Jump to content

bojo0o0o94

Потребител
  • Брой теми

    20
  • Регистрация

  • Последно посещение

bojo0o0o94's Achievements

Новобранец

Новобранец (1/14)

0

Репутация в общността

  1. Значи едно аверче има следния проблем, има Skype, но не може да влиза в страници. Пробвал е с IE9, Firefox и Chrome и не става. Някакви идеи да имате??
  2. Ами отваря ми картинката но без да се мърда. Отварям картинките с вграденото приложение в Windows. A аз съм с Windows 7 ultimate 32 битова.
  3. Значи проблема е, че не мога разглеждам тези картинки които се мърдат(подвижните картинки) иначе другите си ги отварям без проблем. Някаква идея как да го оправя?
  4. Може ли някой да ми опише стъпките да запиша снимки на CD диск с ImgBurn.
  5. Сложи си Internet Explorer 9 да видим дали ще прави проблем.
  6. Е тва е за Xp на мен ми трябва за седмица.
  7. Значи когато не съм на компютъра определено време той заспива. Проблема е там, че когато искам да го използвам той е излязал от потребителския си акаунт и трябва да цъкна оная картинка за да вляза. Та въпросът ми е мога ли да го настроя да заспива, но без да излиза от потребителския акаунт, търсих в Control Panel и не мога да ги намеря тея настройки с Windows 7 съм. Благодаря предварително.
  8. Еи сега го погледнах в Интернет експлорера и го забраних Обаче проблема не се е оправил, еи сега пак ми се появи съобщението. Мисля че се получи от това че си Упдеитнах уиндолса от Windows Update
  9. В Malwarebytes' Anti-Malware не бяха открити заплахи. Какво е това Facemoods кажи от каде да проверя дали го използвам. SUPERAntiSpyware Scan Log http://www.superantispyware.com Generated 04/17/2011 at 07:23 PM Application Version : 4.50.1002 Core Rules Database Version : 6856 Trace Rules Database Version: 4668 Scan type : Complete Scan Total Scan Time : 00:22:59 Memory items scanned : 775 Memory threats detected : 0 Registry items scanned : 8751 Registry threats detected : 0 File items scanned : 19223 File threats detected : 26 Adware.Tracking Cookie C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.kaldata[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@imrworldwide[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.novsport[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adv.gamerzhut[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ehg-twi.hitbox[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@yieldmanager[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adviva[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@content.yieldmanager[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adtech[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.yieldmanager[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@revsci[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@content.yieldmanager[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad2.adfarm1.adition[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.moreto[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@delivery.usermedia[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@doubleclick[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@media.easyads[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adfarm1.adition[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@specificclick[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.sportmediaplus[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@r1-ads.ace.advertising[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@zanox[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.neg[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@hitbox[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@advertising[2].txt
  10. Начи като натиснах Run Fix ми изчезнаха иконките и старт менюто, но след като приключи процеса в OTL компютара се рестартира и вече пак имам иконки и старт меню. Ето лога All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\URL\Prefixes\\gopher|:gopher:// /E : value set successfully! Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7} C:\Windows\Downloaded Program Files\gp.inf not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session manager\\BootExecute:autocheck autochk * deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully. ========== FILES ========== recycler not found in C:\ recycler not found in D:\ ========== COMMANDS ========== C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Public User: user ->Temp folder emptied: 156348568 bytes ->Temporary Internet Files folder emptied: 243158591 bytes ->Java cache emptied: 32635 bytes ->FireFox cache emptied: 82902964 bytes ->Flash cache emptied: 18465 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 1619120 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 78052 bytes RecycleBin emptied: 152 bytes Total Files Cleaned = 462,00 mb [EMPTYFLASH] User: All Users User: Default User: Default User User: Public User: user ->Flash cache emptied: 0 bytes Total Flash Files Cleaned = 0,00 mb OTL by OldTimer - Version 3.2.22.3 log created on 04172011_170835 Files\Folders moved on Reboot... C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\ED8654D5-B9F0-4DD9-B3E8-F8F560086FDF.dat moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X17JIYMH\j[2].js moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P4X5SFTF\count[2].json moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KEVOGB00\2[1].js moved successfully. File move failed. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9Z9DMDYJ\site=transferm&affiliate=transferm&adset=brsl&prod=tm_port&tbl=channel&ppos=9&wi=0&tie=free&band=2&wlcamp=WA87969&TransactionID=20341964[1].js scheduled to be moved on reboot. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9Z9DMDYJ\site=transferm&affiliate=transferm&prod=tm_port&tbl=channel&ppos=71&wi=0&tie=free&band=2&wlcamp=WA87969&TransactionID=20341964[1].js moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\90FRI4IK\adjs[4].js moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5XE9523X\26930-2[7].js moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4C2YDB2P\site=transferm&affiliate=transferm&prod=tm_port&tbl=channel&ppos=31&wi=0&tie=free&band=2&wlcamp=WA87969&TransactionID=20341964[1].js moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2WX0081B\count[1].json moved successfully. C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2QRIFRKK\impr[8] moved successfully. Registry entries deleted on Reboot...
  11. SUPERAntiSpyware Scan Log http://www.superantispyware.com Generated 04/17/2011 at 02:33 PM Application Version : 4.50.1002 Core Rules Database Version : 6856 Trace Rules Database Version: 4668 Scan type : Complete Scan Total Scan Time : 00:21:26 Memory items scanned : 786 Memory threats detected : 0 Registry items scanned : 8751 Registry threats detected : 0 File items scanned : 19620 File threats detected : 50 Adware.Tracking Cookie C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@statcounter[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.kaldata[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@legolas-media[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@imrworldwide[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@serving-sys[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adv.gamerzhut[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.novsport[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adbrite[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@fastclick[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ehg-twi.hitbox[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@yieldmanager[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.zanox[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adviva[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@www.burstnet[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@content.yieldmanager[3].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@traffictrack[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@2o7[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.ad4game[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adtech[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@webmasterplan[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ru4[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@apmebf[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.yieldmanager[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@www.zanox-affiliate[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@smartadserver[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.mail[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@tribalfusion[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@content.yieldmanager[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@burstnet[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@media6degrees[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad2.adfarm1.adition[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@atdmt[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@zanox-affiliate[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.moreto[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.zamunda[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@tradedoubler[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@user.lucidmedia[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@delivery.usermedia[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@doubleclick[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@media.easyads[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@adfarm1.adition[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@specificclick[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.sportmediaplus[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@r1-ads.ace.advertising[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@zanox[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@ads.neg[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@hitbox[1].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@advertising[2].txt C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@revsci[2].txt secure-uk.imrworldwide.com [ C:\Users\user\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7M6UZ2ZE ]
×
×
  • Създай ново...