Showing posts with label Virus Solutions. Show all posts
Showing posts with label Virus Solutions. Show all posts

Friday, January 28, 2011

How to Fix Generic Host For Win32 and Svchost.exe Error


          What are Generic Host For Win32 and Svchost.exe Error and how to conferm that your pc infected by this malicious?When your pc infected you will see couple of symptom like these: In time of surfing internet suddenly you will see your internet activites become hault but you are still connected through your network and network icon of taskbar is showing ok.As you can not surf, you try to disconnect your connection but network icon will not removed.Some time you will see different type of message like below:


1."Generic Host Process for Win32 Services has encountered a problem and needs to close. We are sorry for the inconvenience."

2."svchost.exe -- application error the instruction at "0x745f2780" reference memory at "0x00000000". the memory could not be 'read'"

Some error message will report you about faulting netapi32.dll and svchost.exe. or your pc has recoverd from a serious problem.

So these are the common symptom of this problem.

Now we discuss actually what is it

What is an Generic Host Process for Win32 Services and svchost.exe?

Generic Host Process for Win32 Services or svchost.exe is a legal and essential component of Windows which is used to host services which run from dynamic-link libraries (DLLs). Multiple instances of Svchost.exe can run at the same time. So it is not a problem in most cases if you see five or six or even more copies of svchost.exe running in your services because they host different groups of DLLs. However, there are several known spyware anâ trojans that pretend to be legal svchost.exe. They usually have the same name or one of the following names: svchost.exe, svchosts.exe (which often causes svchosts.exe page faults), Generic.exe, svcchost.exe and several others. Please note that legal svchost.exe should reside in Windows\System32 folder and should not appear in startup list.

Now we will see how to remove this evil problem.

There are lots of easy way to remove this problem, I mentioned couple of them below:
Solution 1:

Follow these simple steps and your Windows will be fully cured of this malicious

Close Port 445:

1. Start Registry Editor (Regedit.exe) by clicking Start menu, and then click the Run icon.
2. In the small box that Opens, type: regedit then click the OK button. The Registry Editor will now have opened.
3. Locate the following key in the registry:
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNetBTParameters
In the right-hand side of the window find an option called TransportBindName.
Double click that value, and then delete the default value, thus giving it a blank value.

Close Port 135:

1. Then you must now navigate to the following registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftOLE
2. You will see there is a String Value called: EnableDCOM
Set the value to: N (it should currently be Y)
3. Close the Registry Editor. Shutdown and Restart your computer.

Now you will see your problem is solved.

Solution 2:

This is another way to fix Generic Host For Win32 Error in Windows:

1. 'Run' and open 'Regedit' and
Navigate to:
HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > Browser > Parameters
2.Find the Key
Name: IsDomainMaster
and set
Data: False
3.Restart Your PC
Solution 3:

1.Go to 'Run' and open 'cmd'
2.Type 'netsh' in command console then press enter
3.Then type 'winsock' and press enter and then type reset
4.Restart Your PC

These are some easy ways to solve Generic Host For Win32 Error and Svchost.exe Error
without using any third party software or spyware removing tools.If you want to use any tool or software to remove Generic Host For Win32 and Svchost.exe Error you can us these free tools from some website


Thursday, January 27, 2011

What is Computer Virus?. How to Protect Yourself from Virus?


Basic types of viruses
File viruses
File viruses, also known as parasitic or executable viruses, are pieces of code that attach themselves to executable files, driver files or compressed files, and are activated when the host program is run. After activation, the virus may spread itself by attaching itself to other programs in the system, and also carry out the malevolent activity for which it was programmed. Most file viruses spread by loading themselves in system memory and looking for any other programs located on the drive. If it finds one, it modifies the program’s code so that it contains and activates the virus the next time it’s run.
 It keeps doing this over and over until it spreads across the system, and possibly to other systems that the infected program may be shared with. Besides spreading themselves, these viruses also carry some type of destructive constituent that can be activated immediately or by a particular ‘trigger’. The trigger could be a specific date, or the number of times the virus has been replicated, or anything equally trivial. Some examples of file viruses are Randex, Meve and Mr Klunky.

Boot sector viruses
A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Though boot viruses still exist, they are rare compared to new-age malicious software. Another reason why they’re not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive. Examples of boot viruses are Polyboot.B and AntiEXE.
Multipartite viruses
Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A well-known multipartite virus is Ywinz.
Macro viruses
Macro viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases and other similar application files such as Corel Draw, AmiPro etc. Since macro viruses are written in the language of the application and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac and any other system, so long as they are running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over networks, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax and Bablas.
Network viruses
This kind of virus is proficient in quickly spreading across a Local Area Network (LAN) or even over the Internet. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. Once a new vulnerable system is found, the network virus infects the other system, and thus spreads over the network.Some of the most notorious network viruses are Nimda.
Email Viruses
An email virus could be a form of a macro virus that spreads itself to all the contacts located in the host’s email address book. If any of the email recipients open the attachment of the infected mail, the virus spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. Email viruses can infect hosts even by previewing the infected email in a mail client.

How to Protect Yourself from Virus?
Virus Protection
virus may or may not present itself. Viruses attempt to spread before activating whatever malicious activity they may have been programmed to deliver. So, viruses will often try to hide themselves. Sometimes there are symptoms that can be observed by a trained casual observer who knows what to look for (but, don't count on it).
Virus authors often place a wide variety of indicators into their viruses (e.g., messages, music, graphic displays). These, however, typically only show up when the virus payload activates. With DOS systems, the unaccounted for reduction of the amount of RAM known to be in the computer is an important indicator resident viruses have a hard time getting around. But, under Windows, there is no clear indicator like that. The bottom line is that one must use anti-virus software to detect (and fix) most viruses once they are on your system.
Your main defense is to detect and identify specific virus attacks to your computer. There are three methods in general use. Each has pros and cons and are discussed via these links. Often, a given anti-virus software program will use some combination of the three techniques for maximum possibility of detection.
With dangerous viruses on the network, what can computer users do to protect their systems?Here are just a few hints:
• Be sure to install an anti-virus software program (see the next section) to guard against virus attacks. Also, be sure you turn on the scanning features. It can't protect you if it's not enabled.
Practice caution when working with files from unknown or questionable sources.
• Do not open e-mail attachments if you do not recognize the sender (though you may also receive viruses from people you know). Scan the attachments with anti-virus software before opening them.
Download files only from reputable Internet sites, and be wary when exchanging diskettes or other media with friends.
• Scan your hard drive for viruses monthly.
Even with these precautions, new viruses may find ways to enter your computer system.

Friday, January 21, 2011

New Virus Through Mail

Dear All,
               A New Virus is Spreading through mail, please take precaution while clicking on any unknown mails.Don’t just get too excited if you receive an email containing a PowerPoint presentation claiming to contain lovemaking techniques from the Indian book “Kamasutra”! It may not be as healthy for your computer and a trojan named “Troj/Bckdr-RFM” shall get installed in the background to let hackers gain control of your system and steal all your personal information. Your computer may even be used to host attacks on websites or send spam. This was published in an online report of a computer security agency “Sophos”.The presentation file is sent as an attachment usually with the name “Kamasutra.ppt.exe”. Beware if you receive any such email and report it immediately.

Saturday, December 25, 2010

Safer Way to Delete Viruses From USB FLASH DRIVES

Now a days viruses are comes from USB flash drives, so here is tip to protect your usb flash drives and computer from viruses. 

Just follow these simple steps and delete viruses from usb flash drives without affecting your system.

Here are steps:
1). Connect your usb flash drive and do not open it by using autorun.

2). Open Run and type cmd and press enter.

3). In the Command Prompt, Type the drive letter of your usb flash drive(you can check it from my computer) and then press enter.

4). Type dir/w/o/a/p and press Enter.
It will display list of files.

5). Now in that list search for virus files like:
Autorun.inf
New Folder.exe
Bha.vbs
Iexplore.vbs
Info.exe
New_Folder.exe
Ravmon.exe
RVHost.exe
any other files with .exe Extension . *

6). If it contains any of the files above file then type attrib -h -r -s -a *.* and press Enter.

7). Delete each of that file using delete Command
del filename (For exaple: del autorun.inf )
Its done!

Now you can scan your usb flash drive with any good antivirus and then can open it without affecting your system.
Alasan Memilih Bergabung di Pulsagram Allowances Announcements APLIKASI HP APLIKASI PC Banking bisnis internet BISNIS ONLINE BOLA BSNL Business Cara Buat Akun Liberty Reserve (LR) Cara Daftar Di Neobux Cara kerja Copy Paste Cara mendapatkan uang dari duitbux Cara Mendapatkan Uang dari Facebook Melalui Like To Cash Cara Mudah Cari Dollar Via Donkeymails Cara mudah dapat uang melalui internet dengan Dollarsincome CEA CGHS Computer Guidelines Customer Care dapat dollar gratis Dollar Dari Clicksense Dollar Dari Neobux dollar gratis DOP News DOP Orders DOPT Orders DOWNLOAD Education Employees News Employment News Entertainments Events Exam / Result Exam / Syllabus FACEBOOK FAQ For System Administrators Forms GDS General Informations General Knowledge GOVT Orders Guidelines Hardwares Health Tips Holiday Home Honorarium / Incentives Income Tax INFO KITA Info Lowongan Kerja Internet Tips IPO JOB COPAS Jual KERJA COPY PASTE Kerja Sampingan Kode Bank Indonesia Latest Software Updates Leave Rules Lowongan kerja aman Lowongan kerja copy paste LOWONGAN KERJA ONLINE LTC MACP Mails MASTER BURUNG Membuat Account PayPal Menaikkan atau menurunkan berat badan dengan Herbalife Menghasilkan Uang dari PTC Lokal Wisbux Mobile Tips National Pension System (NPS) Network Trouble shooting News Obat Pemutih Gigi Membuat Gigi Putih Berseri Pay Commission Pension Persmin Pie Susu Bali Paling Enak dan Asli Yah Merek Kami... PLI and RPLI PointOfSale Postal Informations Postal Savings Schemes Printer Trouble shooting Printing Tips Project Arrow ptc terpercaya Questions / Answers Railway Recovery Tips Registry Tips Registry Tools Reimbursement rental mobil di surabaya RMS Rulings SanchayPost Savings Scheme SB Orders SBCO Security Guidelines Security Tips sewa mobil di surabaya Software Tips Softwares SQL Staffs and Welfare Tanya - Jawab Technology TEMPLATE Testimoni Tips and Tricks TN - தமிழ்நாடு Tools Training Transfer / Postings Trouble shooting UnCategorized Union News Useful Softwares Utilities Verifikasi PayPal tanpa Credit Card Virus Solutions Websites windows 7 Windows Server Windows Tips Windows Vista wootekh biolo slimming capsule wsc biolo world slimming capsule biolo