answersLogoWhite

0


Best Answer

Open internet Explorer and click on Tools, Internet Options, Delete Files, select "Delete all offline content", then click "OK". This will delete all of the temporary internet files, which will be replaced (minus the virus) as you cruize the internet.

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How can you remove the Trojan horse PSW Briss in c documents and settings Local settings temporary internet files?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How do you remove Trojan Downloader Istbar 3 BN from a Windows 98 system when the infected file is C WINDOWS Local Settings Temporary Internet Files CONTENT IE5 TZG7WZSV file8 zip crack exe?

Start the computer in SAFE MODE, Open Control Panel, Internet Options, and on the General page, under Temporary Internet Files, choose "Delete Files".


How do you remove Trojan downloader from your Temp Internet Files folder?

Just delete temporary internet files by clicking Delete file Button in the Internet Options (Tools>Internet Options) If you find this info useful, please vote


What will remove Trojan horse generic 18 BDSZ?

Use rkill.exe, then run any anti-virus tool - also check your internet proxy advanced settings.


How do you get rid of Downloader 1stbar CW?

the Trojan came in a crack program one of my friends gave me on a CD of apps he gave me all I had to do was delet the program that contained the Trojan. If you are running AVG just veiw the detail log after the scan. i have used avg to scan and found this. if it is embedded into your temp files delete your temporary internet files in internet explorer by going to Tools-Internet Options-Delete Files (Delete all offline content)


What can you do if you have a quarantined Trojan but you cannot send email or reply to emails because page comes up 'Page Not Found'?

i think repair, if it shows it as an option, and delete your cookies and history would help It looks like the Trojan took out your internet connection. You can use dial-a-fix to fix the settings.


How do you remove Trojan horse BackDoor Agent?

all viruses get locked into a box do to your firewall and antivirus settings... you can check the settings on there to get rid of it


How do you delete JS Trojan Downloader IstBar A?

Install Norton Antivirus (downloading trial version in case you don't have it) and it will detect the virus and remove it. It may be necessary to delete the file containing this trojan. Removal for Windows XP Hi the JS Trojan Downloader IstBar is considered adware and not a real Trojan in the full sense of the word. Anyway no matter what it is it is a pest, so how to get rid of it? In most cases you are infected by viewing websites that exploit Internet explorer active x controls and the infected file is downloaded into your tempory Internet files. Antivirus Software such as Bitdefender keep warning you about this pest but do nothing except stop it from installing it�s self. If this is the case then start your computer in safe mode (I�ll explain later how to) navigate to your tempory Internet files e.g.: C:\Documents and Settings\YOUR NAME\Local Settings\Temporary Internet Files and delete them all. Restart computer as normal. If the pest has installed it�s self or you just want to make sure you are clean Symantec have a tool to do just that. The tool can be found here http://securityresponse.symantec.com/avcenter/venc/data/adware.istbar.html with information about what the pest does and manual removal. Starting your computer in safe mode is as easy as this. Turn off your computer and restart�. Keep pressing the F8 until you are presented with a menu, using the arrow keys highlight safe mode and press the enter key. Your computer will now boot in safe mode with very few services and processes running making removal much easy.


Remove virus using DOS?

Reboot your PC into a PURE dos environment using the recovery console (F8 while the PC is booting) log onto c:\ the next command lines below can be copied and pasted into a spiffy batch file which will pretty much nuke several different viruses out there In the first command line, replace the word "owner" with the username who'se temp files need to be deleted (and gotta do that with every user on the PC attrib -r -s -h c:\windows\documents and settings\owner\local settings\tmp\*.* CD .. (do that till you get back behind the first owner's directory CD (next owner's directory) again point to the temp files Once that is done for all owners, again browse to the temp directory for each owner, and then del *.* (for each of them, that will delete everything in the temp files, including the virus, which usually stores those unremovable files that are always "in use by another user or program") that'll get you back to a point that most antivirus programs can delete the remnants and fix registries. For the more advanced and the more patient, do the same cycle of processes and commands to empty the temporary internet files c:\windows\documents and settings\owner\local settings\temporary internet files del *.* YOU will be pleasantly surprised to find that after that maneuver, antivirus is a lot more effective at removing viruses, and especially Trojan horses.f


How Trojan horse virus occurs?

A Trojan horse virus occurs in infected documents, programs and executable files. They appear as something you would be familiar with so as to trick you into opening the file.


What is a mIRC virus Trojan?

mIRC is an Internet Relay Chat (IRC) client for Microsoft Windows.So the Trojan which affects this piece of software and steals passwords


How Trojan hourse virus was spread?

A Trojan Horse virus spreads through anyway possible, but the main way to get a Trojan horse is by downloading un-legitimate programs from the internet. What does a Black Trojan horse do: enters and exit's your computer undetected bringing in viruses from a unknown source.


Does Internet Explorer give you Trojans?

All Browsers can get a Trojan on your Computer, But IE is not very safe, Chrome or Firefox are much faster and safer against a Virus or Trojan.