Page 3


12. Now that you have compiled your list of suspect entries in the run key of the registry, close the registry editor and connect your browser to the internet. Our next step is to research exactly what each of these suspect entries is. To identify the processes, take the name of the file at the end of the section of the data key. (for example, in the proceeding illustration, these file names would be atiptaxx.exe, mcsheild.exe, msblast.exe, and gargleafx.exe). Next go to you favorite search engine (We recommend www.google.com if you don't have a preference), and do a search on each file name, one at a time. Something within the first page should tell you what the process is, and whether or not it's necessary on your system. If google comes up blank or vague, try the Greatis Startup Database at http://www.greatis.com/regrun3appdatabase.htm or a similar page at http://www.liutilities.com/products/wintaskspro/processlibrary/.

13. Once you've listed everything in your registry's run key, re-open the registry editor and navigate to back to theRun Key per step 2. One at a time, highlight each of the problem entries and hit the delete key. Confirm by clicking yes. The registry value will disappear. Next, close the registry editor and reboot the system.

14. Immediately after rebooting the system, re-open the registry and navigate back to the run key. Make sure that the Run Key was exactly as you left it before rebooting. If a mysterious value seems to appear/reappear, you have a virus that will need to be identified and removed by other means. If you're able to identify the virus, go to McAfee AVERT Stinger website at http://us.mcafee.com/virusInfo/default.asp?id=stinger or search from our Current Threats page. There are other removal tools found here Symantec virus removal tools website at http://securityresponse.symantec.com/avcenter/tools.list.html. These small tools are known as "stingers". You must download the stinger for the specific virus you have, and run it per instructions. If your system will not connect to the Internet, download them onto another system. Most are small enough to fit on a floppy disk.

15. If the problem seems to be solved, congratulations! Hang onto the list of registry keys you deleted... use the system for awhile, and when you're satisfied you haven't accidentally disabled anything, locate the files in windows explorer and delete them. If the system is still cranky, repeat the above steps for the HKEY_CURRENT_USER\Software\Microsoft\windows\Currentversion\Run key. This key isn't always present... but it's a good idea to check it out anyway. If you're running a Windows 95, 98, or ME system, be sure to repeat the entire process for the RunServices Key located immediately below the run key.

Home   Services   Items Index   Desktops   Dell Laptops   IBM Laptops   Servers   Contact Us   Latest Finds