上網問題 |
|
cmf
尊榮會員 發表:84 回覆:918 積分:1032 註冊:2002-06-26 發送簡訊給我 |
|
領航天使
站長 發表:12216 回覆:4186 積分:4084 註冊:2001-07-25 發送簡訊給我 |
|
RaynorPao
版主 發表:139 回覆:3622 積分:7025 註冊:2002-08-12 發送簡訊給我 |
|
RaynorPao
版主 發表:139 回覆:3622 積分:7025 註冊:2002-08-12 發送簡訊給我 |
|
lcsboy
版主 發表:87 回覆:622 積分:394 註冊:2002-06-18 發送簡訊給我 |
|
RaynorPao
版主 發表:139 回覆:3622 積分:7025 註冊:2002-08-12 發送簡訊給我 |
|
cmf
尊榮會員 發表:84 回覆:918 積分:1032 註冊:2002-06-26 發送簡訊給我 |
我終於找到答案了 BKDR_OPTIXPRO.10 說明:
This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.
------
︿︿ |
領航天使
站長 發表:12216 回覆:4186 積分:4084 註冊:2001-07-25 發送簡訊給我 |
引言: 我終於找到答案了 BKDR_OPTIXPRO.10 說明: This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.可否告知您如何解決! ~~~Delphi K.Top討論區站長~~~
------
~~~Delphi K.Top討論區站長~~~ |
cmf
尊榮會員 發表:84 回覆:918 積分:1032 註冊:2002-06-26 發送簡訊給我 |
引言:解決方案: Click Start->Run, type REGEDIT then hit the ENTER key. In the left panel, double click the following: HKEY_LOCAL_MACHINE->Software->Microsoft->Windows ->CurrentVersion->Run In the right panel, look for and then delete this registry value. %windir% is the Windows directory usually located at C:\Windows: "vscanner" "%windir%\spooll32.exe" In the left panel, double click the following: HKEY_CLASSES_ROOT->exefile->shell->open->command In the right panel, right click the value titled as "(Default)" then select modify. Modify the registry data such that "wmmiexe.exe" is removed. If the data was "wmmiexe.exe "%1" %*", after modifying, it should look like ""%1" %*". In the left panel, double click the following: HKEY_LOCAL_MACHINE>Software>CLASSES>exefile>shell>open>command Modify the registry data such that "wmmiexe.exe" is removed. If the data was "wmmiexe.exe "%1" %*", after modifying, it should look like ""%1" %*". Close the Registry. Restart your system. Click Start->Run, type EXPLORER.EXE, then hit the ENTER key. You should be in the Windows Explorer. Go to your Windows folder. Look for and then delete this files: SPOOLL32.EXE Scan your system with Trend antivirus and delete all files detected as BKDR_OPTIXPRO.10. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner.引言: 我終於找到答案了 BKDR_OPTIXPRO.10 說明: This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.可否告知您如何解決! ~~~Delphi K.Top討論區站長~~~
------
︿︿ |
本站聲明 |
1. 本論壇為無營利行為之開放平台,所有文章都是由網友自行張貼,如牽涉到法律糾紛一切與本站無關。 2. 假如網友發表之內容涉及侵權,而損及您的利益,請立即通知版主刪除。 3. 請勿批評中華民國元首及政府或批評各政黨,是藍是綠本站無權干涉,但這裡不是政治性論壇! |