Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Malware Attack
Message
De
21/11/2015 05:04:41
 
 
À
21/11/2015 04:50:12
Information générale
Forum:
Windows
Catégorie:
Autre
Titre:
Divers
Thread ID:
01627007
Message ID:
01627712
Vues:
40
Calling me names on a Saturday morning ;-))

Over here c't journal offers each year a DVD bootable into Linux with simple script menus, where you can select which virus engines from the 4 installed you want to run, to just check or try fix - and they will get updates first. Depending on usage of machine monthly or quarterly task ;-)

recommended, if you do not have trustworthy alternative source - they vet the process and have no stake in hiding something inside.


>That's an option, but not realistic for an end user. It's something the virus removal specialist might try ;)
>
>>before going that drastic, I'd try removal with a toolset booting from linux (unless that already failed) - after back up of user files, which should be first IAC.
>>
>>
>>>If you know you had malware and thought you got rid of it, then clearly you didn't. Which means it's advanced and persistent, probably with a rootkit, RAT, keylogger etc. In that case you only have a few realistic options:
>>>
>>>1. Take it to a virus removal specialist. They may be able to remove it without wiping your computer, but be aware that some commercial antivirus removal services will wipe your computer and restore it to its original factory condition, deleting all your files and programs. Without a complete wipe you can never be 100% sure the infection is gone (and sometimes not even then - see below)
>>>
>>>2. Windows 10 has some new recovery features e.g. "reset" but my gut feel is they won't be effective against an advanced threat: http://windows.microsoft.com/en-ca/windows-10/windows-10-recovery-options
>>>
>>>3. Back up your user files, then completely wipe the computer and reinstall Windows and all your programs and files
>>>
>>>It's worth noting that some very advanced malware persists even across disk wipes, by embedding itself either in the system BIOS or in the firmware of disk devices.
Précédent
Suivant
Répondre
Fil
Voir

Click here to load this message in the networking platform