Shortcut Virus Removal

Sometimes when we see that our pen drives or memory card affected by shortcut virus then we format it without knowing anything because we feel annoying most of the time seeing the ugly shortcut image just popping during a click. Shortcut virus has mainly two types;
the most common is pen drive/ Flash drive Shortcut virus, second is the File and Folder Shortcut virus.

Shortcut virus is totally Trojan virus. It combine  files in your pen drive and Keep it into one hidden folder. Then, it create a shortcut.exe for pen drive.

Actually You can remove that shortcut virus from your any computer drive or removable drive.

Step-1- At first, go to start menu and then go to ‘run’ option. You can also press Windows key + R.

Step-2- Then type “cmd” into the box and press OK bottom to run command prompt.

Step-3- Then if you did not connect your infected removable drive (Pen drive, SD Card), just connect it to your computer.

Step-4- After attached the infected removable drive just type this following command in Command prompt: attrib -h -r -s /s /d H:\*.*, (Where H is the removable drive) and press Enter.

Step-5- Now you can copy data from your removable drive because the shortcut virus is fixed now.

Step-6 – After saving the data, now format your removable drive completely.

Step-7 – Then, if your removable drive formatted then copy all data back to your removable drive.

 

This may also be written as under : –

Insert your removable device, and notice the drive letter of your removable device. Like here it is G: and while you open by any process it will come up like this as shown.

3

And you will not find your data anywhere in these icons. You just need to follow simple steps after this.

  • Now, open command prompt, by typing “cmd” (without quotes) in search bar in start menu.
  • When command prompt pops up, just write your removable device’s drive letter, like here it is G, with a colon, like “g:” (without quotes), and hit ENTER.

1

It will redirect you to that drive.

  • You just need to remember this command and nothing else in this whole process, which you have to type in command prompt window,
    attrib g:*.* -a -r -s -h /s /d” (without quotes) and hit ENTER, like this:
 

It will retrieve your data in that drive, when you open your drive it will have a unnamed folder(here, last folder), like this:

 

And now, when you open this folder, Bam! You have all your data here. Like this:

with some other virus icons, which we will tackle later.

  • Now, you have to write this command to delete that shortcut virus:
    del *.lnk” (again, without quotes) and again hit ENTER, like this:

Now, you will see that shortcut virus has disappeared, like this:

 
  • Now that the virus is deleted and all your data is retrieved, Select and copy all your data somewhere, like desktop, and don’t select some unknown files, which are virus. and after copying them somewhere, Format your removable device and again put all your data in your device.
 Last but not the least if it feels embarrassing to remove the virus manually it will be quite easy to go through the latest updates of your antivirus and get the drives scan which will automatically remove or repair the unwanted or damaged files respectively.
Hope the article will help to gain whatever I had in my brain about this shortcut virus.
Jagat

How to find – Websites, secretly connected to your computer

Hello dear friends, Hope you all are fine with health and happiness.

Sometimes we use better connections but still we get slow speed which is quite annoying,this things happens due to fact that malware, spyware or any adware using your internet behind the scenes resulting to slow data transfer on original requirement of speed. Here is the technique to know what is going behind the hood.

Third party firewall also provide feature of blocking unwanted connections unless to manage exclusion option for some sites.

netstat command from command prompt window is used to find the network statistics in details. This works in windows XP (out of date) and above i.e vista, 7,8,8.1 etc. In XP only service pack 2 is found to be responsive in this case. netstat command generate list of networks in systematic way in specified amount of time.

First of all log in your computer – window as an administrator (Any changes to the computer or information in the computer can be easily generated from Administrative log)ximg_53e314466c377-png-pagespeed-gpjpjwpjjsrjrprwricpmd-ic-iygyw7ynls

Window 8.x , command prompt is obtained by right clicking on desktop and choosing command prompt (Admin) option. Below 8, command prompt is entered by clicking start menu and entering “cmd.exe” in the search box. When the result display right click on cmd.exe and click run as administrator from popup menu.

2

If user account control Dialogue box appears click yes to continue.(User Account Dialogue Box may or may not appear depending upon your user settings).

4

Type the following command in the command prompt:

netstat -abf 5 > activity.txt

5

Here the  –a option shows all connections and listening ports,

–b option shows the application which is making the connection,

–f option displays the full DNS name for each connection option for easier

understanding of where the connections are being made to.

You can also use the –n option if you wish to only display the IP address.

The 5 option will poll every 5 seconds for connections to make it more easy to track what is going on, and the results are then piped into the activity.txt file.

Wait about two minutes and then press Ctrl + C to stop the recording of data.

Once  recording data is finished, Simply open the activity.txt file in your favorite editor to see the results, or type activity.txt at the command line to open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients, email programs, etc.) that have made an internet connection in the last two minutes, or however long you waited before pressing Ctrl + C. It also lists which processes connected to which websites.

If you see process names or website addresses with which you are not familiar, you can search for “what is (name of unknown process)” in Google and see what it is. It may be a system function you don’t know about or a function of one of your running programs. However, if it seems like a bad site, Google helps you to get rid of it.

6

Some third party softwares are also handy in knowing and removing unwanted connections.

CURRPORTS and TCPVIEW are some of the common ones.

Thank you for bearing me ..

Jagat