Tutorials

How to Download And Install Reimage

6 January, 2017
0

This is a step-by-step tutorial how to download, install and scan your computer with Reimage anti-malware application. Find the download link. On our website at www.2-viruses.com select “Reviews” section and scroll…

 

How to Download And Install Malwarebytes

6 January, 2017
0

This is a step-by-step tutorial how to download, install and scan your computer with Malwarebytes anti-malware application. Find the download link. On our website at www.2-viruses.com select “Reviews” section and scroll…

 

How to Access Safe Mode on Android OS

22 February, 2016
0

In case you are experiencing problems on Android smartphone or tablet due to malware infections, you should completely remove all viruses and potentially unwanted applications in order to make it…

 

How to Remove Advertisements from iPad/iPhone Device

17 August, 2015
0

Annoying advertisements a.k.a. adware applications work slightly different on your iPad or iPhone device compared to a regular computer. Since all applications installed on your device is strictly checked by…

 

How To Boot Windows 10 in Safe Mode

7 August, 2015
0

It’s very simple to boot Windows 10 in safe mode. Yet, you need to know exactly how to do it. To assist you through this process, we have developed a…

 

Windows 10 Recovery Drive

7 August, 2015
0

It is wise to protect your computer from various cyber security threats not only by installing trustworthy anti-malware and anti-virus applications, but by creating a recovery drive as well. In…

 

System Repair after malware removal

7 October, 2014
0

Even if you remove infection from your computer, it is still vulnerable if you don’t make needed repair after the removal. Malware infections such as ZeroAccess Rootkit can make some…

 

Apple OS X bash patch against Shellshock is out

30 September, 2014
0

As we have reported earlier, all operating systems based on Linux that are using Bash as their default command line are vulnerable to Bash bug a.k.a. Shellshock virus. While patch…

 

Check if Your System is not Vulnerable to Shellshock

26 September, 2014
0

Since Shellshock is a very dangerous bug, you should check if your device that runs Linux or Mac OSX is not vulnerable. Open the Terminal (just type in “terminal” in…

 

CTB Locker ransomware or how to decrypt encrypted files

30 July, 2014
60

CTB Locker CTB Locker ransomware (that sometimes goes under the name of Critoni or CBT Locker as well) was first noticed in July of 2014.This virus aims to encrypt various…

 

How to Restore Mac to a Previous Date

14 May, 2014
1

If you have experienced any problems with your Mac or noticed a significant slowdown of your system, there is one effective way to resolve this problem without making any further…

 

How to Reboot Windows into Safe Mode

25 April, 2014
0

In order to do Windows reboot in the Safe Mode you need to perform several step-by-step actions that are not that difficult as it could look like. Just follow our…

 

DNS Changer Uninstall Guide

14 February, 2012
0

DNS Changer is a Trojan horse, which is commonly disguised as a video codec and is distributed in many other various forms. When it’s downloaded and installed, it starts changing…

 

How to view hidden files?

29 September, 2011
1

Hidden files are system files protected from being accidentally modified or deleted by a user. However, many types of viruses, spyware and hijackers have also been noticed to hide the…

 

Removing malicious startup entries

5 October, 2010
0

Stopping malicious processes is the first step at malware removal, however it is never sufficient. After reboot malware will come back, so one has to stop the processes from starting…