http://blog.csdn.net/pipisorry/article/details/41258577

How to manually remove an infected file from your computer

In order to manually remove an infected item from your computer you need to perform the following steps:

1. Restart the computer in Safe Mode. You can do that, by following the steps in our article, here.

2. Display hidden objects in Windows; information on how to display the hidden object can be found here.

3. Locate and delete (right click on the file > delete) the infected file. In our example the infected file is:

C:\\test\\eicar.com.txt

4. After you do this, you can restart the computer in Normal Mode.

Please run a Bitdefender System Scan to be sure the computer is clean.

 Important; We recommend manually deleting an infected file only if you are sure the file isn't an important operating system file. Deleting
a system file may result in the malfunction of your operating system. If you are not sure about the file, please contact the Customer Care Department.

Most common types of files you could encounter and can be safely deleted:
 
I.  Temporary Files
The Temporary files are usually recognized as follows:
  • .tmp files found on C:\\, C:\\Windows, C:\\Windows\\temp, etc.
  • files found in the locations:
               C:\\Windows\\Temp
 
               C:\\Documents and Settings\\Local Settings\\Temp(for Windows XP)
 
               C:\\Users\\AppData\\Local\\Temp(for Windows Vista/7)
 
Note: The system drives where the primary boot volume and OS are. So if you install it to the default it will be C:\\ drive; else please modify the paths accordingly.
 
For more details and step by step instructions please check the KB article How to clean infected Temporary Files.
 
II.  Temporary Internet Files
A temporary Internet file is a file that is located on your hard drive that a browser uses to store Web site data for every Web page or URL address that you visit. When the Web server sends the Web page files to the browser, they are stored in a file so
that the next time you visit the same Web site the browser takes the data from the temporary Internet file. Loading the Web site in this way from a temporary Internet file is called caching.
 
The Temporary Internet Files can be found in different locations depending on the internet browser:
 
For Internet Explorer: the folder is …user’s profile...\\Temporary Internet Files
For Mozilla Firefox: ….user’s profile…\\Mozilla\\Firefox\\Profiles\\xxxxxx.default\\cache
Very similar for other browsers:
For Google Chrome: ….user’s profile…\\Google\\Chrome\\User Data\\Default\\Cache
For Safari: ….user’s profile…\\Apple Computer\\Safari\\cache.db
For Opera: ….user’s profile…\\Opera\\Opera\\cache
 
For more details about the exact locations and how to delete temporary internet files check this this article.
 
 
III. Files located in System Volume Information
Check this KB article to learn how to clean system restore points from System Volume Information
 
IV. Email archives which cannot be repacked by Bitdefender
For more details and how to clean them please check thisarticle.
 
V. For files located on optical devicessuch as CDs, DVDs, Blue-Ray Discs
Unfortunately, these files cannot be cleaned since modify/delete actions are not permitted on this kind of storage devices. You can rest assured that, if you still want to use the respective device, Bitdefender On-Access Scanning will protect your PC from
any attack. However, we recommend you to take safety measures or not using the device at all on computers with no up to date security solution installed.
 
VI. For files located on network storages, NAS,  network shares, mapped network drives, etc.
There are several reasons for Bitdefender not being able to clean the respective files such as: you only have read permissions on the respective network share/storage, therefore no actions can be taken due to limited privileges or the network share has
a different operating system not supported by your Bitdefender virus engines. You can rest assured that, if you still want to access this share, Bitdefender On-Access Scanning will protect your PC from any attack.
 
VII. For tmp.ebd files
In order to remove the infected objects from your computer you need to reset the Windows Update and Windows Search services by following these steps:
  - Temporarily disable the Bitdefender On-Access Scanning from Bitdefender > Settings > Antivirus > Shield tab > use the ON/OFF switch for On-Access Scanning
  - Go to Start > run… (for Windows XP) or Start > click on the Search box (for Windows Vista/7), type services.msc and hit Enter;
  - Locate the Windows Update service, right click on the entry and choose Restart from the dropdown menu;
  - Locate the Windows Search service and restart it as well;
  - Reboot the PC and check if the issue reoccurs.

from:http://blog.csdn.net/pipisorry/article/details/41258577

ref:http://www.bitdefender.com/support/how-to-manually-remove-an-infected-file-from-your-computer-1312.html

How to manually remove an infected file from your computer的更多相关文章

  1. Clouder Manager安装时出现please remove the following file: /etc/cloudera-scm-server/db.properties问题解决(图文详解)

    问题详情 bigdata@ubuntucmbigdata1:/opt/softwares/cm-$ sudo ./cloudera-manager-installer.bin This install ...

  2. 【翻译自mos文章】 在错误的从os级别remove掉 trace file 之后,怎么找到该trace file的内容?

    在错误的从os级别remove掉 trace file 之后,怎么找到该trace file的内容? 參考原文: How to Find the Content of Trace File Gener ...

  3. rm: cannot remove `xxx': Read-only file system

    linux 中出现 Read-only file system - Aidon博客 - CSDN博客 https://blog.csdn.net/u010839779/article/details/ ...

  4. GIT使用[git remove untracked working file]

    使用GIT进行merge的时候, git merge --no-ff master 如果merge之后出现问题, 想进行回退, 可以使用 git reset --hard HEAD 来回退到最新的版本 ...

  5. 『奇葩问题集锦』Malformed lock file found: /var/cache/dnf/metadata_lock.pid.

    Malformed lock file found: /var/cache/dnf/metadata_lock.pid.Ensure no other dnf process is running a ...

  6. Recovering InnoDB table from an .ibd file.

    Recovering an InnoDB table from only an .ibd file. Sometime you may need to recover a table when all ...

  7. How to Deinstall Oracle Clusterware Home Manually

    ###sample 0:安装GI 和DB soft 都成功,如何回退DB soft [opdb@pdbdb01:/db/db/app/db/product/11204/deinstall]$ ./de ...

  8. [转]MySQL: Starting MySQL….. ERROR! The server quit without updating PID file

    转自: http://icesquare.com/wordpress/mysql-starting-mysql-error-the-server-quit-without-updating-pid-f ...

  9. [Storm] java.io.FileNotFoundException: File '../stormconf.ser' does not exist

    This bug will kill supervisors Affects Version/s: 0.9.2-incubating, 0.9.3, 0.9.4 Fix Version/s: 0.10 ...

随机推荐

  1. [BZOJ3816][清华集训2014]矩阵变换(稳定婚姻问题)

    3816: 矩阵变换 Time Limit: 10 Sec  Memory Limit: 512 MBSubmit: 803  Solved: 578[Submit][Status][Discuss] ...

  2. PKUSC2018训练日程(4.18~5.30)

    (总计:共66题) 4.18~4.25:19题 4.26~5.2:17题 5.3~5.9: 6题 5.10~5.16: 6题 5.17~5.23: 9题 5.24~5.30: 9题 4.18 [BZO ...

  3. 【置换群】CH Round #63 - OrzCC杯#2省选热身赛 exchange

    第一问置换群裸题. 第二问单独考虑某个循环,任意交换两个元素,稍微画一下就会发现,把该循环拆成了2个,剩下所需的交换次数减少了1,也就是说,第一步我们任意交换,都能够保证交换次数最少.于是一个循环的答 ...

  4. 【DFS】【最短路】【spfa】【BFS】洛谷P2296 NOIP2014提高组 day2 T2 寻找道路

    存反图,从终点dfs一遍,记录下无法到达的点. 然后枚举这些记录的点,把他们的出边所连的点也全部记录. 以上这些点都是无法在最短路中出现的. 所以把两个端点都没被记录的边加进图里,跑spfa.BFS什 ...

  5. 【动态规划】【二分】【最长不下降子序列】洛谷 P1020 导弹拦截

    最长不下降子序列的nlogn算法 见 http://www.cnblogs.com/mengxm-lincf/archive/2011/07/12/2104745.html 这题是最长不上升子序列,倒 ...

  6. 6.5(java学习笔记)其他流(字节数组流,数据流,对象流,打印流)

    一.字节数组流 之前使用输入输出流的操作的对象是文件,而这里字节数组流操作的对象是内存,内存可以看做是一个字节数组. 使用字节数组流读写就可以看做是从内存A到内存B的读写,对象时内存即字节数组. 1. ...

  7. 关于char类型的说明

    #include<iostream> using namespace std; int main() {  char ch=128;//VC编译器默认是有符号的.但c并未明确给出.由编译器 ...

  8. 【C语言】 Linux下编译提示pow未定义引用

    如下代码: #include <stdio.h> // 调用基本输入输出函数库 #include <math.h> #define PI 3.14 // 定义常量 float ...

  9. 如何提高码农产量,基于ASP.NET MVC的敏捷开发框架之移动端开发随笔二

    前言 在前一篇文章中我已经做过开篇,接下来的随笔会详细讲一下我们的开发框架是如何实现的,专业的事由专业的人来讲,以后就由我们的高级码农小李英文名查尔斯和他的师父厂长(因为姓陈,酷爱摄影,我们的文艺片都 ...

  10. springBoot框架不同环境读取不同的配置文件

    1. 3个配置文件(更多环境可以建多个): application.properties  (公共配置文件) application-dev.properties  (开发环境) applicatio ...