Results 1 to 6 of 6

Thread: Using F-Secure Blacklight for Malware Removal

  1. #1
    Join Date
    Nov 2009
    Posts
    752

    Using F-Secure Blacklight for Malware Removal

    Hi,
    I need some steps to detect and remove malwares and rootkits. I got regular infection warning in my computer. I think my antivirus application is not so strong enough to cope with them. A friend of mine has adviced me to use F-Secure Blacklight. As per him it is really powerful. But I don't know to use the same. How to use this application for malware removal. Thanks.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: Using F-Secure Blacklight for Malware Removal

    Rootkits are scary and becoming a larger and larger menace to our computers every day. In the past if our computers were infected with a piece of malware, we simply removed it and we were clean of the infection. Now that rootkits are commonly bundled with other malware, this cleaning process has become even harder to do. It is not so difficult to use the application. Just download the same and run it.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: Using F-Secure Blacklight for Malware Removal

    You can use Blacklight to remove rootkits from your computer is easy. It is nice and handy tool. I had scanned many times and got great results. First download the application and installing. Then run the program. You can see a Begin scan button. Click on it and leave it. The application will detect and removes the threats from your computer.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: Using F-Secure Blacklight for Malware Removal

    F-Secure BlackLight detects hidden objects and potentially harmful to your system and lets you remove them. These programs are called rootkit. The application checks your system to a very low level and can not be interrupted by another malware. It is a free application just run it. There is not big deal in using the same. I will also recommend you to clear your registry also by registry scanner.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: Using F-Secure Blacklight for Malware Removal

    To start F-Secure double-click the file blbeta.exe. This is the file which you have downloaded. A window opens, you must accept the license to use the software for it, check I accept the agreement. Click the Next button to proceed to next step. Then Click the Scan button in the bottom right to start the scan. When the scan is complete, you then get the number of rootkit detected in the window below, a rootkit was detected. The button Show all processes (including rootkit) can list the processes on the computer and their PID. You can get additional information for each process by double-clicking it.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: Using F-Secure Blacklight for Malware Removal

    During the scan, F-Secure BlackLight created a log file in the directory where the file blbeta.exe. If you run from the desktop, the log file located on your desktop. The file is named FSBL-<date>. Log. You can then open the log file from Notepad for example by copying its contents to a forum to get help in case of infection. This will help you to determine the series of infections in your pc.

Similar Threads

  1. F-Secure E-Mail Contains Malware
    By FrancoL in forum Networking & Security
    Replies: 7
    Last Post: 26-06-2011, 09:48 PM
  2. windows XP PC malware removal, need help
    By dino88 in forum Networking & Security
    Replies: 7
    Last Post: 06-03-2011, 10:17 AM
  3. Cannot connect to internet after malware removal
    By CRiley in forum Networking & Security
    Replies: 5
    Last Post: 29-03-2010, 11:50 PM
  4. Malware Defense virus removal
    By Karlotta in forum Networking & Security
    Replies: 5
    Last Post: 18-02-2010, 06:46 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,718,374,583.94758 seconds with 17 queries