SpyNoMore,the best anti-spyware software that i have used,it can detect and remove all stealth keylogger on your computer.anymore it can block the websites which have keylogger dangerous,it is also easy to use
The Best way to Remove Virus,all Trojans,Malware,Spyware, Worm,Pop Up,Hijack Web browser and all Rogue Fake Anti-virus in you Computer is Restart You Computer Safe Mode with Networking:
1. Log out and reboot your machine.
2. When the machine starts the reboot sequence, press the F8 key repeatedly.
3. Select Safe Mode with Networking from the resulting menu.
4. Login. If the malware has changed your password, try logging in as Administrator. By default, Administrator has no password.
5. The machine will continue booting, but the Windows desktop will look different.
Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.
The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.
ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://majorgeeks.com/ATF_Cleaner_d4949.html
6. When you're finished Remove Virus, Malware, Trojan, Worm, rogue virus and Spyware log out and reboot back into normal mode
Did no one read the question???? "the computer has a password" as in once it's shutdown it can't be accessed again without the unknown password.
Download Trend Micro Internet Security Pro (free for 30 days), install it and update it. Now run it and see if it can remove the threats. Also if you have it installed run Windows malicious software removal tool (type MRT in the search bar), and Windows Defender (make sure its updated).
Obviously you are not guaranteed to get rid of the problem without access to safe mode, but if you really want to get rid of it before your dad returns then give the above a try.
Download Malwarebytes in safe mode, run quick scan, quarentine and delete the trojan, and ur good to go (sorry don't have a link to malwarebytes, pretty sure some1 after my post will say the same thing.)
Then after you are done removing it, restart the computer on a normal boot.
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.
Operations which could be performed by a hacker on a target computer system include:
Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)
Data Theft (e.g. passwords, security codes, credit card information)
Installation of software (including other malware)
Answers & Comments
Verified answer
SpyNoMore,the best anti-spyware software that i have used,it can detect and remove all stealth keylogger on your computer.anymore it can block the websites which have keylogger dangerous,it is also easy to use
http://www.converter123.com/Other-Software/Other_T...
The Best way to Remove Virus,all Trojans,Malware,Spyware, Worm,Pop Up,Hijack Web browser and all Rogue Fake Anti-virus in you Computer is Restart You Computer Safe Mode with Networking:
1. Log out and reboot your machine.
2. When the machine starts the reboot sequence, press the F8 key repeatedly.
3. Select Safe Mode with Networking from the resulting menu.
4. Login. If the malware has changed your password, try logging in as Administrator. By default, Administrator has no password.
5. The machine will continue booting, but the Windows desktop will look different.
Then in The Safe With Networking .Download and Scan By Using Malwarebytes’ Anti-Malware http://www.download.com/Malwarebytes-Anti-Malware/...
Download and Scan By Using Super Anti-Spyware Press here http://www.superantispyware.com/
Download and Scan By using Norman Malware Cleaner Press here http://majorgeeks.com/downloadget.php?id=5450&file...
Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.
The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.
ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://majorgeeks.com/ATF_Cleaner_d4949.html
6. When you're finished Remove Virus, Malware, Trojan, Worm, rogue virus and Spyware log out and reboot back into normal mode
Did no one read the question???? "the computer has a password" as in once it's shutdown it can't be accessed again without the unknown password.
Download Trend Micro Internet Security Pro (free for 30 days), install it and update it. Now run it and see if it can remove the threats. Also if you have it installed run Windows malicious software removal tool (type MRT in the search bar), and Windows Defender (make sure its updated).
Obviously you are not guaranteed to get rid of the problem without access to safe mode, but if you really want to get rid of it before your dad returns then give the above a try.
Just boot up the computer in safe mode and download a program like Malewarebytes Anti Malware or Spyware Doctor.
Download Malwarebytes in safe mode, run quick scan, quarentine and delete the trojan, and ur good to go (sorry don't have a link to malwarebytes, pretty sure some1 after my post will say the same thing.)
Then after you are done removing it, restart the computer on a normal boot.
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.
Operations which could be performed by a hacker on a target computer system include:
Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)
Data Theft (e.g. passwords, security codes, credit card information)
Installation of software (including other malware)
Downloading of files
Uploading of files
Deletion of files
Modification of files
Keystroke logging
Viewing the user's screen
<--http://pc-faster-tools.com/trojan/
For Viruses, Malware & Adware Removal
Re-boot your computer in SAFE MODE
To run it in Safe Mode, as soon as your computer turns on hit the F8 key (repeatedly) until a screen comes up
Choose Start computer in SAFE MODE with network support
Download and install Malware Bytes and AVAST
http://malware-virus-spyware-remover-tools.blogspo...
http://antivirus-antispyware-removal-softwar.blogs...
Run a FULL SCAN with both programs – They are FREE.
Just turn it off, when he gets home, restart in safe mode, get this. free version.
~