “HKEY_CLASSES_ROOT\inffile\DefaultIcon\”,”shell32.dll,-151″
oWSH.Regwrite “HKEY_CLASSES_ROOT\inifile\DefaultIcon\”,”shell32.dll,-151″
oWSH.Regwrite “HKEY_CLASSES_ROOT\mpegfile\DefaultIcon\”,”shell32.dll,-120″
oWSH.Regwrite “HKEY_CLASSES_ROOT\mp3file\shell\open\command\”,”C:\Program Files\Windows Media Player\wmplayer.exe”
oWSH.Regwrite “HKEY_CLASSES_ROOT\mpegfile\shell\open\command\”,”C:\Program Files\Windows Media Player\wmplayer.exe”
oWSH.Regwrite “HKEY_CLASSES_ROOT\txtfile\”,”Text Documents”
oWSH.Regwrite “HKEY_CLASSES_ROOT\txtfile\DefaultIcon\”,”shell32.dll,-152″
oWSH.Regwrite “HKEY_CLASSES_ROOT\jpegfile\”,”JPEG Image”
oWSH.Regwrite “HKEY_CLASSES_ROOT\jpegfile\DefaultIcon\”,”shimgvw.dll,3″
oWSH.Regwrite “HKEY_CLASSES_ROOT\dllfile\DefaultIcon\”,”shell32.dll,-154″
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Classes\inifile\shell\open\command\”,”C:\WINDOWS\System32\notepad.exe %1″
oWSH.Regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Classes\inffile\shell\open\command\”,”C:\WINDOWS\System32\notepad.exe %1″
oWSH.Regwrite “HKEY_CLASSES_ROOT\Directory\shell\”,”none”
oWSH.Regwrite “HKEY_CLASSES_ROOT\Folder\shell\”,””

5. Delete the virus master using search function on windows

– Using Icon Folder

– At Most 46KB

– Type File “Application”

– File extension .com , .exe

7. To make sure your computers are clean from this virus after you doing 6 steps above better scan your computer again using good antivirus.

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS
Computer And Internet, Miscellaneous, Personal, Tips & Trick

Data is important thing in company or organization. People who can’t protect their data is the loser this day. Can you imagine you lost all your data for works? it just like a heaven go away from you he he.. This happen to me yesterday and I lost 1 month production data caused by bad electrical environment. In this short articles I will share a small information how to backup your data periodically.

data_loss

I am using windows server and xampp to run every automation so I will write how to backup MySQL database periodically. First thing you need to know, you have to be creative as possible, I will only tell you the technique not in advanced details. First created a batch file and named it anything you like.. Your batch file content should be like this..

<YOUR PATH TO>\mysqldump -u[username] -p[password] –result-file=”<YOUR PATH TO>\Backup-%DATE:~0,3%.sql” TABLENAME

When you run your batch file it will generate a dumping SQL file. Next the creative part, you can run this batch hourly daily or anytime you need. Be creative by create your own running programs it can be easily programmed through any development tools. Next You can also FTP or Mailed this backup file to make sure you won’t loose it.

That’s a sample on windows, in linux it should be not to much difference, all you need is understand the technique and all can be done via utility every operating system have.

That’s share for today pretty short articles, Have a nice day 😀

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS
Computer And Internet, Miscellaneous, Personal, Tips & Trick

Good morning, I wish everybody have a great day. In this short articles I will write about making an simple “watchdog” application. 14 days ago I need to stabilize an bug application. The bug is really annoying , My application have memory leak each seconds timer fired. This is a bug from VbMySql direct and ODBC MySql Connector, My options to raised physical memory is not approved because application will consume more and more memory without limitation. My second options is writing a new application but it will take more than a month working so I stay with this buggy application and prevent it from error.

I found out when programs closed windows releases all memory this application used, I try to make something to kill an application each 1 hours to release the memory, It’s works!.. Now I need to make an application to auto restarting my program each time it’s killed. Searching on Google then I found sample interesting code.

[to_plus]

Dim objWMIService, colProcesses
Dim Process As String
Process = “YOURPROCESS”
Set objWMIService = GetObject(“winmgmts:”)
Set colProcesses = objWMIService.ExecQuery(“Select * from Win32_Process where name='” & Process & “‘”)
If colProcesses.Count Then
MsgBox (“Process is Running”)
Else
MsgBox (“Process is Not Running”)
End If

It was basic watchdog application, It will check when the process not running on computer background. You can be more creative by adding timer or when this code will fired. With this application I got my buggy application running 99,9% from 100%.

That’s share for today, Have a nice day 😀

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS
Computer And Internet, Personal

My cybercafe just got infected this virus yesterday. It’s spreading from removable device users plug into my server. It’s really annoying because my computers starts to hang for 10 seconds and then it run again but very slows. All I notice is windows give notification low virtual memory, I cannot run Internet explorer (but still I can run another .exe application), and I cannot shutdown the computer. It also effect Internet connection speed, but I’m not really sure about this. When I type  in command prompt netstats -a I see a lot of established connection (maybe virus sending or downloading something).

Frustrated, I’m looking on google with keyword services303.exe but it’s refers to non computer virus. I believe this is first case of services303.exe documented. Lucky me this virus not spreading in my network so I can stop it fast before it infected others computers. I try scan my computer using malwarebytes, avira, avg, eset32/NOD and they not detects any virus *great*.

The main virus is services303.exe and it’s located in [WINDOWSDRIVE]\DOCUMENTS AND SETTINGS\[USERNAME]\APPLICATION DATA\MICROSOFT\SERVICES303.exe with attributes read only and hidden.

It’s also change your registry in:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

It’s set to run services303.exe when computer starts and giving fake program description about Adobe speed launcher.

[to_plus]

How To Remove Services303.exe

1. Run your computers in safe mode.

2. Open command prompt, Go to folder [WINDOWSDRIVE]\DOCUMENTS AND SETTINGS\[USERNAME]\APPLICATION DATA\MICROSOFT\ and type Attrib -s -h /S /D.

3. Once attrib process done you can see file with name services303.exe, delete it! don’t forget empty your recycle bin too.

4. Delete manually auto-start services303.exe in registry, start – run -> regedit and look on this field :

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

5. Delete all temporary Internet and windows files. Use ATFCleaner or Ccleaner.

6. Scan whole system with updated antivirus.

Done, Your computers should back normal again. Have a nice day everyone 😀

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS