This page has been robot translated, sorry for typos if any. Original content here.

Free activation of the VKontakte page

Бесплатная Активация страницы ВКонтакте

This question is asked every day by thousands of users in various forums. In most cases, a window appears on the user's computer, offering to send an SMS message, after being sent, which promises to restore access to the favorite site. There is another option for events. Access to your favorite sites is blocked without any warnings and extortion of money. What to do in this case? How to regain access to your favorite site? Today we will briefly review one of the solutions to this problem.

First of all, I want to inform users of the following news. The developers and owners of the resource “vkontakte.ru” do not plan to collect money for access to their site. Therefore, any message on the screen of your monitor, that all questionnaires will be deleted, and access to the social network is prohibited - an attempt to mislead you, extortion money.

Measures to counter attackers

If a message appears on the screen of your monitor stating that you need to send an SMS in order to receive an access code for the Vkontakte website, keep in mind that a Trojan has settled on a computer, which carefully collects information about which sites you visit and which passwords you enter. Moreover, much of this information has already been collected.

The primary task is to disable the work of the trojan. The initial stage of work, I would put in two simple points:

  • 1.Disable suspicious processes in computer memory
  • 2. Removal of suspicious programs from autoload

If you have successfully managed to solve the two points I mentioned, you should take care to install an antivirus program. What to do if anti-virus software is already installed on your computer? Feel free to remove it and reinstall it.

Which antivirus is better? The best antivirus in this situation will be the one that has not been installed previously. I use two free antivirus CureIt (does not require installation) and AVZ4 (does not require installation). Each antivirus has its drawbacks and its advantages. Which one is better suited - you decide.

How to find a virus? Hosts file

After all the above activities have been carried out, it is necessary to proceed to the most important thing - editing the hosts file . More information about this file can be found here .

Our first priority is to find the hosts file on the computer.

If your operating system is Windows and is installed on the “C” drive, then the file path will be as follows: C:\WINDOWS\system32\drivers\etc

This folder should contain the hosts file .

The file has no extension. To edit it, right-click on the file, select the item “Open” and then in the new window the list of programs will be offered, example below ...

I can not get in touch. What to do?


Here we are looking for the program "Notepad" or your favorite file editor. Select it with the mouse and press the "OK" button.

Before showing how the wrong hosts file should look like, I want you to know the contents of the original file: # Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost

It is this text file filled after installing the Windows operating system.

Now we look at our current file using Notepad. On an infected computer, it may well look like this, an example below ...

I can not get in touch. What to do?


Please note that opposite 127.0.0.1 are domain names of sites.

In fact, each line like: “127.0.0.0.1 vkontakte.ru” blocks access to a specific site.

In this case, it is a social network "Vkontakte.ru".

Now our task is to select the entire contents of the hosts file and delete all the text that has opened up to our eyes.

Next, copy the original contents of the hosts from our site. I suggested it to your attention for acquaintance above.

And insert it in place of the newly deleted data. This is what we should get, an example below ...

I can not get in touch. What to do?


Close the "Notepad". When prompted to save the file, we answer "Yes".

I can not get in touch. What to do?


Reboot the computer. And try to enter the desired site.

According to my observations in 30-50 percent of cases, the above actions lead to a positive result.

However, comes across a more complex option.

So, suppose you entered the C: \ WINDOWS \ system32 \ drivers \ etc folder and observe the following picture there, an example below ...

I can not get in touch. What to do?


As we can see, the hosts file does not exist here!

We see that in the folder there is a certain file lmhosts, which is so broken hand rename hosts.

I do not advise you to do this, since this operation will not lead you to a positive result.

In this case, you need to perform the following set of actions: in the Windows Explorer main menu, go to the Tools main menu and select the “Folder options” item.

I can not get in touch. What to do?


Go to the "View" tab and uncheck the box next to the following items:

  • - Hide protected system files
  • - Hide extensions for registered file types

Now click on the switch opposite the caption "Show hidden files and folders."

I can not get in touch. What to do?


Click the "Apply" button and then the "OK" button.

The window closes, and we will see the contents of the folder C: \ WINDOWS \ system32 \ drivers \ etc already beloved by us.

We see that the real hosts file was hidden from our view. Now we see him.

I can not get in touch. What to do?


However, when you try to edit and save, this window opens to our eyes, an example below ...

I can not get in touch. What to do?


Therefore, we will do easier. Delete the hosts file altogether.

Select it with the mouse and click on the keyboard "Shift + Delete". Thus, our file is deleted forever, bypassing the basket.

Now create the hosts file again.

To do this, in the folder C: \ WINDOWS \ system32 \ drivers \ etc click on an empty space with the right mouse button and call the context menu.

Choose: Create - Text document, example below ...

I can not get in touch. What to do?


A file will appear with the name Text Document.txt.

We delete the entire name and file extension and simply enter the hosts. For a request to change the extension, we answer "Yes", an example below ...

I can not get in touch. What to do?


Now paste the contents of the original hosts file, an example below ...

I can not get in touch. What to do?


The file lmhosts.sam is simply deleted.

Reboot the computer. Our site Vkontakte should open.

In fairness it should be noted that the above recipe will work not only for the social network "V kontakte", but also for the social network "Odnoklassniki" and other frequently visited Internet resources.

If this does not happen to you, please describe in detail the problem in our forum .

If you are a complete kettle and did not understand anything of the above, download the free Dr.Web CureIt utility , it does not require installation, does not conflict with an already installed antivirus (you don’t even have to disable or remove it), after a quick check, be sure to run the full one. She copes with the virus that blocks some sites, including Vkontakte and Odnoklassniki!