Wednesday, March 31, 2010

How do I remove Radmin Trojan

How do I remove Radmin Trojan

network security can not be ignored, believe it or let you hit. Recent Radmin Trojan on the network itinerant criminal madness. If we start by cleaning up the registry key approach to deal with it if it is not able to successfully removed. Because Radmin items through the service to start, and the highly covert. If you are not familiar with the system service, really could not challenge. But then the cunning fox is also able to escape a hunter's eyes. Here we take a look at the anti-crime from Hunan pioneer boat is how to clear cunning Radmin Trojan horse.

to describe the situation
the computer mouse pointer slide for no reason, such as by others in operation. And some more computer software programs, which actually also broadband account viewer. Computers also sometimes automatically restart, or will be closed. At the end of Internet access fees paid to the 电疑营业厅 found that the use of more inexplicable ChinaVnet spending bills online, but I do not have to purchase through Telecom ChinaVnet anything 呀.
ferret out behind
Under these circumstances, my first impression is that in the gray pigeons Trojan. Who called gray pigeons "notorious" mean? Subsequently, prompt action to upgrade anti-virus software, a comprehensive system scan. But in the long process of killing nothing. So I decided in accordance with the "computer reported" vanguard of the anti-crime methods described in manual strangulation gray pigeons, but found not in the gray pigeons Trojan.
really can not be reconciled, I am not it Gaobu Ding a small "horse"? I do not despair, and a careful investigation and system processes and found a suspicious process r_server.exe, found that the process consumes less memory, but the computer in the event of failure that I have described, they suddenly increased, showing that a back door program. End it immediately, and open the registry at HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run to find the location of the value of suspicious loads.
But let my disappointment, did not r_server.exe loaded value, Is it uses what is the latest high-tech? I am thinking all at once broken. So I decided to open a "Command Prompt" type "netstat-an" to see the computer used for all connections with the ports, I found an illegal occupation of 4899 port, and saw the remote control of my IP天址. This time Louchumajiao of.

eliminate Radmin evil "horse"
According to all the signs, online view, I guess I am in the Radmin Trojan. Radmin Trojan's default port is 4899, and the use of Radmin Trojan different from the ordinary run load value, and the Trojan antivirus software, previously considered to be "innocent person" because of its original role is to help network management for remote operation . However, abuse by hackers to others in the illegal invasion, anti-virus software, it also had "thrown down the killer."
I open the Registry Editor, use the process name r_server.exe as a keyword Trojan scan quickly search to the relevant key, I accidentally click to open the "Display Name" key changes to items found in numerical data for "Remote Administrator Service\
here I have a clear way of working Radmin Trojan, and it is not through the run key to load, but through the "service" to load. Know that work like handled. I opened the service items, turn into the "Control Panel → Administrative Tools → Services\Trojan and some of the main program directory will delete DLL files, and then the primary key Radmin deleted, Radmin was thus dispels.

In this case, we can see a computer intruder in the rowboat on the kinds of Trojans, the stolen boat broadband account through ChinaVnet of consumption, this is a despicable, while this is Crime! Ah Liang here to remind you that if the demand for services do not use ChinaVnet, the best online shopping to the offices are closed function to prevent a loss.
Radmin Trojan uses easy for everyone to ignore the service mode to start Trojans, an increase of all anti-crime problems. But then again, and then can not escape the cunning fox hunter's eyes. As long as Trojan horses, are usually occupied by the port system, as long as we have found have been illegally occupied by the port, and then follow it back, we can find a way to clear the Trojans.
finally prompted you to close the redundant services not only enables the system performance can also be added to the system a certain extent, the safety factor. If we require the services of the system are not familiar with, can make use of super-rabbits optimization software, in its start-optimization of the system can be set to start the service. Must not arbitrarily shut down their service, or may lead to system crashes.

No comments:

Post a Comment