Tee Support 24/7 Online Computer Expert can Help You out of All the Computer Virus!

Showing posts with label Trojan horse removal. Show all posts
Showing posts with label Trojan horse removal. Show all posts

Tuesday, March 1, 2016

VirTool:JS/Obfuscator.HO Removal-How to Remove Trojan Horse?

 
Victim: Every time I start Firefox, Windows Defender pops up VirTool:JS/Obfuscator.HO ...  It does not seem to be able to remove it. This happened when I STUPIDLY clicked on a fake linked-in link in an email and got a drive by infection a few weeks ago. Anyone has good ideas to remove this threat?

What is VirTool:JS/Obfuscator.HO?


VirTool:JS/Obfuscator.HO is regarded as a high-risk Trojan horse. It has been used by cyber criminals to steal computer users’ personal information or important data. Usually, it cannot propagate through system via replicating by itself and infecting other files. However, it can easily invade into your system when you get in touch with spam emails, freeware, online games, unreliable sites, or strange links, etc.  

Just like TrojanSpy:Win32/Nivdort.DJ, it is capable of creating vicious files, modifying or deleting files on your computer, downloading unwanted  programs to consume your system CPU, indirectly drop down system performance, or even causing blue screen and system halted. What’s worse, it is in a position to help hackers to access and control your system via opening a backdoor which is also used by other cyber criminals to spread adware, virus, malware, ransowmare, or worms, etc.

How to Guard against VirTool:JS/Obfuscator.HO?


VirTool:JS/Obfuscator.HO can hides itself within seemingly harmless contents. Once installed clicked, or visited, it will straight to lands on your computer. As a result, you should be very cautious about your every action online. Certainly, the better ways is to stay away from the suspicious contents mentioned above. In addition, you also should install a powerful anti-malware or anti-virus programs to protect your computer and remember to fix all system security holes or vulnerabilities in time.

Methods to Remove VirTool:JS/Obfuscator.HO from Your Computer


VirTool:JS/Obfuscator.HO is so risky that you had better to get rid of it with safe and practical methods. In the next part, you can see two removal guides. One is manual guide; the other is automatic guide (SpyHunter). You can choice one according to your situation.

http://www.pc-superman.com/ylhi/spyhunter.php
 
 

Mehod 1: Similar Video to Remove VirTool:JS/Obfuscator.HO




Method 2: Manual Removal Guide for VirTool:JS/Obfuscator.HO


Step 1: Close all the running process on your computer and backup your important data and registry before manually removing this threat.
 
Step2.  When the Windows operates, please restart it. And then, when “Starting Windows” appears in the screen, press constantly key F5 or F8 and go to “Safe Mode with Networking”. Finally, click “Enter”.

 

Step3. Close all the processes of VirTool:JS/Obfuscator.HO in Windows Task Manager

1. Press Ctrl+sShift+Esc or Ctrl+Alt+Delete to open Windows Task Manager,

2. Look for malicious processes relevant to VirTool:JS/Obfuscator.HO,

3. Click End process.

 

Step 4: Navigate to the local disk C, find out and delete all malicious files created by VirTool:JS/Obfuscator.HO.

%Temp%\random.exe
%Program Files%\random.exe
%UserProfile%\Desktop\.lnk
%UserProfile%\Start Menu\.lnk
%UserProfile%\ApplicationData\Microsoft\InternetExplorer\QuickLaunch\random.exe

Step5. Switch to Registry Editor and delete all the files relevant to VirTool:JS/Obfuscator.HO.

1. Click on Win+ R key at the same time to open Run Commend Box. Open Registry Editor by typing “regedit” in Runbox and clicking OK.

 

2. Glance through registry entries and find out all listed hazardous items. Right click on them and click Delete to remove.

 


Attention: If you are not confident to take the manual guide, you can take consideration to remove VirTool:JS/Obfuscator.HO automatically with SpyHunter.


Method 3: Automatic Removal Guide for VirTool:JS/Obfuscator.HO


SpyHunter is a real-time anti-malware program and automatic removal tool, which is able to protect your computer from malware, spyware, worms, etc.

 
Step 1. Hit the icon to download SpyHunter.

http://www.pc-superman.com/ylhi/spyhunter.php

Step 2. Click Run to install the files related to SpyHunter step by step.


 

 

Step 3. Scan and detect your PC system automatically with SpyHunter when finishing the installation.


 

Step 4. Check Select All, and then click Remove button to remove all threats in your PC.

 
 

Recommendation:

It is not enough to only remove VirTool:JS/Obfuscator.HO because there are many falsified system configuration in computer due to this infection. As a result, it is necessary for you to clear up and optimize your system after removing it.

(>>>RegCure Pro is a perfect program to help you clear up all unwanted files or configurations as well as optimize your system)


Step1.  Download RegCure Pro via hitting teh icon below.

 http://www.pc-superman.com/ylhi/regcure.php

Step2. Hit Run to install the relevant grogram step by step.


 Step3. Scan computer system to find out suspicious files by going on Overview.
 
 
Step4. After scanning, you can find the malicious file, which can be handled by clicking Fix.

 

Note: If you are a novice in PC operation and have no confidence to remove this Trojan horse with manual process, you can install SpyHunter to help you dealt with it as well as protect your PC from it and similar threats. Moreover, you can opertimize your system and restore files with RegCure Pro after getting rid of all threats.





Sunday, February 28, 2016

Remove TrojanDownloader:JS/Locky.A & Ransomware from Infected Computer

TrojanDownloader:JS/Locky.A is able to encrypt most of files on target computer and then ask victims to pay money for decrypting the hacked files. As a consequence, it is provided with the characteristic of ransomware. It indicates that your computer has been infected by it when your computer has these files:

RG< random numbers>-SIG.js
%TEMP% \ <number>.exe

Thursday, February 25, 2016

Remove Trojan:Win32/Suloc.C!plock-How to Get Rid of Trojan Horse?

 My Microsoft Security Essentials informs me that it detect a virus called Trojan:Win32/Suloc.C!plock. I remove it for many times but it seems to come back again or come back with a different virus name and as part of another file on my system. When I delete the file, it comes back and points to another file name, but the file is not a virus. What should I do?

The Brief Introduction of Trojan:Win32/Suloc.C!plock


Trojan:Win32/Suloc.C!plock is actually a Trojan horse, spread by cyber criminals to steal computer users’ confidential and personal information or data, similar to Trojan.Win32.Patched.qw and Trojan:Win32/Skeeyah.A!bit. Targeting certain versions of Microsoft Windows, it slides into your computer via free downloads, system security vulnerabilities, backdoor ports opened by other families of malicious software, hacked websites, or spam attachments, etc.

Wednesday, February 24, 2016

Remove Trojan.Win32.Patched.qw-Trojan Horse Removal Guides

Are your computer infected by Trojan.Win32.Patched.qw? Do you have useful ways to get rid of it and deal with all issues caused by it? If still disturbed by it, you can think of following our methods to handle all problems.

The Brief Introduction of Trojan.Win32.Patched.qw


Trojan.Win32.Patched.qw is actually taken for a high-risk Trojan horse, similar to Trojan:Win32/Skeeyah.A!bit and TrojanDownloader: O97M/Skebpac.A. This Trojan horse usually propagates through computer via some mediums such as freeware, suspicious websites, similar or other kinds of computer infections, or spam attachments, etc. Consequently, when confronted with them, you had better to be watchful.

Tuesday, February 23, 2016

Helpful Methods to remove Trojan:Win32/Skeeyah.A!bit-Removal Tips for Trojan horse

Trojan:Win32/Skeeyah.A!bit has been detected as a stubborn and nettlesome Trojan horse just like TrojanDownloader: O97M/Skebpac.A. Commonly, it is supported by cyber criminals to steal computer users’ confidential and private information or data such as the users’ names of different accounts, phone number, or IP, and so on.

In addition, this Trojan horse also can cause a lot of system errors, for instance, blue screen and system halted. Additional computer infections also come with it. Its existence may crash your system as well as interrupt your online actions.

Wednesday, February 3, 2016

Get Rid of TrojanDownloader: O97M/Skebpac.A with Effective Solution

TrojanDownloader: O97M/Skebpac.A is actually regarded as a stubborn Trojan horse, as detected as a Troj/DocDl-ATY (Sophos). It can add other computer threats into your computer such as Ransom:Win32/Crowti, etc. As a matter of fact, it is created by cyber criminals to steal your sensitive and personal data or information to achieve its evil goals.

Friday, January 29, 2016

Remove PWS:Win32/Zbot.den!AM & Trojan Horse from infected Computer

PWS:Win32/Zbot.den!AM has been proved to be a stubborn Trojan horse that can propagate through your computer furtively with the help of free downloads, junk emails, system security holes, or even other computer threats. It not only has a wide distribution, but makes a round of issues, for example,

  1. It can provide hackers with a back door to control your computer.
  2. It can attack, modify, or delete files on your computer.
  3. It can steal private and confidential information or data.
  4. It may disable anti-malware or anti-virus program.
  5. It can cause vulnerable system and system errors.
  6. It can add other virus, malware, or unwanted programs into your computer.

Thursday, January 21, 2016

How to Remove Backdoor:Win32/Aimbot.D from Infected Computer?

Backdoor:Win32/Aimbot.D is taken for a risky and nettlesome Trojan horse. Generally speaking, you cannot be aware of it existence until all kinds of security issues caused by it haunt you. It is able to infect your computer with the assistances of spam emails, intrusive sites, sponsored ads, unknown hyperlinks, or other threats.

Possible Issues Caused by Backdoor:Win32/Aimbot.D


Backdoor:Win32/Aimbot.D, similar to other Trojan horse, is capable of giving rise to a series of security issues to mess up your computer as well as impact your online activities.

Best Guide to Remove Trojan:HTML/Pdfphish.P-Trojan Horse Removal Guide

Trojan:HTML/Pdfphish.P is taken for a stubborn Trojan. In general, it usually comes into computer with the help of junk emails, torrent in unsafe websites or bundling with other free-downloads. While your computer has vulnerabilities and insecurity circumstance, it will take chance to get into the system without hesitation and your approval.

When sliding into computer successfully, Trojan:HTML/Pdfphish.P, as a Trojan horse, aims to steal confidential and valuable information for illegal exploitation. It can add its vicious files into your system and delete system common files. Beyond that it is able to cause other security issues, for example,

  1. Disable Firewall and anti-malware program.
  2. Bundle with other computer infections or add unwanted software into your computer.
  3. Cause a system errors and product a lot of junk file in your computer.

Tips to Guard against Trojan:HTML/Pdfphish.P


In line with the description above, Trojan:HTML/Pdfphish.P should be eliminated from infected computer as quickly as possible. If you haven’t methods to remove it, you can follow our ways in the next part. However, you also should pay attention to prevent it with practical actions, for example,

  1. Don’t install and read spam emails.
  2. Don’t visit intrusive sites such as pornographic site.
  3. Be cautious when having free download.
  4. Scan and detect your system regularly with reliable anti-virus or anti-malware program.
  5. Fix your system vulnerabilities and holes in time.

Methods to Remove Trojan:HTML/Pdfphish.P from Your Computer


Trojan:HTML/Pdfphish.P is so risky that you had better to get rid of it with safe and practical methods. In the next part, you can see two removal guides. One is manual guide; the other is automatic guide (SpyHunter). You can choice one according to your situation.


Method 1: Manual Removal Guide for Trojan:HTML/Pdfphish.P

Step 1: Close all the running process on your computer and backup your important data and registry before manually removing this threat.
 
Step2.  When the Windows operates, please restart it. And then, when “Starting Windows” appears in the screen, press constantly key F5 or F8 and go to “Safe Mode with Networking”. Finally, click “Enter”.

 

Step3. Close all the processes of Trojan:HTML/Pdfphish.P in Windows Task Manager

1. Press Ctrl+sShift+Esc or Ctrl+Alt+Delete to open Windows Task Manager,

2. Look for malicious processes relevant to Trojan:HTML/Pdfphish.P,

3. Click End process.

 

Step 4: Navigate to the local disk C, find out and delete all malicious files created by Trojan:HTML/Pdfphish.P.

%Temp%\random.exe
%Program Files%\random.exe
%UserProfile%\Desktop\.lnk
%UserProfile%\Start Menu\.lnk
%UserProfile%\ApplicationData\Microsoft\InternetExplorer\QuickLaunch\random.exe

Step5. Switch to Registry Editor and delete all the files relevant to Trojan:HTML/Pdfphish.P.

1. Click on Win+ R key at the same time to open Run Commend Box. Open Registry Editor by typing “regedit” in Runbox and clicking OK.

 

2. Glance through registry entries and find out all listed hazardous items. Right click on them and click Delete to remove.

 


Attention: If you are not confident to take the manual guide, you can take consideration to remove Trojan:HTML/Pdfphish.P automatically with SpyHunter.


Method 3: Automatic Removal Guide for Trojan:HTML/Pdfphish.P


SpyHunter is a real-time anti-malware program and automatic removal tool, which is able to protect your computer from malware, spyware, worms, etc.

 
Step 1. Hit the icon to download SpyHunter.

http://www.pc-superman.com/ylhi/spyhunter.php

Step 2. Click Run to install the files related to SpyHunter step by step.


 

 

Step 3. Scan and detect your PC system automatically with SpyHunter when finishing the installation.


 

Step 4. Check Select All, and then click Remove button to remove all threats in your PC.

 
 

Recommendation:

It is not enough to only remove Trojan:HTML/Pdfphish.P because there are many falsified system configuration in computer due to this infection. As a result, it is necessary for you to clear up and optimize your system after removing Trojan:HTML/Pdfphish.P.

(>>>RegCure Pro is a perfect program to help you clear up all unwanted files or configurations as well as optimize your system)


Step1.  Download RegCure Pro via hitting teh icon below.

 http://www.pc-superman.com/ylhi/regcure.php

Step2. Hit Run to install the relevant grogram step by step.


 Step3. Scan computer system to find out suspicious files by going on Overview.
 
 
Step4. After scanning, you can find the malicious file, which can be handled by clicking Fix.

 

Note: If you are a novice in PC operation and have no confidence to remove this Trojan horse with manual process, you can install SpyHunter to help you dealt with it as well as protect your PC from it and similar threats. Moreover, you can opertimize your system and restore files with RegCure Pro after getting rid of all threats.





Remove Behavior:Win32/Fynloski.gen!A with Practical Methods-Removal Guide for Trojan Horse

Can Behavior:Win32/Fynloski.gen!A be detected by your anti-malware or antivirus program? Do you have methods to remove it your security tool cannot handle it? In this post, you can know how to get rid of it.

The Brief Introduction of Behavior:Win32/Fynloski.gen!A


Behavior:Win32/Fynloski.gen!A is detected as a dangerous Trojan horse that is compatible with Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista, and Windows XP. In general, it may come with free download, pornographic sites, junk emails, etc. Thus, you should stay away from them to avoid its damages.

Sunday, January 10, 2016

Get Rid of Vicious Explore.exe from Infected computer with Easy Methods

Explore.exe is an executable file for Windows Explorer. However, its filename has been used by cyber criminals to spread Trojan horse. As a result, when seeing many the same files in your Windows Task Manager, you system is sure to be intruded by Trojan horse. It is not doubt that your system will has a series of traits of Trojan horse. As a result, you have to try you best to get rid of the dangerous Trojan horse and remove all the infected explore.exe to make your system safe and normal.

Tuesday, January 5, 2016

Get Rid of LiveUpdt.exe & Trojan Horse from Infected Laptop or Desktop

Can find numbers of liveUpdt.exe in your Windows Task Manager? Is your computer abnormal due to this file? Please read this post to know more about it and follow our methods to get rid of it and hidden threats.

More Details of LiveUpdt.exe


LiveUpdt.exe belongs to a common executable file in Windows Task Manager. Nevertheless, it has been used by hackers or cyber criminals to spread Trojan horse or other potentially unwanted programs (PUPs). As a result, when tremendous same files run in Windows Task Manager, your computer will be at risk.

Tuesday, December 29, 2015

Easy Methods to Eliminate Malsign.Generic.5BB-Trojan Horse from Infected System

My AVG informs me that my laptop is infected by Malsign.Generic.5BB. However, this threat cannot be removed by AVG. Who can give me a hand to get rid of it?

More Information of Malsign.Generic.5BB


Malsign.Generic.5BB is regarded as a high-risk Trojan horse that has been proved by AVG, SpyHunter, and other anti-malware or anti-virus programs. This Trojan horse is compatible with all Windows systems. Usually, Trojan horse can propagate through system by inserting its malicious codes into system files.

Thursday, December 24, 2015

Best Guide to Eliminate HackToo:Win32/AutoKMS & Trojan Horse from Laptop or Desktop

Are you anxious about all issues caused by HackToo:Win32/AutoKMS? Do you desire for practical methods to get rid of it from infected computer? Please focus on this article in which you can get ways to break away from this threat.

The Basic Knowledge of HackToo:Win32/AutoKMS


HackToo:Win32/AutoKMS is taken for a risky and nettlesome Trojan horse. Generally speaking, you cannot be aware of it existence until all kinds of security issues caused by it haunt you. It is able to infect your computer with the assistances of spam emails, intrusive sites, sponsored ads, unknown hyperlinks, or other threats.

Thursday, December 17, 2015

Easy Methods to JS/Downloader.Agent-Trojan Horse Removal Guides

Are you anxious when your computer is infected by JS/Downloader.Agent and unfortunately you don’t know how to eliminate it from your computer? You should not worry about anything longer because this post can give you useful removal guides.

The Basic Information of JS/Downloader.Agent


JS/Downloader.Agent has been detected as a high-risk Trojan horse by many reliable and famous anti-malware or anti-virus program such as AVG and SpyHunter, etc. The Trojan horse is very stealthy that victims cannot be aware of it existence until security issues haunt you.

Tuesday, December 15, 2015

Best Guides on How to Delete TrojanSpy:Win32/Nivdort.CE from Your Computer

If your computer is attacked by TrojanSpy:Win32/Nivdort.CE, if you still haven’t effective solutions to eliminate it from your computer, you can focus on this message and you will get what exactly you are eager.

The Basic Description of TrojanSpy:Win32/Nivdort.CE


TrojanSpy:Win32/Nivdort.CE is actually a dangerous Trojan horse, capable of stealing your personal information or data via inserting it vicious code into your system files. It is very stealthy and cunning because it is able to lands on your computer with diverse channels such as bundle with spam emails or intrusive sites, etc.

Monday, November 16, 2015

Get Rid of Trojan Win32.Inject.vktx with Easy and Practical Methods

Are you informed that your system is infected by Trojan Win32.Inject.vktx by your anti-virus program? Do you have any useful methods to get rid of this Trojan horse if your anti-virus program cannot give you a hand to remove it? In this article, you really get help!

The Description of Trojan Win32.Inject.vktx


Trojan Win32.Inject.vktx is detected as a risky Trojan horse by many anti-virus program or anti-malware program such as Kaspersky and SpyHunter. Usually, it is so cunning and stealthy that you cannot be aware of its appearance in your system until all the possible issues it trigger present. Beside that do you clear how it lands on your system? In reality, the methods it infiltrates in to your system vary fro the activities you surfing the Internet. If you open spam emails or click suspicious links, it is possible to come form them. If you enter into intrusive websites, it may invade your system via the sites. Certainly, it also may be from the system security vulnerabilities and other infections.

Tuesday, October 20, 2015

Get Rid of TrojanDropper:097M/Artitex,A-Removal Guide for Trojan Horse

What should you do when you are informed your computer is infected by TrojanDropper:097M/Artitex,A and your anti-virus program cannot remove it completely from your computer? If you are still bothered by it, this post is your helper and a good choice.

Are Your Eager to More Information of TrojanDropper:097M/Artitex,A?


TrojanDropper:097M/Artitex,A is supposed to e an dangerous and risky Trojan horse. Its existence is the biggest threats for your files or confidential data stored in your computer because it is published by cyber criminals to steal your private information for its profits. You have to mind that besides the information leakage, this Trojan horse also possible to make your in other troubles, for example, cause a vulnerable system, lead to blue screen and system halted, invite virus, malware, or other threats in your computer, trigger a degraded system performance and network speed, or even block your security program from working, and so on.

Thursday, October 15, 2015

How to Remove Backdoor/PHP:Fobushell.D from Your PC—Removal Guides for Trojan Horse

Are you surprised when feeling the existence of Backdoor/PHP:Fobushell.D, a malicious infections, in your computer? Are you confused why your security tool cannot help your remove it absolutely? Read the post to acquire more its knowledge and follow the provided removal guides to get rid of it from your computer.
 

The Analysis of Backdoor/PHP:Fobushell.D


Backdoor/PHP:Fobushell.D is supposed to be an Trojan horse that can put you in trouble, for example, disable your anti-virus program, indirectly cause other infections, degrade your system performance, open a back door for hackers to take over your system remotely, reveal your personal information, etc. Ina word, its existence is a source that trouble can come continuously. 
As a risky Trojan horse, Backdoor/PHP:Fobushell.D is distinguished by attacking and filching your confidential and private information. As a consequence, you have to try you best to make it vanished from your computer.
 

Effective Strategies to Prevent Trojan Horse from your Computer


It is possible that Trojan horse is able to come back if you don’t stay away from the malicious sources that easy make adware enter into your computer or there isn’t a powerful anti-spyware program to protect your computer after you get rid of it from your computer. Therefore, focus on the following tips.

  1. Don’t click spam e-mails, suspected attachments, or links from uncharted provenance. 
  2. Keep a distance away from intrusive websites such as pornographic and gamble websites.
  3. Be caution and reject the additional and unwanted applications while downloading unknown software.
  4. Install reputable real-time anti-spyware software to scan and protect your computer.

Methods to Remove Backdoor/PHP:Fobushell.D from Your Computer


Mehod 1: Similar Video to Remove Backdoor/PHP:Fobushell.D




Method 2: Manual Removal Guide for Backdoor/PHP:Fobushell.D

Step 1: Close all the running process on your computer and backup your important data and registry before manually removing this threat.
 
Step2.  When the Windows operates, please restart it. And then, when “Starting Windows” appears in the screen, press constantly key F5 or F8 and go to “Safe Mode with Networking”. Finally, click “Enter”.

 

Step3. Close all the processes of Backdoor/PHP:Fobushell.D in Windows Task Manager

1. Press Ctrl+sShift+Esc or Ctrl+Alt+Delete to open Windows Task Manager,

2. Look for malicious processes relevant to Backdoor/PHP:Fobushell.D,

3. Click End process.

 

Step 4: Navigate to the local disk C, find out and delete all malicious files created by Backdoor/PHP:Fobushell.D.

%Temp%\random.exe
%Program Files%\random.exe
%UserProfile%\Desktop\.lnk
%UserProfile%\Start Menu\.lnk
%UserProfile%\ApplicationData\Microsoft\InternetExplorer\QuickLaunch\random.exe

Step5. Switch to Registry Editor and delete all the files relevant to Backdoor/PHP:Fobushell.D.

1. Click on Win+ R key at the same time to open Run Commend Box. Open Registry Editor by typing “regedit” in Runbox and clicking OK.

 

2. Glance through registry entries and find out all listed hazardous items. Right click on them and click Delete to remove.

 


Note:  If you want to give your computer a perfect protection, as well as  remove and guard against adware, spyware, or malware after get ri dof this Trojan, you can download and install SpyHunter, a Powerful and Automatic Removal Tool


Method 3: Automatic Removal Guide for Trojan/Adware/Spyware/Malware 


SpyHunter is a real-time anti-malware program and automatic removal tool, which is able to do a lot of things for you.
  1. Detect and remove the latest malware attacks.
  2. Protect your PC from varieties of infections and threats all the time.
  3. Allow you to restore backed up objects
 
Step 1. Download SpyHunter into your machine.

1. Press the following button to download SpyHunter and its files.

http://www.pc-superman.com/ylhi/spyhunter.php

2. Click Run to install the files related to SpyHunter step by step.


 


 

Step 2. Get rid of Backdoor/PHP:Fobushell.D with SpyHunter from your machine.

1. Scan and detect your PC system automatically with SpyHunter when finishing the installation.

 
2. It costs some time for the first scan, and please patiently wait for the scanning result.

 

3.  After detecting all the threats in PC successfully, please check Select All, and then click Remove button to get rid of all threats in your PC.

 
 

Recommendation:

when get rid of it from your PC completely, you should take a full consideration to optimize your Internet system by installing RegCure Pro.

Step1.  Download RegCure Pro.

 http://www.pc-superman.com/ylhi/regcure.php

Step2. Hit Run to install the relevant grogram step by step.


 Step3. Scan computer system to find out suspicious files by going on Overview.
 
 
Step4. After scanning, you can find the malicious file, which can be handled by clicking Fix.

 
 
 

Download and Install SpyHunter to Protect Your PC


Download and Install RegCure Pro to Optomize Your PC here