Computer will not reboot virus




















Sorry, but I simply do not agree. That era is long gone. The methods we used then have been surpassed. Doing the same old things—even in new ways—is just fooling ourselves. Nowadays, the removal option has been taken from us. If we need a system which is guaranteed clean, we must re-install the OS or perhaps recover an uninfected image. And in exactly what way could a system which is not guaranteed clean possibly be a satisfactory result?

Modern bots are not like old-time viri. Bots call home on broadband, then take orders and download code from the botmaster.

Some bots seem to download a range of malware friends, apparently as a distraction. Removing a distraction is not a victory, it is a defeat. Bots also modify the system beyond their own files, and no scanner will expose what the bot has done. Thinking we have restored a system just by removing malware files is another defeat. Back up your data, format your hard drive, and begin again. Reinstalling Microsoft Windows is not trivial.

It is not fun to lose most configuration information and reinstall application programs. This is sad, but it is the reality we have. Claiming that we can remove malware will not protect us; instead, it will set us up for the kill. MS completely unhelpful in that regard. Yet the client is happy because you return their computer in the state they remember it and it works.

But then you risk transferring the infection to the new machine. Software consumers at all levels need to be aware of the reinstall problem and be sure to acquire and save the install media. When I reinstall XP for friends and family , I partition the drive into system and data. The goal is for all system stuff to be on C:. So I image and recover C: for malware, and D: for edit files. I hope that Windows does not reach out to D: to run files although the user might force that.

Other than needing special Windows printer drivers, browsing is mostly what they do, and they can do that on Puppy. With the hope of not offending, I have to ask how you know the machine is clean: If the bot hides really well, we will think it gone when it is not. Thinking there is a low probability of a bot hiding implies that we know when it does hide, but that is just what we cannot know, for if we did, we would get it.

We cannot get what we cannot see. If the bot changes some part of the OS not normally checked e. Microsoft has seemingly endless ways of starting hidden malware.

I think we need to be using Firefox with security add-ons. That can be initially strange for users, but the problems are what they are, and ignoring them is not going to help. Maybe we need a special class of operator, like elevators used to have. But it is impossible to know the probability of a bot escaping detection, because if we knew of such a bot, we would get it.

In the end, as far as we know, there is no bot. But there is some probability of a hiding bot nevertheless. Until we know that probability, we cannot compare it. Then I would argue that we need better practices to guarantee stopping malware.

I think we cannot hope to keep up with multiple teams of malware kit programmers and all their buyers. Our only hope is to start new again and try to keep clean. The Drive Mount util is simple to use for a beginner and you can mount any device you have connected or connect while running.

You will find this directory on all partitions and have full access to it if you boot from a Linux Live CD such as Puppy mentioned above. Basic summary, one of the things these programs do is change how.

Very true Alan. I simply use Puppy Linux because it so bloody small and yet so loaded with simple tools. You can scan and delete files in the System Volume Information folder when the drive is mounted as a secondary on a XP Pro test machine. Steele also works as an IT Help Desk analyst, specializing in consumer and business user tech support. She earned a B. Never leave any computer in your office without a resident anti-virus product. Resident anti-virus programs run continually, protecting your computer from pre-existing and potential threats.

Microsoft offers the Security Essentials program free of charge, while other companies such as Trend Micro and Symantec offer more robust commercial products see Resources for links. If you can't find your Windows installation disc, check with your computer manufacturer to order one for a small fee. If you need to reinstall Windows, all data on your hard drive will be lost.

Related Articles. It takes a bit more work, but it'll work on computers that don't have a disc drive. To do so, reboot your computer. When it first boots up, you should see a screen that says something like "Press DEL to enter setup.

Everyone's computer is different, but somewhere in those menus you should find an option that says something like "Boot Order. When you reboot, you should find yourself in the Avira Rescue System. Now that you've successfully created your rescue disc, it's time to clean out that infection. Once you've booted into the Rescue System, here's what you need to do:. If you're still having problems after running your rescue CD, you may need to take more drastic measures.

However, if your rescue CD worked and you can boot your computer up correctly, you're almost home free. You should probably run your regular antivirus program to see if there's anything else left on your system, and clean up any malicious files it finds. Once you get everything running properly, it's time to think about long term protection.

After all, you don't want to have to do this again.



0コメント

  • 1000 / 1000