One can also reset file properties in "winfile" Winfile is a most useful program that few knows exist. Click "start", "Find" Files and folders. Type in "winfile" Drag the little yellow filing cabinet onto the desktop to make a shortcut. Ken
At 02:44 PM 8/9/01 -0400, you wrote: >Go to dos and cd into the subdirectory it is in. Then type: > >attrib -r inetd.exe > >After doing that you should be able to delete the file. It simply has the read >only bit set. > >If that doesn't work then reboot the system forcing it into the dos mode only upon >bootup. Then do the above, and then delete the file before rebooting back to >windows. > >Marshall > >BROOKS BRADLEY wrote: > >> Dear Hanan, >> I received a private email from Joanne >> yesterday and attempted to open the attachement.....my internal protection >> programs intercepted the attachment, but merely said there was a corrupted file >> or program. Upon receipt of your email just a while ago, I searched my hard >> drive and found the INETD.exe virus file----but none of the others. My problem >> is that I am unable to delete the INETD.exe program ....no matter what trick I >> try. I always get the "windows is using the program" prompt when I try to >> Delete, move it to Recycle Bin, or the ADD/Remove programs utility. The virus >> must have some built-in item to foil such attempts. Do you know of any method >> whereby I can eliminate this program? I am not very virus literate---when it >> comes to eliminating their embedded programs. If you know of some maneuver >> for overcoming my problem I would be ever-so-grateful. I am at home and away >> from any help from the office personnel tonight. I can get some assistance >> tomorrow, but would certainly like to reconcile this now---if possible. >> Sincerely, Brooks. >> [email protected] wrote: >> >> > This was just posted on the beck rife list...same problem there. Directions >> > how to fix. >> > ~Hanan >> > >> > <FWD> >> > >> > I was targeted by a worm sent via an attachment from someone on a >> > >> > yahoo list I am on. The thing was very sneaky in that it quoted bits >> > >> > from one of my posts to the list, as thought this gal were replying >> > >> > to me privately. >> > >> > After that I couldn't access the list homepage, but luckily I had >> > >> > some digests to read -- and lo and behold, there were several posts >> > >> > about this very thing. And even more luckily, one of the members of >> > >> > the list is an expert in computer security, who posted a description >> > >> > and fix. I don't think I sent the worm to any of you because I >> > >> > didn't re-boot between the time I downloaded the file and the time I >> > >> > did the fix, but I post it in case any of you were hit elsewhere. >> > >> > <<Subject: The attachment is a worm. >> > >> > Win32.Badtrans.13312 >> > >> > Badtrans is a worm spreading via e-mail. The worm replies to all >> > >> > unread messages and attaches itself using one of the following 16 >> > >> > names: >> > >> > fun.pif >> > >> > Humor.TXT.pif >> > >> > docs.scr >> > >> > s3msong.MP3.pif >> > >> > Sorry_about_yesterday.DOC.pif >> > >> > Me_nude.AVI.pif >> > >> > Card.pif >> > >> > SETUP.pif >> > >> > searchURL.scr >> > >> > YOU_are_FAT!.TXT.pif >> > >> > hamster.ZIP.scr >> > >> > news_doc.scr >> > >> > New_Napster_Site.DOC.scr >> > >> > README.TXT.pif >> > >> > images.pif >> > >> > Pics.ZIP.scr >> > >> > When a user opens the attachment, the worm copies itself to the >> > >> > Windows directory as: >> > >> > inetd.exe >> > >> > and modifies the file win.ini by including the line executing that >> > >> > program. >> > >> > Additionally, the Badtrans worm, drops a backdoor trojan >> > >> > (Win32.Badtrans.21882 Trojan). The worm creates and executes a 21882- >> > >> > byte file in the Windows System directory: >> > >> > kern32.exe >> > >> > and modifies the registry in order to run it on the next reboot: >> > >> > HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\kernel32=kern32 >> > >> > .exe >> > >> > The Trojan, which is in fact a backdoor server also uses its own >> > >> > library: >> > >> > hksdll.dll (a 5632-byte file created in the same directory). >> > >> > To fix: >> > >> > First: >> > >> > search your hard drive for the files named INETD.EXE, KERN32.EXE and >> > >> > CP_23421.NLS. Delete them. >> > >> > Then: >> > >> > Run SYSEDIT by clicking START-RUN. On RUN Window type SYSEDIT then >> > >> > click OK. >> > >> > In SYSTEM CONFIGURATION EDITOR select the window C:\WINDOWS\WIN.INI >> > >> > then delete the entry "C:\WINDOWS\INETD.EXE" under RUN key. >> > >> > All done.>> >> > >> > -- >> > The silver-list is a moderated forum for discussion of colloidal silver. >> > >> > To join or quit silver-list or silver-digest send an e-mail message to: >> > [email protected] -or- [email protected] >> > with the word subscribe or unsubscribe in the SUBJECT line. >> > >> > To post, address your message to: [email protected] >> > Silver-list archive: http://escribe.com/health/thesilverlist/index.html >> > List maintainer: Mike Devour <[email protected]> > >

