Instead of looking for the ofscan.ini, I searched the registry for the Uninstall_Pwd and I found it in HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\Misc. I changed the key value to 70.
I also searched for the Allow Uninstall and I found it under the same above path. I changed from 0 to 1.
I also changed the unload password: the Reg Key is Unload_PWD: I set it to 70 as well.
go to control panel…folder options….click view …..check the box showhidden files…..
go to c:\program data/microsoft/windows/start menu… if start menu folder is like clear …..right click properties…general..unckeck hiden…ok that should fix the problem too… make sure go back and hide folders again …… … Continue reading
If recent programs are not showing up check the following
Right-click the Start button, and choose Properties. On the Start Menu tab of the window that pops up, put a check next to “Store and display a list of recently opened programs“, under the “Privacy” section. This will turn on the “Number of recent programs to display”, when you click on Customize.
Here is how to get it run despite a rootkit being active. Even better, it will find the rootkit (typically SSDT.B). Follow this guide at your own risk and try not to break anything. Download Kernel Detective The reason we cant open TDSSKiller is there is a “filter” watching the CreateProcess happen. We need to remove it by going to KD+ and selecting “System Notify Callbacks” Look for objects like these: Right click and delete the CreateProcess and ImageLoad where the callback routine exists in an unknown module. You’ll notice another CreateProcess called MpFilter.sys, that is Microsoft Security Essentials, don’t worry about that one! You should now be able to run TDSSKiller. Sometimes it won’t always get the root cause, though. You may consider running MBRCheck with TDSS as well, then rebooting. … Continue reading
By default Microsoft Windows hides important files from being seen with Windows Explorer in order to protect these files from being modified or deleted by the user. Unfortunately viruses, rogue programs and other type of malicious software may hide files making it hard to find and delete them. Please follow the step-by-step directions below to show all hidden files in Windows. … Continue reading
Desktop may be blank, data missing in my documents.
Data Recovery is scareware masquerading as computer repair and optimization program. It pretends to scan your computer for hard drive, RAM and Windows registry errors and displays fake warnings. None of this is really surprising, or at least it shouldn’t because it’s a typical scareware. Cyber crooks behind Data Recovery just want to trick as many internet users as possible into paying for bogus computer repair program. This scareware is usually installed by the user when visiting infected/malicious websites or opening infected attachments. Malware authors use social engineering and drive-by downloads to distribute this malicious software too. Once installed, you may be requested to pay to fix supposedly detected critical hard drive errors and RAM failures. Just ignore those fake warnings and notifications about non-existent problems and uninstall Data Recovery from your computer. Of course, it’s easier said than done, so to remove this malware from your computer, please follow the removal instructions below. … Continue reading
After removing certain malare, APC_INDEX_MISMATCH BSOD may occur after reboot.
This STOP error can occur during startup or at other times. The 8 digit hexadecimal number 0x00000001 translates to the error APC_INDEX_MISMATCH which may be caused by the following: … Continue reading
XP Total Security 2011 is a deceiving security program that pop-up too much alerts and warning messages aiming to persuade users into obtaining its licensed version. XP Total Security 2011 virus is ordinarily distributed by Trojan infection that often cause by security fault. Most recent version of Trojan easily muscle its entry undetected by antivirus program with rootkit method. This technique conceals Trojan’s presence by masking illicit activities while maintaining normal operation. … Continue reading