how did I get Trojan.Fakealert.rre?

Related Answers

Explore the latest questions and answers related to "how did I get Trojan.Fakealert.rre?"

Answered: Trojan question.

yes and no some trojans needs internet so they can spread themselves but some do not need that, like some trojans that i know, they spread themselves using usb and every external drive you plug to your usb. they auto copy themselves there

Answered: What is a Trojan virus and exactly what does it do ...

It may be possible that the virus may harm your registry and you have to wipe your PC. Here is the good source where you found all things related to registry cleaners - I used it and fixed my ...

Answered: What caused the Trojan War

It was a woman known as Helen of Troy. The old jealousy gone mad thing.

Answered: When did the trojan war take place?

There is no such thing as the Trojan War. This is a mythological story from ancient Greece. For more great stories check out a book compiled by Edith Hamilton with both Greek and Roman myths.

Answered: Where was the trojan war?

In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans after Paris of Troy stole Helen from her husband Menelaus, the king of Sparta. The Ancient Greeks thought the Trojan War was a historical event that had taken place in the 13th or 12th century BC, and believed that ...

Answered: If my certain files are infected with trojan is there any way that the

When you done scanning of your system by using some good antivirus just choose the disinfect option instead of delete option through this way you can protect your file from being getting deleted
Liked this question? Tell your friends about it

More Questions


How to delete Trojan-Spy.Win32.GreenScreen files in Windows XP and Vista: Click your Windows Start menu, and then click “Search.” A speech bubble will pop up asking you, “What do you want to search for?” Click “All files and folders.” Type a Trojan-Spy.Win32.GreenScreen file in the search box ...


A Trojan Horse Virus is a common yet difficult to remove computer threat. A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. Trojan horse virus removal functions should be carried out with extreme caution and care. Improper Trojan ...

Who's Behind the Mac OS X Trojan?

I don't think whoever made this Trojan was targeting Mac OS X 10.5 aka Leopard. If you'd read this article carefully you'd see that they run a series of porn sites which try to physh some more information from the user, or at least try to lure them into other porn sites. Microsoft can be blamed with ...

Virus, worms or Trojan horses

Hi Jane: For assistance, please refer to the help article below. How do I know if my account has been compromised (hacked)?