From: pooh the cat on 22 May 2010 20:46 John Stubbings, Internet Terrorist and mass forger, currently posting as za kAT <za...(a)super-secret-IPaddress.82.5.94.219> wrote: >Only a retard would take advice from a lazy blagger like you. > >Go swivel. Please excuse my mistress "John Stubbings", he's been on the sherry agin and always gets a little tipsy and stroppy after two glasses. He's ssoooooooooooooo lonely. As a Welfare Wally he ought to be looking for work. <shrug>. .. .. btw how's your account with Astra goin' Stubbo? lol. -@pooh.the.cat- -- za...(a)pooh.the.cat - Sergeant Tech-Com, DN38416. Assigned to protect you. You've been targeted for denigration!
From: Maurice Helwig on 23 May 2010 01:45 Gordon Darling wrote: > http://www.linuxjournal.com/content/using-linux-disinfect-windows > > Bear bottoms solution is "Just reformat the hard drive and reinstall > Windows. Simple. I do it all the time." > > This is an easier way. > > Regards > Gordon > > > > > My small experience with recovery of infected OS's has proved very exasperating and time consuming and usually ends up in a total reinstall of the OS. Where I have found a live Linux CD very useful is in recovering the owners data from the "C" drive and burning it to a CD. Then the OS can be reinstalled and all the software etc etc. This can be a time consuming job in itself. My own answer to this time consuming exercise is to -- 1..Partition my HDD into "C" and "D" partitions -- "C" for the OS and "D" for all my data. 2..Use DriveImage XML to produce backup images of my OS every 4 to 6 weeks to my "D" partition. 3..Backup my data on the "D" partition to a usb Caddy. 4..My son goes one step further by keeping his backup caddy off site (at his father-in-laws place only a few doors away) I have had occasion to prove this system and it only takes 30 minutes or so to drop an image onto the "C" drive and you are fully operational again. The system is simple and I have always put an image on those computers I have rebuilt for friends or relatives including making the DriveImage XML bootable rescue CD for them. Getting people to separate their data from the OS is difficult especially when they buy a Laptop with a 500FB HDD all completely devoted to the OS. It is time the manufacturers used their brains. Maurice Helwig
From: za kAT on 23 May 2010 04:28 On Sun, 23 May 2010 02:46:10 +0200, hummingbird [lemmings beware] wrote: [binned] There are specific instances where imaging will fail or part fail. I have told you this. I have even hinted at what they are. I have rubbed your face in my IP address. You can throw up all the usual. You have nothing else to offer. Anyone who bets the business, based on your advice, is a bloody fool. -- zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416. Assigned to protect you. You've been targeted for denigration!
From: Blitz The Dog on 23 May 2010 05:37 Maurice Helwig wrote: [...] >My own answer to this time consuming exercise is to -- > >1..Partition my HDD into "C" and "D" partitions -- "C" for the OS and >"D" for all my data. > >2..Use DriveImage XML to produce backup images of my OS every 4 to 6 >weeks to my "D" partition. > >3..Backup my data on the "D" partition to a usb Caddy. > >4..My son goes one step further by keeping his backup caddy off site >(at his father-in-laws place only a few doors away) > I have no experience of DriveImage XML but if you use it successfully ...that's fine. I assume that action 3. is strictly done after action 2. thereby ensuring that C partition images are included in the backup to a usb Caddy which protects against a possible crash of the C/D HDD. >I have had occasion to prove this system and it only takes 30 minutes >or so to drop an image onto the "C" drive and you are fully >operational again. Quite so. [...] -Blitz The Dog-
From: Shadow on 23 May 2010 09:02
On Sun, 23 May 2010 11:31:10 +0000 (UTC), Bear Bottoms <bearbottoms1(a)gmai.com> wrote: >za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in news:htaqv3$cqh$1 >@news.eternal-september.org: > >> As I taught you last time. Not everyone's systems are the same, and what >> I'm talking about would have /very/ serious implications if business data >> was involved, which is /very/ likely in these cases. > >If you have business data that is not routinely backed up off-site you are >even more a fool. You mean if you keep ANY business data out of your LOCAL computers and premises, you are an absolute fool. Backup to CDs, DVDs, tape, mirror, preferably a combination of these. Depends on the size of the business. By all means, keep the backups away from where a fire, etc might damage them. Never use the internet for anything confidential. Remember the clause in microsoft's passport site : any data that passes through their servers is considered public, and microsoft may use that data as it feels fit. Google, amazon etc probably have the same thing buried deep in the legal stuff. []'s |