Page 2 of 2 FirstFirst 12
Results 11 to 16 of 16

Thread: Virus, Trojan Horses, IE shutdowns, etc

  1. #11
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    hi,

    No problem. go ahead and re-run tdsskiller and this time select yes if you get the prompt; "write standard boot code?"
    How Can I Reduce My Risk?

  2. #12
    Junior Member
    Join Date
    Apr 2006
    Posts
    29

    Default Getting Better

    Re-ran and it found nothing. Shut down and restarted without hirens boot cd and it booted. Also was able to install Adobe reader which I have not been able to do for months. THANK YOU.

  3. #13
    Junior Member
    Join Date
    Apr 2006
    Posts
    29

    Default Backup a minute

    Sorry I reran it and it did find it, I clicked cure and rebooted. Rescanned and it found nothing, got a little ahead of myself.

  4. #14
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    ok so tdsskiller is coming up ok now? No rootkit showing up?
    Only a few things left to do then.
    How Can I Reduce My Risk?

  5. #15
    Junior Member
    Join Date
    Apr 2006
    Posts
    29

    Default Correct

    rootkill does not show up, tdss killer and malwarebytes come up with nothing.

  6. #16
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    If all is good, you can delete the tdsskiller icon from your desktop and the logs and remove combofix like this:

    Start>run and type in combofix /uninstall
    click ok or enter
    note the space after the x and before the /

    for your reference;

    10 Tips for Prevention and Avoidance of Malware:
    There is no reason why your computer can not stay malware free.

    No software can think for you. Help yourself. In no special order:

    1) It is essential to keep your operating system (Windows) browser (IE, FireFox, Chrome, Opera) and other software up to date to "patch" vulnerabilities that could be exploited. Visit Windows Update frequently or use the Windows auto-update feature. Staying updated is also essential for other web based applications like Java, Adobe Flash/Reader, iTunes, media players, browser plugins and add-ons. More and more third party applications are being targeted. Not sure if you are using the latest version of software? Check their version status and get the updates here.

    2) Know what you are installing to your computer. Alot of software can come bundled with unwanted add-ons, like adware, toolbars and malware. More and more legitimate software is installing useless toolbars if not unchecked first. Do not install any files from ads, popups or random links. Do not fall for fake warnings about virus and trojans being found on your computer and you are then prompted to install software to remedy this. See also the signs that you may have malware on your computer.

    3) Install and keep updated: one antivirus and two or three anti-malware applications. If not updated they will soon be worthless. If either of these frequently find malware then its time to *review your computer habits*.

    4) Refrain from clicking on links or attachments via E-Mail, IM, IRC, Chat Rooms, Blogs or Social Networking Sites, no matter how tempting or legitimate the message may seem. See also E-mail phishing Tricks.

    5) Do not click on ads/pop ups or offers from websites requesting that you need to install software to your computer--*for any reason*. Use the Alt+F4 keys to close the window.

    6) Don't click on offers to "scan" your computer. Install ActiveX Objects with care. Do you trust the website to install components?

    7) Consider the use of limited (non-privileged) accounts for everyday use, rather than administrator accounts. Limited accounts can help prevent *malware from installing and lessen its potential impact.* This is exactly what user account control (UAC) in Windows Vista and Windows 7 attempts to address.

    8) Install and understand the *limitations* of a software firewall.

    9) The why and how to secure your browser for safer surfing.

    10) Warez, cracks, keygens etc are very popular for carrying malware payloads. If you look for these you will encounter malware. If you download/install files via p2p networks you will encounter malware. A file can be named anything, be nothing but malware or have malware bundled in it.
    Do you really trust the source?

    More info/tips with pictures in links below.
    How Can I Reduce My Risk?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •