Jump to content


Pc Pitstop Virus Scan


  • Please log in to reply
7 replies to this topic

#1 Guest_Jerry Price_*

Guest_Jerry Price_*
  • Guests

Posted 17 March 2004 - 06:02 PM

:woot: 7 virus's found!!!! what!!!! then i go to mcaffee site and run again and get nothing...here are the virus's list, What is the problem here? can i delete these zips with out harm? I am not running virus software in the back ground when i run the pc pit stop test: Scan Results: Virus Infection Found Our scan of 34186 files found these viruses: The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-22500802-3f04ce50.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-22500802-3f04ce50.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jar-22500802-3f04ce50.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nocheat.jar-5bd9b61b-79e54610.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\plugin.jar-3e14071c-61e81154.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\plugin.jar-3e14071c-61e81154.zip The Exploit/ByteVerify Virus was found in file C:\Documents and Settings\Jerry Price\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\plugin.jar-3e14071c-61e81154.zip

#2 Jacee

Jacee

    Madam Admin <aka> Maude

  • Admins
  • 27,734 posts
  • Gender:Female


Posted 17 March 2004 - 06:17 PM

:welcome: Jerry

Look at this and follow the 'solution' (hope it works) :) :
http://www.trendmicr...=JAVA_BYTEVER.A

Virus type: Java Applet

Destructive: No

Aliases: ByteVerify

[edit] well it looks like that page has been moved :blink: .....I'll look for another.

MS - MVP Consumer Security 2006 thru 2014


#3 Jacee

Jacee

    Madam Admin <aka> Maude

  • Admins
  • 27,734 posts
  • Gender:Female


Posted 17 March 2004 - 06:29 PM

Try this one:
http://www.pandasoft...ia/results.aspx

Click on Fortnight.F and at the top of that page click on the tab "prevention and cure"

MS - MVP Consumer Security 2006 thru 2014


#4 Guest_Jerry Price_*

Guest_Jerry Price_*
  • Guests

Posted 17 March 2004 - 06:50 PM

:P ahhh scanning now thanx

#5 Jacee

Jacee

    Madam Admin <aka> Maude

  • Admins
  • 27,734 posts
  • Gender:Female


Posted 17 March 2004 - 06:56 PM

I hope you disabled system restore if you have XP or Me....sorry I forgot to tell you that.

MS - MVP Consumer Security 2006 thru 2014


#6 Guest_Jerry Price_*

Guest_Jerry Price_*
  • Guests

Posted 17 March 2004 - 07:32 PM

:erm: uhhhh no i didn't, in fact i never thought to do that.....what should i do now? It said it disinfected them...

#7 Jacee

Jacee

    Madam Admin <aka> Maude

  • Admins
  • 27,734 posts
  • Gender:Female


Posted 17 March 2004 - 08:27 PM

If it was me, I'd run the scan with sys restore turned off, making sure that the trojan was gone. Then I'd set a new restore point.

How to disable system restore:
http://vil.nai.com/v...eSysRestore.htm

A couple more online anti-virus scans:
http://housecall.trendmicro.com/

http://www.ravantivirus.com/scan/

MS - MVP Consumer Security 2006 thru 2014


#8 duanester

duanester

    OpenSuSe Movement

  • Anti-Spyware Brigade
  • 21,446 posts
  • Gender:Male
  • Location:Michigan


Posted 18 March 2004 - 02:18 PM

my brother got rid of that scumware with panda. well it is scumware :)
When you have eliminated the impossible, whatever remains, however improbable, must be the truth !!
Join the next generation of computing, Open Source, and Linux/GNU!
"nvidia license taints kernel"




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users