conduit and other crap [Solved]
Posted 06 January 2014 - 02:03 PM
Posted 07 January 2014 - 11:19 AM
1. All updates installed, did not install bing toolbar or bing desktop ...
2. Computer seems to be running fine, no issues that I can see ...
I have had pretty good success with CCleaner, Malwarebytes and Avast when people actually update and use them ... I currently use LinuxMint at home and it has worked flawlessly since 2007, the year my personal XP computer got a virus on FACEBOOK, and i have never looked back. That was 6 home computers ago and an OMV server, my how my network grows, that gigabit switch i picked up for free was a godsend. The beginning of last year was the worst, 10 friends got hacked within a two week time, all windows 7 and i have not really kept up with 7, most of the previous stuff was XP.
What seems to work best in a 7 environment, in your opinion ? Thanks for your help.
Posted 07 January 2014 - 12:11 PM
CCleaner is a good program and we use it on occaasion here...except the Registry cleaning function. We don't recommend the use of any registry cleaners. They haven't been shown to increase the system's speed but they have been known to remove system entries that the computer actually needs. Thus turning your computer into an expensive door stop
I have had pretty good success with CCleaner
You are welcome. And what works best is the same thing recommended for all Windows systems.
What seems to work best in a 7 environment, in your opinion ? Thanks for your help.
1. Keep Windows up to date with all important / critical updates and service packs.
2. A good antivirus software, updated frequently. We recommend Microsoft Security Essentials, and Avira and Avast are also very good. You can go to the Free Antivirus and Antspyware sub-forum of our Applications forum for more info.
3. A good antispyware program. You don't need to buy the paid versions. I use the free version of MalwareBytes and just run frequent scans.
4. Safe surfing practices. I have the Web of Trust plugin installed in Firefox. It will give you information about whether the site you are visiting is OK.
Don't open e-mails that you don't recognize, or click any attachments in e-mails that you don't recognize. I don't open any attachments unless I have requested them or I call the person sending the e-mail and verify that they sent the attachment.
I cover a lot of these things below.
OK! Well done. Here is the best part of the process! The mullygrubs are gone! That's a technical term for your log(s) appear to be clean! If you have no further issues with your computer, please complete the housekeeping procedures outlined below.
The first thing we need to do is to remove all the tools that we have used. This is so that should you ever be re-infected, you will download updated versions.
If you didn't uninstall ESET after running the program we will do it now.
1. Please click the Start Orb , click Control Panel. Under the Programs heading click Uninstall a program
1. Please click Start > Control Panel > Add/Remove Programs
2. In the list of programs installed, locate the following program(s):
3. Click on each program to highlight it and click Change/Remove. (Vista/7 users: right click the program and click Uninstall
4. After the programs have been uninstalled, close the Installed Programs window and the Control Panel.
5. Reboot the computer.
Delete the folders associated with the uninstalled programs.(Only do this if you uninstalled the program)
1. Using Windows Explorer (to get there right-click your Start button and click "Explore"), please delete the following folders(s) (if present):
C:\Program Files (86)\ESET
2. Close Windows Explorer.
- Click the Uninstall button
- Confirm with yes
1. Please re-open on your desktop.
- Be sure all other programs are closed as this step will require a reboot.
- Click on
- You will be prompted to reboot your system. Please do so.
Delete the following Files and Folders (If Present):
esetsmartinstaller_enu.exe (If you used Firefox to run the ESET scanner)
The Microsoft Readiness tool
The Adobe Reader setup file
Delete any other .bat, .log, .reg, .txt, and any other files created during this process, and left on the desktop and empty the Recycle Bin.
Reset Hidden Files and Folders
1. Click the Start Orb and click Computer.
2. In the Menu bar at the top click the Tools menu and click Folder Oprtions...
3. On the Folder Options window click the View tab.
4. In the Advanced settings: box, Under Hidden files and folders, click the Do not show hidden files and folders button.
5. Click the Hide protected operating system files (Recommended) box.
6. Click Apply and then OK
Make a Fresh Restore Point, Clear the Old Restore Points, and Re-enable System Restore
The files in System Restore are protected to prevent any programs from changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected, but that's good news).Note: Do not clear infected/old System Restore points before creating a new System Restore point first!
- Click the Start Orb. Click Control Panel. Click System and Maintenance
- Click System
- In the left column under Tasks, click Advance System Settings and accept the warning if you get one
- Click the System Protection Tab
- Windows Vista: In the Available Disks box put a ckeck mark in the box next to OS (?:) (System). Your drive letter will be shown in place of the ?
Windows 7/8: In the Protection Settings section, make sure the protection for the System drive is ON. If it isn't, click the Configure button and turn it on.
Note: It may take some time for the system to populate the Available Disks box, so be patient.
- Click the Create button at the bottom
- Type in a name fo the restore point, i.e: Clean
- Click Create
- A small System Protection window will come up telling you a Restore Point is being created.
- Another System Protection window will come up telling you the Restore Point has been created, click OK
- Click OK again.
- Close the Control Panel
- Click Start(Windows 7 Orb), click Run (or press the Windows key and R together) to bring up the Run box.
- Copy and Paste the following in the Run box:
- Click OK
A Disk Cleanup Options popup will open
- Click Files from all users on this computer
A Drive Selection popup will open
NOTE: You will not see this window unless you have more than one drive or partition on your computer.
If you chose Files from all users on this computer above, then click on Continue for UAC prompt.
- Select the system drive, C:\ and click OK.
- For a few moments the system will make some calculations
- The Disk Cleanup Window will open:
- Click the More Options tab.
NOTE: If there isn't a More Options button then click the Clean up system files button at the bottom of the window. Disk Cleanup will reload and the More Options button should be visible.
- Click the Clean up button under the System Restore and Shadow Copies section. (See screenshot below)
- In the Disk Cleanup dialog box, click Delete (See screenshot below).
- You will get a Disk Cleanup confirmation (See screenshot below)
- Click Delete Files, and then click OK.
Below, I have included a number of recommendations for how to protect your computer against future malware infections.
:Keep Windows Updated:-Windows Updates are constantly being revised to combat the newest hacks and threats. Microsoft releases security updates that help your computer from becoming vulnerable.
Please either enable Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.
1. Click Start> All Programs, from the list find Windows Update and click it.
:Turn On Automatic Updates:
1. Click Start> Control Panel. Click Security. Under Windows Update, Click Turn automatic on or off.
2. On the next page, under Important Updates, Click the Drop down arrow on the right side of the box and Click Install Updates Automatically(recommended).
If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your task bar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.
: Keep Java Updated :
WARNING: Java is the #1 exploited program at this time. The Department of Homeland Security recommends that computer users disable Java
See this article and this article.
I would recommend that you completely uninstall Java unless you need it to run an important software or need it to play games on-line.
In that instance I would recommend that you only use Firefox or Chrome to visit those sites and do the following:
- For Firefox, install the NoScript add-on.
- For Chrome, install the Script-No add-on.
NOTE: After installing the add-ons you will need to tell them that the site you are visiting is allowed to run Java.
- Disable Java in your browsers until you need it for that software and then enable it. (See How to disable Java in your web browser or How to unplug Java from the browser)
- Click the Start button
- Click Control Panel
- Double Click Java - Looks like a coffee cup. You may have to switch to Classical View on the upper left of the Control Panel to see it.
- Click the Update tab
- Click Update Now
- Allow any updates to be downloaded and installed
- Open Adobe Reader
- Click Help on the menu at the top
- Click Check for Updates
- Allow any updates to be downloaded and installed
NOTE: Many installers offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.
:Make your Internet Explorer more secure:
1. From within Internet Explorer click on the Tools menu and then click on Options.
2. Click once on the Security tab
3. Click once on the Internet icon so it becomes highlighted.
4. Click once on the Custom Level button.
5. Change the Download signed ActiveX controls to "Prompt"
6. Change the Download unsigned ActiveX controls to "Disable"
7. Change the Initialise and script ActiveX controls not marked as safe to "Disable"
8. Change the Installation of desktop items to "Prompt"
9. Change the Launching programs and files in an IFRAME to "Prompt"
10. When all these settings have been made, click on the OK button.
11. If it prompts you as to whether or not you want to save the settings, click the Yes button.
12. Next press the Apply button and then the OK to exit the Internet Properties page.
This webpage is worth bookmarking/reading for future reference:
Securing Your Web Browser
If you use Firefox, I highly recommend these add-ons to keep your PC even more secure.
- NoScript - for blocking ads and other potential website attacks
- WebOfTrust - a safe surfing tool for your browser. Traffic-light rating symbols show which websites you can trust when you search, shop and surf on the Web.
- McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling
- MVPS Hosts file-replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.
Preventative programs that will help to keep the nasties away! We will start with Anti Spyware programs. I would advise getting a couple of them at least, and running a full scan at least once a month. Run Quick Scans at least once a week. Download the Free versions. And update the definitions before running scans.
- Malwarebytes-Free Version- a powerful tool to search for and eliminate malware found on your computer.
- SUPERAntiSpyware Free Edition-another scanning tool to find and eliminate malware.
- SpywareBlaster-to help prevent spyware from installing in the first place. A tutorial can be found here.
- WinPatrol - will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. Help file and tutorial can be found here.
“CryptoLocker” is the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts the files on your computer until you pay a ransom. Some variants encrypt you personal files(MP3s, photos, doc files,ect;). But ither variants encrypy virtually every file, including system files. According to reports from security firms, CryptoLocker is most often spread through booby-trapped email attachments, but the malware also can be deployed by hacked and malicious Web sites by exploiting outdated browser plugins.
Unfortunately, there isn't a way to recover the files short of paying the ransom because the encryption uses 2048-bit RSA keys that would take like a quadrillion years to decrypt.
We haven't seen a lot of the CryptoLocker ransomeware in the wild yet, but if enough people pay the ransom to get their files back it will become more prevelant. You can read more about the CryptoLocker ransomware here
Fortunately there is a program that will help prevent this type of ransomeware and other malware. You should download it and install it now.
Click here to go to the CryptoPrevent web page. You can read about the program. There are also a couple of videos toward the end of the page that show the program in action.
Scroll to the bottom of the page and click the Download "CryptoPrevent Installer" button and download the file to the desktop. Close the browser and all open programs.
Double click the CryptoPreventSetup.exe file to install it.
Right click the CryptoPreventSetup.exe file and click Run as Administrator and OK ant UAC prompts to install the program.
Next, Double click the CryptoPrevent icon on the desktop to run the program.
Next, Right click the Cryptoprevent icon on the desktop and click Run as Administrator and OK any UAC prompt to run the program.
When the program opens make sure all boxes are checked and then click the Block button to apply the protection.
NOTE: I don't think the free version has an update tab so you will need to check the web site from time to time to check for newer versions of the program. Or you can pay a one time fee of $15 and get the Premium Edition which includes an automatic updating function.
It's a good idea to clear out all your temp files every now and again. This will help your computer from bogging down and slowing. It also can assist in getting rid of files that may contain malicious code that could re-infect your computer.
========TEMP File Cleaners========
- TFC by OldTimer-A very powerful cleaning program for 32 and 64 bit OS. Note: You may have this already as part of the fixes you have run.
- CleanUP-Click the Download CleanUP! link. There is also a Learn how to use CleanUP! link on this page.
- Keep a backup of your important files.-Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.
- Tweaking.com's Registry Backup - Download the installer for Registry Backup from the link below and save it to the desktop :
- Click one of the Download buttons under Installer
A tutorial for Registry Backup explaining the various features can be viewed here
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.
A program that will do this is listed below. Download and install the program and run it monthly:
Filehippo Update Checker
Finally, please read How did I get infected in the first place? by Mr. Tony Cline
I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.
IF I have helped you and you want to say "thanks", you can do that by clicking the Rep+ button at the bottom right of this post.
I Will Keep This Open For 24 hours or so. If Anything Comes Up - Just Come Back And Let Me Know
Posted 07 January 2014 - 01:49 PM
Posted 08 January 2014 - 01:38 PM
Posted 08 January 2014 - 01:39 PM
If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.
Everyone else please begin a New Topic.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users