Search:

Type: Posts; User: Juliet; Keyword(s):

Search: Search took 0.02 seconds.

  1. Glad we could help....

    Glad we could help. http://i.imgur.com/SakDYGv.gif
    Since this issue appears resolved ... this Topic is closed.
  2. In the future I strongly suggest you stay away...

    In the future I strongly suggest you stay away from using cracks and/or Keygens. Malware and virus authors love to spread their infections via cracks.
    Many of the keygens uploaded to p2p sites are...
  3. From the logs there were no signs of breech or...

    From the logs there were no signs of breech or specific infection on the computer which makes me tend to believe entry was gained through the web sites.
    Very often we see post of people complaining...
  4. Thank you for the logs, if you allowed previous...

    Thank you for the logs, if you allowed previous tools used to quarantine what it had found also you should be in better shape now.

    Whats happening to the computer at the moment.
  5. yes did you follow post 11? Did you allow the...

    yes
    did you follow post 11?

    Did you allow the tools to remove/quarantine what it found?

    Let's check for remnants
    If you're already running Malwarebytes 3 then open Malwarebytes and check for...
  6. Did you allow the tools to remove/quarantine what...

    Did you allow the tools to remove/quarantine what it found?

    Let's check for remnants
    If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan...
  7. **** Start Farbar Recovery Scan Tool with...

    ****
    Start Farbar Recovery Scan Tool with Administrator privileges
    (Right click on the FRST icon and select Run as administrator)

    highlight on the text below and select Copy.
    beginning...
  8. After posting the FRST log While I have it...

    After posting the FRST log

    While I have it fresh on my mind, let's reset your router.

    Turn the computer off, then cut or turn off the power to your router.
    Let this set 5 minutes or so.
    ...
  9. You can open the file, then copy and paste it in...

    You can open the file, then copy and paste it in your next reply.
  10. While it could be the security breach happened on...

    While it could be the security breach happened on the computer there are instances of info obtained through using debit cards out in the public as well.

    * Call all of your banks, credit card...
Results 1 to 10 of 10