From: PA Bear [MS MVP] on 15 May 2010 02:51 Then don't let your anti-virus application subscription expire again. Klauwaart wrote: > Sure, > will give that a go too > Don't really want to go through all that misery again. > Thanks. > > > "Ottmar Freudenberger" <freudi(a)gmx.net> wrote in message > news:855i82FgddU1(a)mid.individual.net... >> "Klauwaart" <admin(a)vlaanderen-flanders.org.uk> schrieb: >> >>> I have even strengthened my security now. >> >> Not really until you've rebuilded your compormised system from scratch. >> >> Bye, >> Freudi
From: MowGreen on 15 May 2010 14:12
Klauwaart wrote: > MOW, YOU DID IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > I don't know how to thank you. > I REALLY owe you BIG TIME!!!!! > > The scan with the Malicious Software Remover took almost 7 hours, and it > turned out 2 files on my hard drive were infected with the Alureon.H > virus, which apparentlyy looks at your drivers, and, as I experienced, > sends users to sites of the hacker's choice (hence the redirection from > Google to advert sites). > > Also, after the reboot, I saw that orange shield with an exclamation > mark on my "Shut Down" button, which indicated to me that the updates > were up and running again, and yes, when I opened Windows Update, there > it came, telling me there were updates waiting for me. > > Like I said before, I really don't know how to thank you, all the > patience you have shown, and all the detailed explanations. > If there is ever anything I can do for you, I'll be only too glad to do so. > > Thanks a thousand times again. > Klauwaart. > (You saved my blond hair from going grey). At least you still have hair. The only hair on me that is grey is my " Stanley Cup Playoff beard ". And I'm not even playing in the Stanley Cup ! You're mowst welcome but please *heed the advice* from Ottmar and PABear. There's no way this system should ever engender Trust until it's flattened and rebuilt. At least now you have some control over it and can back up, and SCAN, the personal data that you want preserved. The * only * way that you can clean the infected drive is by booting from an antivirus rescue CD and cleaning it while it is not active. One must usually create the rescue CD and it's usually Linux based. Some AVs include this rescue CD capability if one purchases the AV and a CD is included instead of just downloading and installing it via the internet. Here's a review on some of the AV rescue CDs: Analyst's View: Antivirus Rescue CDs http://www.pcmag.com/article2/0,2817,2363533,00.asp I've heard good things about the BitDefender and F-Secure CDs and, they're *free*. <w> Whether you attempt to clean the system from an AV rescue CD or you simply flatten and rebuild is your choice. I'd recommend flattening and rebuilding. When you get Win 7 reinstalled I *** strongly suggest *** that you do day to computing from within a *Standard User* account as opposed to a User Account that has Admin privileges. When you need to install software/hardware or do some configuring of the OS you can log off and log on with the User Account that has the Admin privileges: Configuring Windows 7 for a Limited User Account http://unixwiz.net/techtips/win7-limited-user.html You can install updates without issue from within a Standard User account in Vista and Win 7 by enabling that option in Control Panel > Windows Update > click the Change settings link in the left frame > Under " Who can install updates " put a check mark next to " Allow all users to install updates on this computer ". Click OK. You can send me a virtual bottle of Jack Daniels and we can consider this thread done. Take care and 'Safe Standard User Surfing' to you ! Report: 64% of all Microsoft vulnerabilities for 2009 mitigated by Least Privilege accounts http://blogs.zdnet.com/security/?p=5964 " According to a newly released report, 64% of all the reported Microsoft vulnerabilities for 2009 could have been mitigated by using the principle of the least privileged accounts. By collecting data from Microsoft�s Security Bulletins published throughout the year, and identifying the vulnerabilities who would have been mitigated by users whose accounts are configured to have fewer user rights on the system, BeyondTrust�s quantitative report message is simple - get back to the basics. Key summary points on the percentage of flaws mitigated: ---> **** 90% of Critical Windows 7 operating system vulnerabilities are mitigated by having users log in as standard users ******<---- * 100% of Microsoft Office vulnerabilities reported in 2009 * 94% of Internet Explorer and 100% of IE 8 vulnerabilities reported in 2009 * 64% of all Microsoft vulnerabilities reported in 2009 * 87% of vulnerabilities categorized as Remote Code Execution vulnerabilities are mitigated by removing administrator rights " MowGreen ================ *-343-* FDNY Never Forgotten ================ banthecheck.com "Security updates should *never* have *non-security content* prechecked |