/ / Virus in contact: what to do?

Virus in contact: what to do?

Every day more and more users complain that they have a virus in contact. Where did he come from and how to drive him away?

Once, after logging into your social network on your account,you find a bright colorful window that blocks the familiar interface. Such windows can differ both in design and in textual information, but the essence is one - you are trying to blame for spamming. In order to unlock the profile, you are sent to such and such an address (in the sense, it is strongly recommended to go to the above link). In fact, this is nothing more than a virus in contact. If you go where you were sent, you will see another window where you are invited to send sms from your mobile, and do it completely for free. Do not send any messages anywhere, otherwise you will lose the good part of your balance on the phone, and rubles (as practice shows, in the amount of 200 to 600-800 rubles) will safely settle in the virtual pocket of the swindler.

But to sit with folded arms is not worth it, because onceon your page there is such a window, so you have already picked up a certain virus, most likely, the "Trojan", which today simply blocked you access to the contact, and tomorrow it paralyzes the entire operation of the computer.

If you have a virus in contact, urgently carry your computer device into the service to be diagnosed and cured.

You can also try for yourselfto cope with the problem, if you can not wait to look at your account on the social network. So, if the virus has blocked the profile in the contact, you should pay attention to the file called "hosts". Typically, a virus in a contact changes its contents. Seeking is easy to find. We go to drive C, look for a folder called "WINDOWS", it contains the folder "system32", then the folder "drivers". In the last folder, look for the name "etc". This is where the desired "hosts" are located, which is a file without an extension. Note that the file may be hidden, then it will not be displayed in the Explorer. In this case, you must enable the function of displaying these hidden files in the system settings.

Now check the attributes of the hosts file by clicking onProperties. If it says that the file is read-only, then this attribute must be removed. Now open the "hosts" with the help of some text editor and start the uninhibited hand, delete everything that comes to it, except for the entry "127.0.0.1 localhost".

However, there may be a situation where a virus incontact blocks access to this file. Then it makes sense to do all of the above, but booted from the Live-CD. Instead of editing the "hosts" file, you can simply delete it.

The changes you made to the system must take effect without restarting the computer, so immediately try again to go to the social network.

The virus can act differently. If "hosts" is empty, then check in the browser settings if the proxy is not registered. After opening the Explorer, open the "Tools" menu, then "Internet Options", then "Connections" and, finally, "Network Setup". If in the field called "Address" something is written-mercilessly delete.

If none of the above is helpful,so, on your virtual path, a rarer and, of course, a more "thoughtful" virus met. In this case, the question of how to remove a virus in a contact, experts will help you find the answer.

If at you all turned out and to you it was possiblego to your profile in contact, do not rush to rejoice. The virus can still be alive and well on your computer system. To permanently and irrevocably remove it, we strongly recommend that you use such treatment utilities as Kaspersky Removal Tool or CureIT, which must be downloaded only from official sites, in this case from Kaspersky Lab and, accordingly, from Doctor Web.

Always remember that preventing a probleman easier process than its solution. Remember about the prevention of viruses - install a good antivirus on your computer, disable the autorun function from the USB flash drive, do not wander through unknown links sent to you by familiar and unfamiliar people, and in no case do you enter your data on third-party resources, even if you are very -very ask.

</ p>>
Read more: