SUMMARY
This step-by-step article describes how to install Windows XP.
For more information about how to install Windows XP Professional, click the following article number to view the article in the Microsoft Knowledge Base:
286463 (http://support.microsoft.com/kb/286463/) Release notes for Windows XP Setup contained in the Pro.txt file
For more information about how to install Windows XP Home Edition, click the following article number to view the article in the Microsoft Knowledge Base:
306824 (http://support.microsoft.com/kb/306824/) Release notes for Windows XP Setup contained in the Home.txt file
Back to the top
Methods to install Windows XP
To install Windows XP, use one of the following methods.
Back to the top
Method 1: Upgrade to Windows XP
This section describes how to upgrade to Windows XP from Microsoft Windows 98, Microsoft Windows Millennium Edition, and Microsoft Windows 2000 Professional.
Note Before you start the upgrade process, obtain and install the latest BIOS upgrade for your computer from the computer's manufacturer. If you update the BIOS after you upgrade the computer, you may have to reinstall Windows XP to take advantage of features such as Advanced Configuration and Power Interface (ACPI) support in the BIOS. If you can do this, update the firmware in all the hardware devices before you start the upgrade.
Also, you may want to disconnect from the Internet during the installation. Disconnecting from the Internet during the installation helps protect you from malicious users. You may also want to enable the Microsoft Internet Explorer firewall. For more information, see the "Enable or disable Internet Connection Firewall" topic in Windows XP Help. For more information about how to prepare Windows 98 or Windows Millennium Edition for an upgrade to Windows XP, click the following article number to view the article in the Microsoft Knowledge Base:
316639 (http://support.microsoft.com/kb/316639/) How to prepare to upgrade Windows 98 or Windows Millennium Edition to Windows XP
To upgrade to Windows XP, follow these steps:1. Start your computer, and then insert the Windows XP CD into the CD or DVD drive.
2. If Windows automatically detects the CD, click Install Windows to start the Windows XP Setup Wizard.
If Windows does not automatically detect the CD, click Start, click Run, type the following command, and then click OK:
CD drive letter:\setup.exe
3. When you are prompted to select an installation type, select Upgrade (the default setting), and then click Next.
4. Follow the instructions on the screen to complete the upgrade.
Back to the top
Method 2: Install Windows XP to a new hard disk
First, start your computer by using one of the following media: • Microsoft Windows 98/Windows Millennium startup disk
• Windows XP boot disks
• Windows XP CD
For more information about how to obtain the Windows XP Setup boot disks, click the following article number to view the article in the Microsoft Knowledge Base:
310994 (http://support.microsoft.com/kb/310994/) How to obtain Windows XP Setup boot disks
Note If you want to start your computer from the Windows XP CD, your CD or DVD drive must be configured to do this. For information about how to configure your computer to start from the CD or DVD drive, see the documentation that is included with your computer or contact the computer manufacturer.
To install Windows XP to a new hard disk, follow these steps:1. Read the Microsoft Software License Terms, and then press F8.
Note If your Windows XP CD is an upgrade, you are prompted to insert a CD of a previous operating system to verify upgrade compliance. Remove the Windows XP CD, and then insert the CD from your previous operating system into the CD drive. You can use the CD to upgrade from the following versions of Windows:
Windows 98
Windows 98 Second Edition
Windows Millennium Edition
Windows NT 4.0
Windows 2000 Professional
2. When you are prompted for the Windows XP CD, remove your previous operating system CD, and then insert your Windows XP CD.
3. To install Windows XP by starting the computer from the Windows XP CD, insert the Windows XP CD into your CD or DVD drive, and then restart the computer.
4. When you see the "Press any key to boot from CD" message, press any key to start the computer from the Windows XP CD.
5. At the Welcome to Setup screen, press ENTER to start Windows XP Setup.
6. Follow the instructions on the screen to select and format a partition where you want to install Windows XP.
7. Follow the instructions on the screen to complete Windows XP Setup.
Back to the top
Method 3: Install Windows XP to a new folder
First, start your computer by using one of the following media: • Microsoft Windows 98/Windows Millennium Edition startup disk
• Windows XP boot disks
• Windows XP CD
For more information about how to start Setup from MS-DOS or a Windows 98/Windows Millennium Edition startup disk, click the following article number to view the article in the Microsoft Knowledge Base:
307848 (http://support.microsoft.com/kb/307848/) How to start the Setup program from MS-DOS in Windows XP
For more information about how to obtain the Windows XP Setup boot disks, click the following article number to view the article in the Microsoft Knowledge Base:
310994 (http://support.microsoft.com/kb/310994/) How to obtain Windows XP Setup boot disks
Note If you want to start your computer from the Windows XP CD, your CD or DVD drive must be configured to do this. For information about how to configure your computer to start from the CD or DVD drive, see the documentation that is included with your computer or contact the computer manufacturer.
To install Windows XP to a new folder (also known as a parallel installation), follow these steps:1. Start your computer from the Windows XP CD. To do this, insert the Windows XP CD into your CD or DVD drive, and then restart your computer.
2. When the "Press any key to boot from CD" message appears on the screen, press any key to start the computer from the Windows XP CD.
3. At the Welcome to Setup screen, press ENTER to begin Windows XP Setup.
4. Read the Microsoft Software License Terms, and then press F8.
5. Select the partition in which you want to install Windows XP, and then press ENTER.
6. Select the Leave the current file system intact (no changes) option, and then press ENTER to continue.
7. Press ESC to install to a different folder.
If the Setup program detects another operating system folder, it prompts you to type the name for the new folder after the backslash (\), for example, \WINXP. If there are no other operating systems detected, the Setup program automatically names the folder \Windows.
8. Press ENTER to continue.
9. Follow the instructions on the screen to complete Windows XP Setup.
For more information about how to change the folder name on new installations, click the following article number to view the article in the Microsoft Knowledge Base:
315242 (http://support.microsoft.com/kb/315242/) How to designate the original folder name for a reinstallation of Windows XP
Back to the top
Method 4: Perform a clean install of Windows XP
A clean installation refers to removing all data from your hard disk by repartitioning and reformatting your hard disk and reinstalling the operating system and programs to an empty (clean) hard disk. You should back up all important information before you perform a clean installation of Windows XP.
For more information about important things to consider before you partition and format you hard disk and how to partition and format your hard disk by using the Windows XP Setup program, click the following article number to view the article in the Microsoft Knowledge Base:
313348 (http://support.microsoft.com/kb/313348/) How to partition and format a hard disk in Windows XP
After you have backed up all important information, follow these steps to install Windows XP:1. Start your computer from the Windows XP CD. To do this, insert the Windows XP CD into your CD drive or DVD drive, and then restart your computer.
2. When you see the "Press any key to boot from CD" message, press any key to start the computer from the Windows XP CD.
3. At the Welcome to Setup screen, press ENTER to start Windows XP Setup.
4. Read the Microsoft Software License Terms, and then press F8.
5. Follow the instructions on the screen to select and format a partition where you want to install Windows XP.
6. Follow the instructions on the screen to complete Windows XP Setup.
Back to the top
Method 5: Perform a multiple boot operation
For more information about how to multiple boot Windows XP and other versions of Windows and MS-DOS, click the following article number to view the article in the Microsoft Knowledge Base:
217210 (http://support.microsoft.com/kb/217210/) How to multiple boot Windows XP, Windows 2000, Windows NT, Windows 95, Windows 98, Windows Me, and MS-DOS
Back to the top
TROUBLESHOOTING
For more information about how to troubleshoot installation problems, click the following article numbers to view the articles in the Microsoft Knowledge Base:
310637 (http://support.microsoft.com/kb/310637/) You receive an error message after you enter the product key when you try to install Windows XP
310064 (http://support.microsoft.com/kb/310064/) How to troubleshoot problems during installation when you upgrade from Windows 98 or Windows Millennium Edition to Windows XP
If you still have problems with installation, you might want to ask someone for help or contact support. For information about how to contact support, visit the following Microsoft Web site:
http://support.microsoft.com/contactus/ (http://support.microsoft.com/contactus/)
Back to the top
MORE INFORMATION
For more information, click the following article numbers to view the articles in the Microsoft Knowledge Base:
307726 (http://support.microsoft.com/kb/307726/) Description of the Windows XP Upgrade Advisor
314062 (http://support.microsoft.com/kb/314062/) The latest Windows XP Hardware Compatibility List
295322 (http://support.microsoft.com/kb/295322/) How to determine if hardware or software is compatible with Windows XP
For more information, visit the following Microsoft Web site:
http://support.microsoft.com/ph/1173 (http://support.microsoft.com/ph/1173)
If these Microsoft Knowledge Base articles do not help you resolve the problem, or if you experience symptoms that differ from those that this article describes, please search the Microsoft Knowledge Base for more information. To search the Microsoft Knowledge Base, visit the following Microsoft Web site:
http://support.microsoft.com (http://support.microsoft.com/)
September 1, 2008
Removing Ahsan's Virus
Hello guys,
follow these steps to remove Ahsan's virus from your system.
1. start windows in safe mode in with command prompt.
2. use Free download RRT Tool to enable run " if disabled". "Search in google"
3. Enable regediting if disabled with following reg key.
Code: Select all
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
4. Open regedit, search and delete all entries with name "Ahsan" , site 110mb.com and Bush.
5. If your folder option is disabled enable it with following reg key "
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
Check if a DWORD value named NoFolderOptions exists in the pane on the right hand side of the screen
Delete it
6. If you are still unable to view the hidden files, which is disabled by virus, enable it with following proc and key.
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Find the value "Hidden" . Rightclick it and modify it to 1. If Key value hidden is not present create it
7. Check the following registery values and set the values given below in each registery key.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN]
"CheckedValue"=dword:02
"ValueName"="Hidden"
"DefaultValue"=dword: 02
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]
"CheckedValue"=dword: 01
"ValueName"="Hidden"
"DefaultValue"=dword:02
8. Now enable "show all hidden files / Hidden system files and folders", and search for following files and delete them all.
Code: Select all
system.exe
csrss.exe
Home video.avi.exe
autorun
Note: these files will be in parrent drives (D:, C:) and in windows folder.
9. Dont worrie, you are done. now restart and Enjoy !
About RRT Tool
You may not believe this but there still are lots of computer users that have no anti-virus program installed because they erroneously think that they will be spared from infection. Some don’t even know what a computervirus is!
Well they are clearly wrong and the result is that I needed to clean, repair or dismantle lots of computers to get rid of all the malware that had infected their systems.
When someone asks for my assistance, the first thing I always do is an offline anti-virus scan and clean.
But when I boot the computer, I am often faced with the same problem; the virus has made some changes to the system restrictions in order to hide itself from easy detection. These restrictions are most often:
1 - Disable Folder Options >> so the user can't set the option to show hidden files!
2 - Disable Registry Tools >> so the user can't see what is going on during system startup!
3 - Disable Ctrl+Alt+Del >> so the user can't see the virus and the other applications running!
4 - Disable Show hidden files & folders >> so the user can't see the malware bodies which always come with hidden attribute set to true!
5 - Disable Run Command >> so the user can't use it to run some tools to track the virus activites of remove it.
6 - Disable Windows Firewall (SharedAccess) >> so the virus can send & receive any data through the network without the attention of the user!
7 - Disable Windows Firewall (Wscsvc) >> so the virus can send & receive any data through the network without the attention of the user!
8 - Disable Windows Firewall (Wuauserv) >> so the virus can send & receive any data through the network without the attention of the user!
9 – Restrict Internet Explorer Home Page Changing >> so the user can't change the malicious web page set by the malware!
10 – Restrict Internet Explorer Closing >> so the user can't close the pops up windows that appear when visiting the malicious web page or any other website!
11 – Hide Internet Options >> so the user can't change any setting set by the malware!
12 – Hide Internet Explorer Address Bar >> so the user can't see what web page being visited and what scripts being executed!
13 - Restrict Internet Explorer Right Click >> so the user can't view the source of the page being visited and other useful things.
14 – Hide Internet Explorer Navigation Buttons >> so the user will be forced to user the keyboard shortcuts to navigate through the web sites!
15 - Hide Internet Explorer Context Menu >> so the user can't access this menu which make him able to select some useful settings.
16 - Hide Internet Explorer Toolbar >> so the user can't use it to remove some unwanted toolbars made by the malware.
17 - Disable Command Prompt (cmd.exe) >> so the user cannot run any console programs like command prompt removal tools...
18 - Disable Control Panel >> so the user cannot use the control panel applets.
19 - Hide system files/folders >> so the user can't see the malware bodies which usually come with system attribute set to true!
20 - Change Show Hidden files option button >> So even if you select "Show hidden files and folders from folder options these files & folder will not be shown!
21 - Disable Show System files check box >> So even if you unchecked "Hide protected operating system files" these files & folder will not be shown!
22 - Disable Show all files/folders check >> So changing this from folder options will be ignored!
23 - Hide Desktop items to prevent the user from accessing My Computer and other desktop shortcuts!
24 – Hide files extensions: This is commonly used by malware to trick the user. By hiding file extension, a user doesn't know whether a file with folder icon is an exe file or just an ordinary folder.
25 – Disable File Extentions Check >> So changing this from folder options will be ignored!
26 – Restrict Windows Update >> So the user cannot download security patches from Microsoft.
27 – Disable Shut Down Command >> So the user cannot shut down the system normally.
28 – Restrict Settings Folders >> Just imagine when you all items under Start menu>Settings wont run!
29 – Disable Taskbar context menu >> You right click your taskbar.. Oops; nothing happens!
30 – Disable Logoff Command >> So the user cannot logoff and use another profile.
31 – Hide Start Menu Logoff >> So the user cannot use this shortcut to logoff!
32 – Restrict Add/Remove Programs >> So the user cannot see what applications and windows components are installed or uninstall/reinstall any application.
33 – File Extention Default >> So the user cannot select "Hide extensions for known file types".
34 – No Windows Update >> So the user cannot download security updates and other fixes for windows.
35 – R-Media Malware >> This item is indicating that a malicious object is trying to invade your computer through removable media, please see the details below.
36 – Hidden Drives >> So the user cannot see any of the storage drives but they still can use RUN to access and explore them.
37 – Restricted Drives >> So the user can see the drives but cannot access them even when using RUN command.
38 – No Search >> So the user cannot search the file system using the start menu item for any file.
Unfortunately, AV Software doesn’t really care about these restrictions and do nothing to re-enable them!
Until AV software comes up with such a tool in their future versions, we have created a very small tool for you that does just that! It re-enables all what the virus had previously disabled, and gives you back the control over your own computer. We called it Remove Restrictions Tool (RRT).
The new great feature:
RRT now is implemented with a totally new and great feature, we call it:
Removable Media Malware Defender.
Since we noticed that most of the malware nowadays spread via removable media (Flash disks in specific), we implemented RRT with the ability of monitoring, blocking and removing any type of malware that uses flash disks to spread.
RRT with AutoRemove enabled will monitor your system and detects any flash disk as soon as it gets plugged into the USB port. The generic technique will work in less than few milliseconds , if it detects any infection in the flash disk, it will block it and remove the infection before it makes any harm to your computer.
The great news is that RRT -unlick the traditional AVs- doesn't need to be updated with malware signatures in order for it to do it's job, instead, it uses a generic and smart technique that detects any type of malware that attempt to infect your system via flash disk inserted into the USB ports.
Important notes:
1 - Since this tool is a security software that deals with the file system, the system registry and the running processes, it MUST be given all the rights it demands in order for it to do it's job. Some other security softwares will try to block the tool and prevent it from doing its job, please make sure that it's not blocked by your filewall and there's no other program blocking it.
Before running this tool, we recommend you to disable any other security solution you are runing such as Antivirus, Firewall, monitoring tools ..etc.
2 - Though RRT is able to remove the restrictions caused by malware even if the malware is already active, your computer must be CLEAN before using RRT. RRT is not programmed to heal your computer from any type of malware that is already infected your computer. RRT is just a tool to remove the malware leftovers and is a DEFENDER against the future malware that may infect your computer through removable media in the future!
3. RRT will NOT protect you from any malware type that may infect your computer through CD/DVD drives, emails, or the internet. It's only programmed to protect you from the Flash disks malware. By using RRT with AutoRemove enabled, you will be sure 100% of that your computer will not get infected through flash disks!
How to buy RRT
The limited version of this tool is for FREE for personal use only. This limited version does not have the AutoRemove feature and has no Removable Media Malware Defender. If you would like to use the application in a business environment or you want to enjoy those two great features you are required to license the application. Licensing is quick, and the pricing is flexible.
Buy from Plimus (Recommended)
This is the recommended authorized reseller of our products, they accept almost any type of payments methods, CC, PayPal, Wire transfer, pay by fax ...etc, they have an excellent customer support 24/7 an live assistance, you can buy in a secured place and enjoy the discounts and the special promotions, and the most great thing is that you don't have to wait to get your product activated as the activation process is fully automated. To buy RRT from Plimus click hereBuy from Avangate
If you do not have a Credit Card or you want to pay by PayPal or you want enjoy the discount options for bulk orders, you may buy RRT from Avangate hereBuy from CNET
If you have your Credit Card ready and you need to buy only one unit, please you may buy RRT from CNET by clicking here
follow these steps to remove Ahsan's virus from your system.
1. start windows in safe mode in with command prompt.
2. use Free download RRT Tool to enable run " if disabled". "Search in google"
3. Enable regediting if disabled with following reg key.
Code: Select all
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
4. Open regedit, search and delete all entries with name "Ahsan" , site 110mb.com and Bush.
5. If your folder option is disabled enable it with following reg key "
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
Check if a DWORD value named NoFolderOptions exists in the pane on the right hand side of the screen
Delete it
6. If you are still unable to view the hidden files, which is disabled by virus, enable it with following proc and key.
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Find the value "Hidden" . Rightclick it and modify it to 1. If Key value hidden is not present create it
7. Check the following registery values and set the values given below in each registery key.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN]
"CheckedValue"=dword:02
"ValueName"="Hidden"
"DefaultValue"=dword: 02
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]
"CheckedValue"=dword: 01
"ValueName"="Hidden"
"DefaultValue"=dword:02
8. Now enable "show all hidden files / Hidden system files and folders", and search for following files and delete them all.
Code: Select all
system.exe
csrss.exe
Home video.avi.exe
autorun
Note: these files will be in parrent drives (D:, C:) and in windows folder.
9. Dont worrie, you are done. now restart and Enjoy !
About RRT Tool
You may not believe this but there still are lots of computer users that have no anti-virus program installed because they erroneously think that they will be spared from infection. Some don’t even know what a computervirus is!
Well they are clearly wrong and the result is that I needed to clean, repair or dismantle lots of computers to get rid of all the malware that had infected their systems.
When someone asks for my assistance, the first thing I always do is an offline anti-virus scan and clean.
But when I boot the computer, I am often faced with the same problem; the virus has made some changes to the system restrictions in order to hide itself from easy detection. These restrictions are most often:
1 - Disable Folder Options >> so the user can't set the option to show hidden files!
2 - Disable Registry Tools >> so the user can't see what is going on during system startup!
3 - Disable Ctrl+Alt+Del >> so the user can't see the virus and the other applications running!
4 - Disable Show hidden files & folders >> so the user can't see the malware bodies which always come with hidden attribute set to true!
5 - Disable Run Command >> so the user can't use it to run some tools to track the virus activites of remove it.
6 - Disable Windows Firewall (SharedAccess) >> so the virus can send & receive any data through the network without the attention of the user!
7 - Disable Windows Firewall (Wscsvc) >> so the virus can send & receive any data through the network without the attention of the user!
8 - Disable Windows Firewall (Wuauserv) >> so the virus can send & receive any data through the network without the attention of the user!
9 – Restrict Internet Explorer Home Page Changing >> so the user can't change the malicious web page set by the malware!
10 – Restrict Internet Explorer Closing >> so the user can't close the pops up windows that appear when visiting the malicious web page or any other website!
11 – Hide Internet Options >> so the user can't change any setting set by the malware!
12 – Hide Internet Explorer Address Bar >> so the user can't see what web page being visited and what scripts being executed!
13 - Restrict Internet Explorer Right Click >> so the user can't view the source of the page being visited and other useful things.
14 – Hide Internet Explorer Navigation Buttons >> so the user will be forced to user the keyboard shortcuts to navigate through the web sites!
15 - Hide Internet Explorer Context Menu >> so the user can't access this menu which make him able to select some useful settings.
16 - Hide Internet Explorer Toolbar >> so the user can't use it to remove some unwanted toolbars made by the malware.
17 - Disable Command Prompt (cmd.exe) >> so the user cannot run any console programs like command prompt removal tools...
18 - Disable Control Panel >> so the user cannot use the control panel applets.
19 - Hide system files/folders >> so the user can't see the malware bodies which usually come with system attribute set to true!
20 - Change Show Hidden files option button >> So even if you select "Show hidden files and folders from folder options these files & folder will not be shown!
21 - Disable Show System files check box >> So even if you unchecked "Hide protected operating system files" these files & folder will not be shown!
22 - Disable Show all files/folders check >> So changing this from folder options will be ignored!
23 - Hide Desktop items to prevent the user from accessing My Computer and other desktop shortcuts!
24 – Hide files extensions: This is commonly used by malware to trick the user. By hiding file extension, a user doesn't know whether a file with folder icon is an exe file or just an ordinary folder.
25 – Disable File Extentions Check >> So changing this from folder options will be ignored!
26 – Restrict Windows Update >> So the user cannot download security patches from Microsoft.
27 – Disable Shut Down Command >> So the user cannot shut down the system normally.
28 – Restrict Settings Folders >> Just imagine when you all items under Start menu>Settings wont run!
29 – Disable Taskbar context menu >> You right click your taskbar.. Oops; nothing happens!
30 – Disable Logoff Command >> So the user cannot logoff and use another profile.
31 – Hide Start Menu Logoff >> So the user cannot use this shortcut to logoff!
32 – Restrict Add/Remove Programs >> So the user cannot see what applications and windows components are installed or uninstall/reinstall any application.
33 – File Extention Default >> So the user cannot select "Hide extensions for known file types".
34 – No Windows Update >> So the user cannot download security updates and other fixes for windows.
35 – R-Media Malware >> This item is indicating that a malicious object is trying to invade your computer through removable media, please see the details below.
36 – Hidden Drives >> So the user cannot see any of the storage drives but they still can use RUN to access and explore them.
37 – Restricted Drives >> So the user can see the drives but cannot access them even when using RUN command.
38 – No Search >> So the user cannot search the file system using the start menu item for any file.
Unfortunately, AV Software doesn’t really care about these restrictions and do nothing to re-enable them!
Until AV software comes up with such a tool in their future versions, we have created a very small tool for you that does just that! It re-enables all what the virus had previously disabled, and gives you back the control over your own computer. We called it Remove Restrictions Tool (RRT).
The new great feature:
RRT now is implemented with a totally new and great feature, we call it:
Removable Media Malware Defender.
Since we noticed that most of the malware nowadays spread via removable media (Flash disks in specific), we implemented RRT with the ability of monitoring, blocking and removing any type of malware that uses flash disks to spread.
RRT with AutoRemove enabled will monitor your system and detects any flash disk as soon as it gets plugged into the USB port. The generic technique will work in less than few milliseconds , if it detects any infection in the flash disk, it will block it and remove the infection before it makes any harm to your computer.
The great news is that RRT -unlick the traditional AVs- doesn't need to be updated with malware signatures in order for it to do it's job, instead, it uses a generic and smart technique that detects any type of malware that attempt to infect your system via flash disk inserted into the USB ports.
Important notes:
1 - Since this tool is a security software that deals with the file system, the system registry and the running processes, it MUST be given all the rights it demands in order for it to do it's job. Some other security softwares will try to block the tool and prevent it from doing its job, please make sure that it's not blocked by your filewall and there's no other program blocking it.
Before running this tool, we recommend you to disable any other security solution you are runing such as Antivirus, Firewall, monitoring tools ..etc.
2 - Though RRT is able to remove the restrictions caused by malware even if the malware is already active, your computer must be CLEAN before using RRT. RRT is not programmed to heal your computer from any type of malware that is already infected your computer. RRT is just a tool to remove the malware leftovers and is a DEFENDER against the future malware that may infect your computer through removable media in the future!
3. RRT will NOT protect you from any malware type that may infect your computer through CD/DVD drives, emails, or the internet. It's only programmed to protect you from the Flash disks malware. By using RRT with AutoRemove enabled, you will be sure 100% of that your computer will not get infected through flash disks!
How to buy RRT
The limited version of this tool is for FREE for personal use only. This limited version does not have the AutoRemove feature and has no Removable Media Malware Defender. If you would like to use the application in a business environment or you want to enjoy those two great features you are required to license the application. Licensing is quick, and the pricing is flexible.
Buy from Plimus (Recommended)
This is the recommended authorized reseller of our products, they accept almost any type of payments methods, CC, PayPal, Wire transfer, pay by fax ...etc, they have an excellent customer support 24/7 an live assistance, you can buy in a secured place and enjoy the discounts and the special promotions, and the most great thing is that you don't have to wait to get your product activated as the activation process is fully automated. To buy RRT from Plimus click hereBuy from Avangate
If you do not have a Credit Card or you want to pay by PayPal or you want enjoy the discount options for bulk orders, you may buy RRT from Avangate hereBuy from CNET
If you have your Credit Card ready and you need to buy only one unit, please you may buy RRT from CNET by clicking here
Subscribe to:
Posts (Atom)