線上訂房服務-台灣趴趴狗聯合訂房中心
發文 回覆 瀏覽次數:1098
推到 Plurk!
推到 Facebook!

上網問題

 
cmf
尊榮會員


發表:84
回覆:918
積分:1032
註冊:2002-06-26

發送簡訊給我
#1 引用回覆 回覆 發表時間:2002-12-31 13:32:19 IP:61.218.xxx.xxx 未訂閱
當我再上這個網站時,常會出現如下圖畫面,我又必須重新開啟網頁 不知有何方法解決?
------
︿︿
領航天使
站長


發表:12216
回覆:4186
積分:4084
註冊:2001-07-25

發送簡訊給我
#2 引用回覆 回覆 發表時間:2003-01-01 22:17:57 IP:192.168.xxx.xxx 未訂閱
引言:
引言: 當我再上這個網站時,常會出現如下圖畫面,我又必須重新開啟網頁 不知有何方法解決?
有人能告訴我嗎?
實在是沒見過此種錯誤訊息, 是在流覽本站的那一個網頁時發生的咧? ~~~Delphi K.Top討論區站長~~~
------
~~~Delphi K.Top討論區站長~~~
RaynorPao
版主


發表:139
回覆:3622
積分:7025
註冊:2002-08-12

發送簡訊給我
#3 引用回覆 回覆 發表時間:2003-01-01 23:12:22 IP:61.221.xxx.xxx 未訂閱
引言: 當我再上這個網站時,常會出現如下圖畫面,我又必須重新開啟網頁 不知有何方法解決?
cmf 你好: 我在瀏覽一些網站的時候~~也會發生這種情形 不過~~並不是常常發生(偶爾吧) 後來~~我在 >
------
-- 若您已經得到滿意的答覆,請適時結案!! --
-- 欲知前世因,今生受者是;欲知來世果,今生做者是 --
-- 一切有為法,如夢幻泡影,如露亦如電,應作如是觀 --
RaynorPao
版主


發表:139
回覆:3622
積分:7025
註冊:2002-08-12

發送簡訊給我
#4 引用回覆 回覆 發表時間:2003-01-02 11:16:47 IP:203.73.xxx.xxx 未訂閱
引言: 經過我使用 RaynorPao 兄 所提供的方法後 結果是更嚴重,整個電腦當機
真的喔?? sorry~~好愧疚...嗚... 看來連 > --
------
-- 若您已經得到滿意的答覆,請適時結案!! --
-- 欲知前世因,今生受者是;欲知來世果,今生做者是 --
-- 一切有為法,如夢幻泡影,如露亦如電,應作如是觀 --
lcsboy
版主


發表:87
回覆:622
積分:394
註冊:2002-06-18

發送簡訊給我
#5 引用回覆 回覆 發表時間:2003-01-02 11:44:17 IP:211.23.xxx.xxx 未訂閱
看到你的report後, 就知道, 你用WinXP對吧? 我也是~ 但是從來沒發生過這樣的問題~ 可見你的系統或 >, 然後重裝 ><"
RaynorPao
版主


發表:139
回覆:3622
積分:7025
註冊:2002-08-12

發送簡訊給我
#6 引用回覆 回覆 發表時間:2003-01-02 12:43:59 IP:203.73.xxx.xxx 未訂閱
引言: RaynorPao : 雖然 問題尚未解決 但還是 謝謝 RaynorPao 兄 提供資料 在此 謝謝
cmf 你好: 也感謝你的寬容諒解 --
------
-- 若您已經得到滿意的答覆,請適時結案!! --
-- 欲知前世因,今生受者是;欲知來世果,今生做者是 --
-- 一切有為法,如夢幻泡影,如露亦如電,應作如是觀 --
cmf
尊榮會員


發表:84
回覆:918
積分:1032
註冊:2002-06-26

發送簡訊給我
#7 引用回覆 回覆 發表時間:2003-01-02 18:39:55 IP:61.70.xxx.xxx 未訂閱
我終於找到答案了    BKDR_OPTIXPRO.10 說明: This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.
------
︿︿
領航天使
站長


發表:12216
回覆:4186
積分:4084
註冊:2001-07-25

發送簡訊給我
#8 引用回覆 回覆 發表時間:2003-01-02 19:10:23 IP:210.202.xxx.xxx 未訂閱
引言: 我終於找到答案了 BKDR_OPTIXPRO.10 說明: This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.
可否告知您如何解決! ~~~Delphi K.Top討論區站長~~~
------
~~~Delphi K.Top討論區站長~~~
cmf
尊榮會員


發表:84
回覆:918
積分:1032
註冊:2002-06-26

發送簡訊給我
#9 引用回覆 回覆 發表時間:2003-01-02 19:22:07 IP:61.70.xxx.xxx 未訂閱
引言:
引言: 我終於找到答案了 BKDR_OPTIXPRO.10 說明: This backdoor malware, written in Borland Delphi, categorized as a Remote Access Tool (RAT), uses a server program to infect a target system and then uses a client program to access and control the infected system. This tool requires that its server component is running on the infected machine before the client component can access the infected system. Upon execution, the server program opens a port 3410 TCP, where it also waits for commands to execute form the client component.
可否告知您如何解決! ~~~Delphi K.Top討論區站長~~~
解決方案: Click Start->Run, type REGEDIT then hit the ENTER key. In the left panel, double click the following: HKEY_LOCAL_MACHINE->Software->Microsoft->Windows ->CurrentVersion->Run In the right panel, look for and then delete this registry value. %windir% is the Windows directory usually located at C:\Windows: "vscanner" "%windir%\spooll32.exe" In the left panel, double click the following: HKEY_CLASSES_ROOT->exefile->shell->open->command In the right panel, right click the value titled as "(Default)" then select modify. Modify the registry data such that "wmmiexe.exe" is removed. If the data was "wmmiexe.exe "%1" %*", after modifying, it should look like ""%1" %*". In the left panel, double click the following: HKEY_LOCAL_MACHINE>Software>CLASSES>exefile>shell>open>command Modify the registry data such that "wmmiexe.exe" is removed. If the data was "wmmiexe.exe "%1" %*", after modifying, it should look like ""%1" %*". Close the Registry. Restart your system. Click Start->Run, type EXPLORER.EXE, then hit the ENTER key. You should be in the Windows Explorer. Go to your Windows folder. Look for and then delete this files: SPOOLL32.EXE Scan your system with Trend antivirus and delete all files detected as BKDR_OPTIXPRO.10. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner.
------
︿︿
系統時間:2024-03-29 22:25:39
聯絡我們 | Delphi K.Top討論版
本站聲明
1. 本論壇為無營利行為之開放平台,所有文章都是由網友自行張貼,如牽涉到法律糾紛一切與本站無關。
2. 假如網友發表之內容涉及侵權,而損及您的利益,請立即通知版主刪除。
3. 請勿批評中華民國元首及政府或批評各政黨,是藍是綠本站無權干涉,但這裡不是政治性論壇!