Kaspersky Windows Unlocker, a utility within Kaspersky Rescue Disk, is designed specifically to scan and fight ransom malware infections on your computer. Ransom malware restricts access to your computer system requesting the you to transfer money in order for the ban to be removed. Use Kaspersky Windows Unlocker which can be launched without having to load Windows and will neutralize the virus without touching any files on your computer. Kaspersky Windows Unlocker comes in an ISO image file that will need to burnt onto a CD/DVD or USB flash drive on a non-infected computer with internet connection which can then be used to boot up and neutralize the infected computer.
Kaspersky Rescue Disk is a free and safe program to remove viruses from a computer without the risk of getting infected! It
Rescue Disk is designed to scan and disinfect x86 and x64-compatible
computers that have been infected. The application should be used when
the infection is so severe that it is impossible to disinfect the
computer using anti-virus applications utilities (such as Kaspersky Virus Removal Tool) running under the
operating system. In this case, disinfection is more efficient because
malware programs do not gain control when the operating system is being
loaded. In the emergency repair mode, you can only start objects scan
tasks, update databases roll back updates and view statistics.
Kaspersky Rescue Disk 10 allows performing the following actions:
• Configure objects scan settings:
o change security level
o change actions to be performed on detected objects
o create a scan scope
o change types of objects to be scanned
o limit scan time
o configure scan of compound files
o change a scan method
o set default settings
• Configure databases update settings:
o select an update source
o specify proxy-server settings
o specify regional settings
o roll back to previous databases
• Configure additional settings:
o select detection of specific threat types
o create a trusted zone
o configure notifications settings
o specify time of storing reports
o specify time of storing Quarantine and Backup objects
• Create a report on scan and update tasks.
• View statistics about applican’s functioning.
• Configure objects scan settings:
o change security level
o change actions to be performed on detected objects
o create a scan scope
o change types of objects to be scanned
o limit scan time
o configure scan of compound files
o change a scan method
o set default settings
• Configure databases update settings:
o select an update source
o specify proxy-server settings
o specify regional settings
o roll back to previous databases
• Configure additional settings:
o select detection of specific threat types
o create a trusted zone
o configure notifications settings
o specify time of storing reports
o specify time of storing Quarantine and Backup objects
• Create a report on scan and update tasks.
• View statistics about applican’s functioning.
0 التعليقات:
إرسال تعليق