I am using WMI, I have a database with the registry run keys, with the associated EXE and the folder if any. Using WMI I kill the process(s) then delete the EXE and the folder. Then with registry file and GPOs I lock the PC down so the user can not download anything from the web. I built a web...
I am using WMI, I have a database with the registry run keys, with the associated EXE and the folder if any. Using WMI I kill the process(s) then delete the EXE and the folder. Then with registry file and GPOs I lock the PC down so the user can not download anything from the web. I built a web...
I work for a school system and I have created a spyware removal progam that runs when the users log on to our network, it works like a dream. Not only will it get rid of spyware but any other application that you don't want to run. I used Visual Basic and SQL Server database.
I work for a school system and I have created a spyware removal progam that runs when the users log on to our network, it works like a dream. Not only will it get rid of spyware but any other application that you don't want to run.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.