اعلان 1 اعلان 1 اعلان 1 اعلان 1 اعلان 1 اعلان 1


هل جهازي مهكر والا لا ؟؟

الموضوع في 'الملتقى العام' بواسطة ذات التسبد الحايم !, بتاريخ ‏2012-08-10.


  1. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    هذا التقرير الاول

    Trend Micro End User License Agreement
    Software: HijackThis
    Version: English/Multi-country
    Date: April 2007

    IMPORTANT: YOU MUST CAREFULLY READ AND AGREE TO ALL TERMS AND CONDITIONS OF THE FOLLOWING END USER LICENSE AGREEMENT BEFORE INSTALLING OR USING THE SOFTWARE.
    THIS AGREEMENT SETS FORTH THE TERMS AND CONDITIONS UNDER WHICH TREND MICRO IS WILLING TO LICENSE THE "SOFTWARE" TO "YOU" AS AN INDIVIDUAL USER OR AN AUTHORIZED REPRESENTATIVE OF AN ENTITY.
    BY CLICKING THE "I ACCEPT" BUTTON BELOW, YOU ARE EXPRESSING YOUR INTENT TO ENTER INTO, AND ARE ENTERING INTO, A BINDING LEGAL CONTRACT ("AGREEMENT") BETWEEN YOU AND TREND MICRO INCORPORATED OR ONE OF ITS AFFILIATES ("TREND MICRO"). THE TERMS AND CONDITIONS OF THE AGREEMENT THEN APPLY TO YOUR USE OF THE SOFTWARE. WE ENCOURAGE YOU TO PRINT A COPY OF THE AGREEMENT FOR YOUR RECORDS
    YOU MUST ACCEPT THIS AGREEMENT BEFORE YOU INSTALL OR USE THE SOFTWARE. IF YOU ARE ACQUIRING THE SOFTWARE ON BEHALF OF AN ENTITY, THEN YOU MUST BE PROPERLY AUTHORIZED TO REPRESENT THAT ENTITY AND TO ACCEPT THIS AGREEMENT ON ITS BEHALF.
    YOU ACCEPT THIS END USER LICENSE BY CLICKING THE "I ACCEPT" BUTTON BELOW. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, SELECT "I DO NOT ACCEPT". YOU WILL THEN NOT BE PERMITTED TO INSTALL OR USE THE SOFTWARE.
    1. LICENSE. Upon Your acceptance of the terms and conditions of this Agreement, Trend Micro hereby grants You a nonexclusive, nontransferable, non-sublicensable, royalty-free, worldwide license, to download, install the Software, for Your own use only. Trend Micro reserves the right to enhance, modify, or discontinue the Software or to impose new or different conditions on its use at any time without notice.
    2. USE RESTRICTIONS AND OWNERSHIP. The Software is licensed not sold. Trend Micro owns the title and intellectual property rights to the Software, and reserves all rights not expressly granted to You in this Agreement. You agree that you will not rent, loan, lease or sublicense the Software. You agree not to attempt to reverse engineer, decompile, modify, translate, disassemble, discover the source code of, or create derivative works from, any part of the Software or authorize others to undertake any of these acts.
    3. BACKUP. For as long as You use the Software, You agree to regularly back-up Your computer programs and files ("Data") on a separate media. You acknowledge that the failure to do so may cause You to lose Data in the event that any error in the Software causes computer problems, and that Trend Micro is not responsible for any such Data loss.
    4. TERMINATION. Trend Micro may terminate the license at any time for any reason. Upon such termination, You agree to delete or destroy all copies of the Software. You may terminate this Agreement at any point by destroying or deleting all copies of the Software.
    5. REPORTS AND PRIVACY. At any time during the term of this Agreement, You may choose to send to Trend Micro a report of log files that may include personal information that the Software scanned on Your computer. By accepting this Agreement, You hereby give Your consent to Trend Micro to process log file data provided by You ("Information") in connection with this Agreement; processing may include collection, registration, storage, modification or disclosure of such Information to third parties. As a condition to using the Software and by accepting this Agreement, You ensure, represent and warrant that You are legally permitted to provide Trend Micro with access to the Information and You also give Your consent to Trend Micro to transfer or store the Information in one or more of its group companies, located in and/or outside the country where You are located, and/or in jurisdictions which may have a lower level of protection of Information than is applicable in the country where You are located or where pr
    ivacy laws may not be as stringent as those in Your own country.
    6. CAUTION AND ACKNOWLEDGEMENT. The Software is designed to identify different types of files, operating system changes, registry or browser settings, which, in Trend Micro's judgment, may compromise computer security or productivity. You agree that Trend Micro shall not be responsible for any removal or disabling of files or settings or the results of such removal or disabling. You are solely responsible for selecting which files or settings to remove from Your computer.
    7. NO WARRANTY. THE SOFTWARE IS PROVIDED "AS IS," WITHOUT WARRANTIES OF ANY KIND. TREND MICRO DOES NOT WARRANT THAT YOUR USE OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE. TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, TREND MICRO DISCLAIMS AND EXCLUDES ALL REPRESENTATIONS AND WARRANTIES WITH RESPECT TO THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF NONINFRINGEMENT OF THIRD PARTY RIGHTS, SATISFACTORY QUALITY, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE.
    8. NO LIABILITY FOR CONSEQUENTIAL DAMAGES.
    (A) TREND MICRO DOES NOT SEEK TO LIMIT OR EXCLUDE ITS LIABILITY IN THE EVENT OF DEATH OR PERSONAL INJURY CAUSED BY ITS NEGLIGENCE OR FOR FRAUD OR FOR ANY OTHER LIABILITY FOR WHICH IT IS NOT PERMITTED BY LAW TO EXCLUDE.
    (B) TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, TREND MICRO DISCLAIMS ALL LIABILITY FOR CONSEQUENTIAL, SPECIAL, INCIDENTAL OR INDIRECT DAMAGES OF ANY KIND OR FOR LOST OR CORRUPTED DATA OR MEMORY, SYSTEM CRASH, DISK/SYSTEM DAMAGE, LOST PROFITS OR SAVINGS, OR LOSS OF BUSINESS, ARISING OUT OF OR RELATED TO THIS AGREEMENT. YOU ALSO UNDERSTAND AND AGREE THAT YOU DOWNLOAD, INSTALL AND/OR USE THE SOFTWARE AT YOUR OWN DISCRETION AND RISK AND THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM THE USE OF THE SOFTWARE.
    9. CONSUMER PROTECTION AND PRIVACY. SOME COUNTRIES, STATES AND PROVINCES, INCLUDING MEMBER STATES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW CERTAIN EXCLUSIONS OR LIMITATIONS OF LIABILITY, SO THE ABOVE DISCLAIMER OF WARRANTY AND EXCLUSION OR LIMITATION OF LIABILITIES (SECTIONS 7 AND 8) MAY NOT FULLY APPLY TO YOU. YOU MAY HAVE ADDITIONAL RIGHTS AND REMEDIES. SUCH POSSIBLE RIGHTS OR REMEDIES, IF ANY, SHALL NOT BE AFFECTED BY THIS AGREEMENT. THERE MAY BE MANDATORY REGULATIONS OR LEGAL PROVISIONS THAT ARE APPLICABLE TO YOU AS A CONSUMER.
    10. COMPLIANCE WITH ALL LAWS, EXPORT CONTROL. The Software is subject to export controls under the U.S. Export Administration Regulations. The Software may not be exported or re-exported to entities within, or residents or citizens of, embargoed countries or countries subject to applicable trade sanctions, nor to prohibited or denied persons or entities without proper government licenses. Information about such restrictions can be found at the following websites: http://www.treas.gov/ofac/ and www.bis.doc.gov/complianceandenforcement/ListsToCheck.htm. You are responsible for any violation of the US export control laws related to Your copy of the Software. By accepting this Agreement, You confirm that You are not a resident or citizen of any country currently embargoed by the U.S. and that You are not otherwise prohibited from receiving the Software.
    11. U.S. GOVERNMENT RESTRICTED RIGHTS. If the entity on whose behalf You are acquiring the Software is any unit or agency of the United States Government, then that Government entity acknowledges that the Software, (i) was developed at private expense, (ii) is commercial in nature, (iii) is not in the public domain, and (iv) is "Restricted Computer Software" as that term is defined in Clause 52.227 19 of the Federal Acquisition Regulations (FAR) and is "Commercial Computer Software" as that term is defined in Subpart 227.471 of the Department of Defense Federal Acquisition Regulation Supplement (DFARS). The Government agrees that (i) if the Software is supplied to the Department of Defense (DoD), the Software is classified as "Commercial Computer Software" and the Government is acquiring only "restricted rights" in the Software and its documentation as that term is defined in Clause 252.227 7013(c)(1) of the DFARS, and (ii) if the Software is supplied to any unit or agency of the United States Government ot
    her than DoD, the Government's rights in the Software and its documentation will be as defined in Clause 52.227 19(c)(2) of the FAR.
    12. GOVERNING LAW. Unless otherwise required by the specific jurisdiction’s laws, this Agreement will be governed by the laws of the State of California, USA, without regard to the provisions of the United Nations Convention on Contracts for the International Sale of Goods and the conflict of laws provisions of Your state or country of residence.
    13. GENERAL PROVISIONS. This is the entire agreement between You and Trend Micro with respect to the subject matter hereof and supersedes and replaces all prior or contemporaneous understandings or agreements regarding such subject matter. Any waiver of any provision of this Agreement will be effective only if in writing and signed by Trend Micro. In the event that any provision or portion of this Agreement is found to be invalid, that finding will not affect the validity of the remaining parts of this Agreement. Trend Micro may assign or subcontract some or all of its obligations under this Agreement to qualified third parties or its affiliates and/or subsidiaries, provided that no such assignment or subcontract shall relieve Trend Micro of its obligations under this Agreement.
    14. QUESTIONS. Address all questions about this Agreement to: legalnotice@trendmicro.com.

    The Software is protected by copyright, trade secret and U.S. PATENT laws, and international treaty provisions. UNAUTHORIZED REPRODUCTION OR DISTRIBUTION IS SUBJECT TO CIVIL AND CRIMINAL PENALTIES.

    تقرير البرامج المثبته مثل ما ذكرت لك مالقيت كلمة Torrent وش الحل ؟؟!
     
  2. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    التقرير الثاني انتظر تعليماتك

    هذا آخر تقرير

    [​IMG]

    ان شاء الله شغلي تمام :tongue:
     
  3. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    اختي تقرير الاول غلط هذي الاتفاقية حقت الاستخدام للبرنامج اضغطي scan
     
  4. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    Logfile of Trend Micro HijackThis v2.0.4
    Scan saved at 03:04:33 ص, on 11/08/12
    Platform: Windows 7 SP1 (WinNT 6.00.3505)
    MSIE: Internet Explorer v8.00 (8.00.7601.17514)
    Boot mode: Normal
    Running processes:
    C:\Windows\system32\taskhost.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\system32\taskeng.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Real\RealPlayer\Update\realsched.exe
    C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\Program Files\HP\HP Software Update\hpwuschd2.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Alwil Software\Avast5\AvastUI.exe
    C:\Users\Fujitsu\Documents\HijackThis.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\MSN Toolbar\Platform\6.3.2291.0\mswinext.exe
    C:\Program Files\Microsoft\Search Enhancement Pack\SCServer\SCServer.exe
    C:\Windows\system32\SearchProtocolHost.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
    O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
    O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\Alwil Software\Avast5\aswWebRepIE.dll
    O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: Windows Live Messenger Companion Helper - {9FDDE16B-836F-4806-AB1F-1455CBEFF289} - C:\Program Files\Windows Live\Companion\companioncore.dll
    O2 - BHO: URLRedirectionBHO - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~1\MICROS~2\Office14\URLREDIR.DLL
    O2 - BHO: Bing Bar BHO - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN Toolbar\Platform\6.3.2291.0\npwinext.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O3 - Toolbar: @C:\Program Files\MSN Toolbar\Platform\6.3.2291.0\npwinext.dll,-100 - {8dcb7100-df86-4384-8842-8fa844297b3f} - C:\Program Files\MSN Toolbar\Platform\6.3.2291.0\npwinext.dll
    O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\Alwil Software\Avast5\aswWebRepIE.dll
    O4 - HKLM\..\Run: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
    O4 - HKLM\..\Run: [BCSSync] "C:\Program Files\Microsoft Office\Office14\BCSSync.exe" /DelayServices
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
    O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
    O4 - HKLM\..\Run: [Microsoft Default Manager] "C:\Program Files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" -resume
    O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKLM\..\Run: [avast] "C:\Program Files\Alwil Software\Avast5\avastUI.exe" /nogui
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
    O8 - Extra context menu item: ت&صدير إلى Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office14\EXCEL.EXE/3000
    O9 - Extra button: @C:\Program Files\Windows Live\Companion\companionlang.dll,-600 - {0000036B-C524-4050-81A0-243669A86B9F} - C:\Program Files\Windows Live\Companion\companioncore.dll
    O9 - Extra button: @C:\Program Files\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1004 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O9 - Extra 'Tools' menuitem: @C:\Program Files\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1003 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O10 - Unknown file in Winsock LSP: c:\program files\common files\microsoft shared\windows live\wlidnsp.dll
    O10 - Unknown file in Winsock LSP: c:\program files\common files\microsoft shared\windows live\wlidnsp.dll
    O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
    O18 - Filter hijack: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
    O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: خدمة Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: خدمة Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: KMService - Unknown owner - C:\Windows\system32\srvany.exe
    O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
    --
    End of file - 7325 bytes


    طيب هذا صح ؟؟
     
  5. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    طبقي هالمشاركة واري الجهاز ان شاء الله سليم ولكن الفحص للاطمئنان اكثر

    Malwarebytes' Anti-Malware


     
  6. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    [​IMG]

    هذا للي طلع معي !
     
  7. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    شيلي الصح من قدام الاول والثاني

    وحطي صح على البقية وتطلع لك مفكرة الصقيها في الرد القادم
     
  8. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    :tears::tears::tears:

    عملت لها ازاله تتوقع غلطت ؟؟؟
     
  9. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    روحي من واجهة البرنامج عزل استعيدي الثنتين الاولي

    ثم من السجلات تلاقين مفكرة افتحيها انسخي مابداخلها وارفقيه في ردك القادم
     
  10. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    استاذ البارون لما عملت ازاله رجعت مره ثانيه وعملت فحص
    وهالشي طلع لي مافي اي اصابات
    والمفكره اللي موجوده الحين مافيها اي اصابات
    بس على كذا بنسخ لك اللي لقيته في المفكره الموجوده عندي


    نوع الفحص : فحص كامل (C:\|D:\|E:\|)
    خيارت الفحص الممكنة: الذاكرة | بدء التشغيل | الريجستري | نظام الملفات | أساليب بحثية/غير ذلك | Shuriken/أساليب بحثية | PUP | PUM
    خيارات الفحص المعطلة: P2P
    الكائنات المفحوصة : 262608
    الوقت المنقضي : 55 دقيقة, 26 ثانية
    عمليات الذاكرة المصابة : 1
    C:\Windows\KMService.exe (RiskWare.Tool.CK) -> 1748 -> سيتم الحذف عند الإقلاع
    وحدات الذاكرة المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    مفاتيح الريجستري المصابة : 2
    HKCR\CLSID\{82184935-B894-4AB2-8590-603BA7D74B71} (Trojan.WebMoner) -> تم بنجاح العزل و الحذف
    HKCR\Almogam.nat.eProtocol (Trojan.WebMoner) -> تم بنجاح العزل و الحذف
    قيم الريجستري المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    مواد بيانات الريجستري المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    المجلدات المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    الملفات المصابة : 2
    D:\Fujitsu\Downloads\spar.exe (PUP.Adware.RKN) -> لم ينفذ أي إجراء
    C:\Windows\KMService.exe (RiskWare.Tool.CK) -> سيتم الحذف عند الإقلاع
    (و)







    2012/08/11 04:20:34 +0300 FUJITSU-PC Fujitsu MESSAGE Starting protection
    2012/08/11 04:20:38 +0300 FUJITSU-PC Fujitsu MESSAGE Protection started successfully
    2012/08/11 04:20:41 +0300 FUJITSU-PC Fujitsu MESSAGE Starting IP protection
    2012/08/11 04:20:47 +0300 FUJITSU-PC Fujitsu MESSAGE IP Protection started successfully
    2012/08/11 04:21:20 +0300 FUJITSU-PC Fujitsu MESSAGE Starting database refresh
    2012/08/11 04:21:20 +0300 FUJITSU-PC Fujitsu MESSAGE Stopping IP protection
    2012/08/11 04:26:26 +0300 FUJITSU-PC Fujitsu MESSAGE IP Protection stopped
    2012/08/11 04:26:58 +0300 FUJITSU-PC Fujitsu MESSAGE Database refreshed successfully
    2012/08/11 04:26:59 +0300 FUJITSU-PC Fujitsu MESSAGE Starting IP protection
    2012/08/11 04:27:02 +0300 FUJITSU-PC Fujitsu MESSAGE IP Protection started successfully
    2012/08/11 04:34:33 +0300 FUJITSU-PC Fujitsu MESSAGE Executing scheduled update: Daily
    2012/08/11 04:34:39 +0300 FUJITSU-PC Fujitsu MESSAGE Database already up-to-date
    2012/08/11 05:29:35 +0300 FUJITSU-PC Fujitsu MESSAGE Starting protection
    2012/08/11 05:29:39 +0300 FUJITSU-PC Fujitsu MESSAGE Protection started successfully
    2012/08/11 05:29:42 +0300 FUJITSU-PC Fujitsu MESSAGE Starting IP protection
    2012/08/11 05:29:45 +0300 FUJITSU-PC Fujitsu MESSAGE IP Protection started successfully
    2012/08/11 05:37:23 +0300 FUJITSU-PC Fujitsu MESSAGE Starting protection
    2012/08/11 05:37:27 +0300 FUJITSU-PC Fujitsu MESSAGE Protection started successfully
    2012/08/11 05:37:30 +0300 FUJITSU-PC Fujitsu MESSAGE Starting IP protection
    2012/08/11 05:37:34 +0300 FUJITSU-PC Fujitsu MESSAGE IP Protection started successfully


    وهذي الاخيره بعدعمليه الازاله والفحص الثاني

    Malwarebytes Anti-Malware (تجريبية) 1.62.0.1300
    www.malwarebytes.org
    نسخة قاعدة البيانات : v2012.08.10.09
    Windows 7 Service Pack 1 x86 NTFS
    Internet Explorer 8.0.7601.17514
    Fujitsu :: FUJITSU-PC [مدير]
    الحماية: ممكنة
    23/09/33 05:39:52 ص
    mbam-log-2012-08-11 (05-39-52).txt
    نوع الفحص : فحص كامل (C:\|D:\|E:\|)
    خيارت الفحص الممكنة: الذاكرة | بدء التشغيل | الريجستري | نظام الملفات | أساليب بحثية/غير ذلك | Shuriken/أساليب بحثية | PUP | PUM
    خيارات الفحص المعطلة: P2P
    الكائنات المفحوصة : 113211
    الوقت المنقضي : 50 دقيقة, 20 ثانية [تمت المقاطعة]
    عمليات الذاكرة المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    وحدات الذاكرة المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
    مفاتيح الريجستري المصابة : 0
    (لم يتم إكتشاف مواد ضارة)
     
  11. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    لا الجهاز سليم ولا فيه شيء

    اللي انحذف ملف تابع لكراك الاوفيس

    بس ولو قفل برنامج الاوفيس عندك ارجعي افتحي موضوع اوفر لك الكراك ولا اظن انه بيقفل
     
  12. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    طيب سؤال
    لو ن الجهاز مهكر او مفورس او مخترق " نفس الشي "
    يعني الجهاز ماعاد ينفع يعني انتهى خلاااااص؟
     
  13. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    لا من يقولك اختي كل شيء يتصلح

    الفايروسات وبرامج الهكر والاختراق يتم التخلص منها

    من يقول انتهي ماينفع (( هذا كلام فاضي )) لا تصدقينة
     
  14. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    طيب سؤال ثاني لو ان الاصابه جت عن طريق الايميل وعملت والفحص وعملت ازاله للبرامج الاصابه
    الايميل ما يبقى مهكر يعني الهكر يكون عارف كيف يدخل مره ثانيه ؟
     
  15. البارون

    البارون عضو مجلس إدارة الموقع عضو مجلس الإدارة

    754
    0
    16
    ‏2011-11-06
    معلم
    الافضل عند تهكير الايميل تغيير الباسوورد ضروري

    وبدون استخدام برامج معينة الهكر مايقدر يدخل جهازك

    يعني الهكر يحط صور مقطع فيديوا ملف صوتي ملف وورد كثير طرق الدمج (( الدمج هو دمج السيرفر في ملف بحيث يظهر الملفان كملف واحد )) مدمج معها سيرفر (( خادم برنامج )) ويشفره (( يخفيه )) عن المستخدم او برنامج الحماية

    والمستخدم لما يفتح الصورة فهو بذلك يقوم بتشغيل السيرفر الذي يفتح زي الباب في الجهاز يدخل الهكر منه

    لو كان لديكي برنامج حماية طيب محدث لا اعتقد ان الهكر يستطيع دخول جهازك
     
  16. ذات التسبد الحايم !

    ذات التسبد الحايم ! تربوي جديد عضو ملتقى المعلمين

    90
    0
    0
    ‏2012-08-07
    //
    الحمدلله طمنتني
    الله يعطيك العافيه شكرا جزيلا لك
     
  17. يا صبر أيوب

    يا صبر أيوب تربوي جديد عضو ملتقى المعلمين

    210
    0
    0
    ‏2012-03-14
    معلم
    بارك الله فيكم جميعاً