Skip to main content

How To Remove Shortcut Virus From Your Pc.

SpyGlobe is here today with a amazing tech stuff :- 


🔰🔰Method 1. 

- Clean up and remove Shortcut Virus by CMD 


1. Click on  Start  and select  Run;

2. Type: CMD  and Hit Enter to open  Command Prompt;

3. Type the  drive letter  of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.)

4. Type:  attrib g:*.* /d /s -h -r -s  and hit Enter.


🔰Method 2.

- Delete/Wipe Shortcut Virus from Registry -


1. Press Win+R and type: regedit to enter the registry;

2. Navigate to HKEY_CURRENT_USER > Click on Software > Microsoft > Windows > CurrentVersion > Click Run;

3. Press Win + R, type: msconfig > Click OK;

4. In Startup, uncheck everything except for the anti-virus software.

5. Click OK > Click Restart now.


🔰Method 3.

- Remove It By .bat File -

1. Open notepad


2. Copy  &  paste  below given  code


@echo off


attrib -h -s -r -a /s /d Name_Drive:*.*


attrib -h -s -r -a /s /d Name_Drive:*.*


attrib -h -s -r -a /s /d Name_Drive:*.*


@echo complete

3. Save  the file with  remove virus.bat


"Now replace the  Name_drive  with infected  drive name , if you have more than 3 drive simply  copy  and  paste  the command"

4. Now simply  close the file and run it.


░░░░░██╗░█████╗░██╗███╗░░██╗ ░░░░░██║██╔══██╗██║████╗░██║ ░░░░░██║██║░░██║██║██╔██╗██║ ██╗░░██║██║░░██║██║██║╚████║ ╚█████╔╝╚█████╔╝██║██║░╚███║ ░╚════╝░░╚════╝░╚═╝╚═╝░░╚══╝ Click Here !!!

Comments

Popular posts from this blog

Pin-Bruteforce

 Hello all !! Now turn your Kali Nethunter into a bruteforce pin cracker . Here's all your methods ! Simply the method is:-) Git clone   https://github.com/urbanadventurer/Android-PIN-Bruteforce.git Ls Cd Pndroid-Pin-Bruteforce bash ./android-pin-bruteforce ./android-pin-bruteforce crack --length 3 ./android-pin-bruteforce crack --length 6 How it works It uses a USB OTG cable to connect the locked phone to the Nethunter device. It emulates a keyboard, automatically tries PINs, and waits after trying too many wrong guesses. [Nethunter phone] <–> [USB cable] <–> [USB OTG adaptor] <–> [Locked Android phone] The USB HID Gadget driver provides emulation of USB Human Interface Devices (HID). This enables an Android Nethunter device to emulate keyboard input to the locked phone. It’s just like plugging a keyboard into the locked phone and pressing keys. This takes just over 16.6 hours with a Samsung S5 to try all possible 4 digit PINs, but with the optimised PIN list it

Acessing webcam(Phishing)

  Web-Cam Cam-phish is techniques to take cam shots of target’s phone or pc. It is a phishing tool which hosts fake websites on in built PHP server and uses ngrok server to generate a link which we will forward to the target, which can be used on over internet. Website asks for camera permission and if target allows it, this tool grab cam shots of target’s device. Requirements:- apt -get -y install php openssh git wget Installation :- git clone https://github.com/techchipnet/CamPhish cd CamPhish bash camphish.sh Cam-Phish is created to help in penetration testing and it's not responsible for any misuse or illegal purposes. Cam-Phish is inspired by  https://github.com/thelinuxchoice/  Big thanks !!!

OSI Layer and Its Attacks

  The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers. Each layer serves a specific purpose and interacts with adjacent layers to ensure data is transmitted reliably and efficiently across a network.  Disclaimer: For educational Purposes Only. Security vulnerabilities can exist at various layers of the OSI model. By thoroughly testing each layer, developers can identify security weaknesses and implement appropriate security measures to protect against threats such as unauthorized access, data breaches, and denial-of-service attacks. Certainly! Here's an explanation of various attacks that can occur on each layer of the OSI model: 1. Physical Layer: Eavesdropping/Tapping: Unauthorized individuals intercept and listen to data being transmitted over the physical medium, such as cables or wireless signals. Physical Tampering: Attackers physically access network