Search results

  1. Enthrones

    General PC Security Guide + Support

    You haven't provided any information on how to manually remove malware. Any type of software created by publishers wouldn't detect a malware that is fully undetectable (using various methods).
  2. Enthrones

    ♛ Explaining Windows OS Trojan Viruses and Professional Support

    You need to get down to the root. Just because you ran a software and found the virus does not mean it will be completely removed.
  3. Enthrones

    ♛ Explaining Windows OS Trojan Viruses and Professional Support

    I'm the official owner of the board and have posted these threads there.
  4. Enthrones

    ♛ Explaining Windows OS Trojan Viruses and Professional Support

    Malwarebytes has not nothing to do with the removal of trojans.
  5. Enthrones

    ♛ The Differences Between Antivirus and Antimalware Softwares

    Differences Between Antivirus and Antimalware SoftwaresToday, I will be explaining the differences between two software's. The first being, antivirus software, and the second being, antimalware/spyware software. I am sure that you have mixed these software types with each other when carrying on...
  6. Enthrones

    ♛ Explaining Windows OS Trojan Viruses and Professional Support

    I'd like to direct you to this thread to give you knowledge on the differences between antiviruses and antimalwares. https://www.forumkorner.com/thread-239592.html
  7. Enthrones

    Feedback on me?

    From my opinion, I don't know you although have looked over your threads and can tell people like you a lot.
  8. Enthrones

    What do you guys think of my new revamp?

    The username and profile avatar match well with the group user bar and stars.
  9. Enthrones

    [Suggestion] X Years of Service

    This would be interesting to see, I wouldn't mind it being implemented into the board.
  10. Enthrones

    ♛ Explaining Windows OS Trojan Viruses and Professional Support

    Explaining Windows OS Trojan Viruses and 24/7 SupportTrojan horses are designed to allow a hacker remote access to a target computer system. Once a trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations...
  11. Enthrones

    Troll award for free!

    I'd like to have this award, thank you.
  12. Enthrones

    KING AWARD >FOR ANYONE!<

    Why not, I'd be more than grateful to have this award on my profile.
Back
Top