<?xml version="1.0" encoding="iso-8859-1" ?>
<rss version="2.0">
<channel>
	<title>Last 10 Submissions RSS Feed</title>
	<link><![CDATA[https://www.geekstogo.com/forum/index.php?app=downloads&module=search&section=search&do=last_ten]]></link>
	<pubDate>Fri, 06 Dec 2024 22:35:14 +0000</pubDate>
	<ttl>1800</ttl>
	<description>This is the RSS feed of the last ten file submissions accepted into our database.  This RSS feed is always up to date as it is dynamically updated.</description>
	<item>
		<title>KpRm</title>
		<link>https://www.geekstogo.com/forum/files/file/462-kprm/</link>
		<description><![CDATA[<p>KpRm is a tool to use to finalize a disinfection, it removes the following software:<ul class='bbc'><li>AdliceDiag (Tigzy)</li><li>AdminRun (g3n-h@ckm@n)</li><li>AdsFix (g3n-h@ckm@n)</li><li>Ads (g3n-h@ckm@n)</li><li>AdwCleaner (Malwarebytes)</li><li>AHK_NavScan (Batch_Man)</li><li>AlphaDecrypter (Michael Gillespie)</li><li>AswMBR (Avast!Software)</li><li>AuroraDecrypter (Michael Gillespie)</li><li>Autoruns (sysinternals)</li><li>AutorunsVTChecker (regist)</li><li>Avast Decryptor Cryptomix (Avast!Software)</li><li>AVCertClean (fr33tux)</li><li>Avenger (swandog46)</li><li>Avira Registry Cleaner (Avira)</li><li>BitKangarooDecrypter (Michael Gillespie)</li><li>BitStakDecrypter (Michael Gillespie)</li><li>BlitzBlank (Emsisoft)</li><li>BTCWareDecrypter (Michael Gillespie)</li><li>Catchme (Gmer)</li><li>Check Browsers LNK (Alex Dragokas & regist)</li><li>CKScanner (askey127)</li><li>Clean_DNS (g3n-h@ckm@n)</li><li>ClearLNK (Alex Dragokas)</li><li>CMD_Command (g3n-h@ckm@n)</li><li>CoinVaultDecryptor (Kaspersky Labs)</li><li>Combofix (sUBs)</li><li>Crypt38Decrypter (Michael Gillespie)</li><li>CryptON Ransomware Decryptor (Emsisoft)</li><li>CryptoSearch (Michael Gillespie)</li><li>CrystalDiskInfo (portable)</li><li>DCryDecrypter (Michael Gillespie)</li><li>DDS (sUBs)</li><li>Defogger (jpshortstuff)</li><li>Dr Web LiveCD</li><li>EasyRestorePoint (kernel-panik)</li><li>Emsisoft Emergency Kit (Emsisoft)</li><li>ESET AES-NI Decryptor (Eset)</li><li>ESET Bedep Cleaner (Eset)</li><li>ESET Bubnix Cleaner (Eset)</li><li>ESET CodplatAA Cleaner (Eset)</li><li>ESET Conficker Cleaner (Eset)</li><li>ESET Crypt888 Decryptor (Eset)</li><li>ESET Crysis Decryptor (Eset)</li><li>ESET Daonol Cleaner (Eset)</li><li>ESET Dorkbot Cleaner (Eset)</li><li>ESET ELEX Cleaner (Eset)</li><li>ESET Eternal Blue Checker (Eset)</li><li>ESET Filecoder.AA Cleaner (Eset)</li><li>ESET Filecoder.AE Cleaner (Eset)</li><li>ESET Filecoder.AR Cleaner (Eset)</li><li>ESET Filecoder Cleaner (Eset)</li><li>ESET Filecoder.NAC Cleaner (Eset)</li><li>ESET Filecoder.R Cleaner (Eset)</li><li>ESET GandCrab Decoder (Eset)</li><li>ESET Goblin Cleaner (Eset)</li><li>ESET JS/Bondat Fixer (Eset)</li><li>ESET Log Collector (Eset)</li><li>ESET Mabezat Decryptor (Eset)</li><li>ESET Mebroot Cleaner (Eset)</li><li>ESET Medre Cleaner (Eset)</li><li>ESET Necurs.A Cleaner (Eset)</li><li>ESET Olmarik Cleaner (Eset)</li><li>ESET Online Scanner (Eset)</li><li>ESET Poweliks Cleaner (Eset)</li><li>ESET Quervar.C Cleaner (Eset)</li><li>ESET Retacino Cleaner (Eset)</li><li>ESET Retefe Detector (Eset)</li><li>ESET Rogue Applications Remover (Eset)</li><li>ESET Rovnix.A Cleaner (Eset)</li><li>ESET Simda Cleaner (Eset)</li><li>ESET Sirefef Cleaner (Eset)</li><li>ESET SpyEye Cleaner (Eset)</li><li>ESET Spy.Tuscas Cleaner (Eset)</li><li>ESET Spy.Zbot.ZR Cleaner (Eset)</li><li>ESET Superfish Cleaner (Eset)</li><li>ESET SysRescue (Eset)</li><li>ESET TeslaCrypt Decryptor (Eset)</li><li>ESET Trustezeb.A Decoder (Eset)</li><li>ESET VB.NAX Cleaner (Eset)</li><li>ESET VB.OGJ Cleaner (Eset)</li><li>ESET Virlock Cleaner (Eset)</li><li>ESET Zimuse Cleaner (Eset)</li><li>FilesLockerDecrypter (Michael Gillespie)</li><li>FixExec (BleepingComputer)</li><li>FixPurge (McVivien2)</li><li>FRST (Farbar)</li><li>FSS (Farbar)</li><li>GetSystemInfo (Kaspersky Labs)</li><li>GhostCryptDecrypter (Michael Gillespie)</li><li>GIBON Ransomware Decryptor (Michael Gillespie)</li><li>GooredFix (jpshortstuff)</li><li>GrantPerms (Farbar)</li><li>HiddenTear Bruteforcer (Michael Gillespie)</li><li>HiddenTear Decrypter (Michael Gillespie)</li><li>Hosts-perm.bat (BleepingComputer)</li><li>HostsXpert (funkytoad)</li><li>InsaneCryptDecrypter (Michael Gillespie)</li><li>JavaRa (Fred de Vries et Paul McLain)</li><li>Jigsaw Decrypter (Michael Gillespie)</li><li>Junkware Removal Tool (Malwarebytes corporation)</li><li>Kaspersky Live Rescue (Kaspersky Labs)</li><li>Kaspersky Virus Removal Tool (Kaspersky Labs)</li><li>KPLive (kernel-panik)</li><li>KpTemp (kernel-panik)</li><li>ListCWall (BleepingComputer)</li><li>ListParts (Farbar)</li><li>LogOnFix (Xplode)</li><li>Look_my_hardware (g3n-h@ckm@n)</li><li>Malwarebytes (log) (Malwarebytes corporation)</li><li>MBAR (Malwarebytes corporation)</li><li>MBRCheck (a_d_13)</li><li>mbr.exe (Gmer)</li><li>MbrScan (Eric_71)</li><li>McAfee GetSusp (McAfee)</li><li>McAfee Pinkslipbot (McAfee)</li><li>McAfee RootkitRemover (McAfee)</li><li>McAfee Stinger (McAfee)</li><li>McAfee Tesladecrypt (McAfee)</li><li>MicroCop Decryptor (Michael Gillespie)</li><li>Miniregtool (Farbar)</li><li>Minitoolbox (Farbar)</li><li>MKV (El Desaparecido & C_XX)</li><li>Mole02Decryptor (M AV)</li><li>NetAdapter Repair All In One (Conner Bernhard)</li><li>OneClick2RP (Laddy)</li><li>OTA (Old_Timer)</li><li>OTC (Old_Timer)</li><li>OTH (Old_Timer)</li><li>OTL (Old_Timer)</li><li>OTM (Old_Timer)</li><li>OTS (Old_Timer)</li><li>PCHunter (epoolsoft)</li><li>PowerLockyDecrypter (Michael Gillespie)</li><li>Pre_Scan (g3n-h@ckm@n)</li><li>Process Analyzer (g3n-h@ckm@n)</li><li>ProcessClose (g3n-h@ckm@n)</li><li>QuickDiag (g3n-h@ckm@n)</li><li>RakhniDecryptor (Kaspersky Lab)</li><li>Rannoh Decryptor (Kaspersky Lab)</li><li>RansomNoteCleaner (Michael Gillespie)</li><li>RAV (Evosla)</li><li>RegtoolExport (Xplode)</li><li>Remediate VBS Worm (bartblaze)</li><li>Report_Antivir (Laddy)</li><li>Report_CHKDSK (Laddy)</li><li>ResetBrowser (comment-supprimer.com)</li><li>ResetNavigator (SoftwareQuality)</li><li>Rkill (Grinler)</li><li>RogueKiller (Tigzy)</li><li>RogueKiller CMD (Tigzy)</li><li>Rooter (Team IDN)</li><li>RootkitRevealer (Microsoft)</li><li>RstAssociations (Xplode) (scr) (exe)</li><li>RstHosts (Xplode)</li><li>ScanRapide (Lydem)</li><li>Seaf (C_XX)</li><li>SecurityCheck (screen317)</li><li>ServicesRepair (Eset)</li><li>SFTGC (Pierre13)</li><li>ShadeDecryptor (Kaspersky Labs)</li><li>Shortcut Cleaner (BleepingComputer)</li><li>SMBCheck (Webroot)</li><li>StrikedDecrypter (Michael Gillespie)</li><li>StupidDecryptor (Michael Gillespie)</li><li>Symantec Kovter Removal Tool (Symantec)</li><li>Symantec Pasobir Removal Tool (Symantec)</li><li>Symantec Ramnit Removal Tool (Symantec)</li><li>Symantec Tempedreve Removal Tool (Symantec)</li><li>System Information Tool (Tweaking.com)</li><li>SystemLook (jpshortstuff)</li><li>TDSSkiller (Kaspersky Labs)</li><li>TFC (Old_Timer)</li><li>ToolsDiag (Amesam)</li><li>UAC-LEVEL (Amesam)</li><li>UAC Manager (Xplode)</li><li>UnHide (BleepingComputer)</li><li>Unlock92Decrypter (Michael Gillespie)</li><li>UnZacMe (g3n-h@ckm@n)</li><li>Usb File Resc (Streuner Corporation)</li><li>UsbFix (El desaparecido & C_XX)</li><li>Webroot DE-BUG (Webroot)</li><li>WildfireDecryptor (Kaspersky Labs)</li><li>WinChk (Xplode)</li><li>Windows Repair All In One (portable) (Tweaking.com)</li><li>WinsockAnalyzer (Xplode)</li><li>WinUpdatefix (Xplode)</li><li>XoristDecryptor (Kaspersky Labs)</li><li>ZHPCleaner (Nicolas Coolman)</li><li>ZHPDiag (Nicolas Coolman)</li><li>ZHPFix (Nicolas Coolman)</li><li>ZHPLite (Nicolas Coolman)</li><li>ZHPSuite (Nicolas Coolman)</li><li>Zoek (Smeenk)</li></ul>The search for executables downloaded by the user is only performed in the Desktop and the download folder. To respect Nicolas Coolman's choice, the quarantine of ZHP tools located under AppData\ZHP is no longer deleted, however a line in the report indicates its presence. It is now possible since version 2.0 to choose whether to delete quarantines directly, delete them in 7 days or not delete them at all. A new feature allows you to detect tools and choose which files/keys will be deleted.<br /><a href='https://github.com/KernelPan1k/KpRm/blob/master/screenshots/automatic.png' class='bbc_url' title='External link' rel='nofollow external'><img class='bbc_img' src='https://github.com/KernelPan1k/KpRm/raw/master/screenshots/automatic.png' alt='Posted Image'  /></a><br /><a href='https://github.com/KernelPan1k/KpRm/blob/master/screenshots/custom.png' class='bbc_url' title='External link' rel='nofollow external'><img class='bbc_img' src='https://github.com/KernelPan1k/KpRm/raw/master/screenshots/custom.png' alt='Posted Image'  /></a><br />&#160;<br /><strong class='bbc'>- Save the registry</strong><br />To restore hives easily, it is possible to use KPLive: <a href='https://github.com/KernelPan1k/KpLive' class='bbc_url' title='External link' rel='nofollow external'>https://github.com/KernelPan1k/KpLive</a> - Delete recovery points - Create a restore point - Restore system settings<ul class='bbc'><li>Reset DNS cache</li><li>Reset the WinSock catalog</li><li>Hide hidden files</li><li>Hide protected files</li><li>Show known file extensions</li></ul>&#160;<br /><strong class='bbc'>- Restore the UAC</strong><ul class='bbc'><li>ConsentPromptBehaviorAdmin (5)</li><li>ConsentPromptBehaviorUser (3)</li><li>EnableInstallerDetection (0)</li><li>EnableLUA (1)</li><li>EnableSecureUIAPaths (1)</li><li>EnableUIADesktopToggle (0)</li><li>EnableVirtualization (1)</li><li>FilterAdministratorToken (0)</li><li>PromptOnSecureDesktop (1)</li><li>ValidateAdminCodeSignatures (0)</li></ul>&#160;<br />Project website: <a href='https://kernel-panik.me/tool/kprm/' class='bbc_url' title='External link' rel='nofollow external'>https://kernel-panik.me/tool/kprm/</a><br />Source code: <a href='https://github.com/KernelPan1k/KpRm' class='bbc_url' title='External link' rel='nofollow external'>https://github.com/KernelPan1k/KpRm</a><br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;<br />&#160;</p>]]></description>
		<pubDate>Sat, 15 Jun 2019 12:40:23 +0000</pubDate>
		<guid isPermaLink="false">462</guid>
	</item>
	<item>
		<title>WVCheck.exe</title>
		<link>https://www.geekstogo.com/forum/files/file/452-wvcheckexe/</link>
		<description><![CDATA[<p>Windows Validation Check (WVCheck) is a tool to find out if the user is using a legit version of windows.<br />
The tool will check when Windows Updates last detected new updates,<br />
when the user has downloaded them and installed them,<br />
unless of course they have turned it off (Could indicate a pirated OS).<br />
&#160;<br />
WVCheck is pretty straight forward. You run the program,<br />
it tells you to wait, and it will open a notepad file to the user that they can post on the forum for the helper to inspect.<br />
&#160;<br />
Supports XP, Windows 7, Windows 8, Windows 8.1, Windows 10</p>]]></description>
		<pubDate>Fri, 04 Mar 2016 18:31:16 +0000</pubDate>
		<guid isPermaLink="false">452</guid>
	</item>
	<item>
		<title>Remediate VBS Worm</title>
		<link>https://www.geekstogo.com/forum/files/file/451-remediate-vbs-worm/</link>
		<description><![CDATA[<p><strong class='bbc'><span  style='font-size: 8px'><span  style='font-size: 14px'><span class='bbc_underline'><span  style='font-family: inherit'>You can use this to remedy the following malware:</span></span></span></span></strong><br />&#160;<ul class='bbc'><li>Bladabindi</li><li><span  style='font-family: inherit'>Excedow </span></li><li><span  style='font-family: inherit'>Jenxcus</span></li><li><span  style='font-family: inherit'>Houdini/Dinihu</span></li><li><span  style='font-family: inherit'>Autorun worms</span></li><li><span  style='font-family: inherit'>Any other VBS (VBScript) or VBE&#160;malware</span></li><li><span  style='font-family: inherit'>Any other malware that abuses the WSH (Windows Script Host)</span></li></ul>&#160;<br /><span  style='font-size: 18px'><span class='bbc_underline'><strong class='bbc'>Instructions:</strong></span></span><br />&#160;<br />You should run the script in the following sequence, at least on a normal machine:<br /><strong class='bbc'>Plug in your infected USB </strong>(if any)<strong class='bbc'> and choose A, then B and afterwards C.</strong><br />After these steps, perfo<span  style='font-family: inherit'>rm a fu</span>ll scan with your installed antivirus product or perform an online scan.<br />&#160;<br /><span  style='font-family: inherit'>Some tips and tricks:</span><br />&#160;<ul class='bbc'><li><span  style='font-family: inherit'>Using option <strong class='bbc'>A</strong>, the tool will attempt to clean the infection. It will also fix any registry changes made by the malware. (for example it will re-enable Task Manager should it be disabled).</span></li></ul><ul class='bbc'><li><span  style='font-family: inherit'><span  style='color: #FF0000'><strong class='bbc'>!</strong></span> When you use option <strong class='bbc'>B</strong>, be sure to type only the letter of your USB drive!<br />
So if you have a USB drive named <em class='bbc'>G:\</em>, you should only type <em class='bbc'>G</em><br />
This option will eradicate any related malware on the USB drive, as well as unhide your files (make them visible again).</span></li><li><span  style='font-family: inherit'>With <span  style='font-family: inherit'>option <strong class='bbc'>C </strong>you can download Panda USB Vaccine to prevent any oth<span  style='font-family: inherit'>er a<span  style='font-family: inherit'>utorun malware entering your computer.</span></span></span></span></li><li><span  style='font-family: inherit'><span  style='font-family: inherit'><span  style='font-family: inherit'><span  style='font-family: inherit'><span  style='font-family: inherit'>With option <strong class='bbc'>D </strong>you have the possibility to <span  style='font-family: inherit'>disable or re-enable the Windows Script Host (WSH), <span  style='font-family: inherit'>to <span  style='font-family: inherit'>prevent any malware abusing it.</span></span></span></span>&#160;</span></span></span> </span></li></ul><ul class='bbc'><li><span  style='font-family: inherit'>I advise to end the script with <strong class='bbc'>Q</strong> as to ensure proper logfile closing. A logfile will open automatically, but is also created by default on the C:\ drive. (<em class='bbc'>C:\Rem-VBS.log</em>)</span></li></ul><ul class='bbc'><li><span  style='font-family: inherit'>When the tool is running, do not use the machine for anything else.<br />
(it takes about 30 seconds to run)</span></li><li><span  style='font-family: inherit'>If VBS malware is found, it will be automatically removed and a copy will be placed at&#160;</span><em class='bbc'>C:\Rem-VBSqt.</em></li></ul><ul class='bbc'><li><span  style='font-family: inherit'>Accidentally used an option and want to exit the script? Use <strong class='bbc'>CTRL + C</strong> to stop it.</span></li></ul>&#160;<br />&#160;<br /><span  style='font-family: inherit'>More information can be found on my blog post:<br /><a href='http://bartblaze.blogspot.com/2014/02/remediate-vbs-malware.html' class='bbc_url' title='External link' rel='nofollow external'>http://bartblaze.blo...bs-malware.html</a></span><br /><a href='http://www.twitter.com/bartblaze' class='bbc_url' title='External link' rel='nofollow external'>@bartblaze</a><br />&#160;</p>]]></description>
		<pubDate>Mon, 11 Jan 2016 16:34:59 +0000</pubDate>
		<guid isPermaLink="false">451</guid>
	</item>
	<item>
		<title>Speakonia</title>
		<link>https://www.geekstogo.com/forum/files/file/446-speakonia/</link>
		<description><![CDATA[<p>A free Text to Speech application.</p>]]></description>
		<pubDate>Thu, 28 May 2015 20:39:55 +0000</pubDate>
		<guid isPermaLink="false">446</guid>
	</item>
	<item>
		<title>TDSSKiller</title>
		<link>https://www.geekstogo.com/forum/files/file/445-tdsskiller/</link>
		<description><![CDATA[A rootkit is a program or a program kit that hides the presence of malware in the system.<br /><br />A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain invisible).<br /><br /><br />Kaspersky Lab has developed the TDSSKiller which allows removing rootkits. TDSSKiller will scan your system in only about 15 seconds.<br /><br /><strong class='bbc'>How to use TDSSKiller</strong><ul class='bbcol decimal'><li>Doubleclick on <strong class='bbc'>TDSSKiller.exe</strong> to run the application, then click on <strong class='bbc'>Change parameters</strong>.<br />
<span rel='lightbox'><img class='bbc_img' src='http://i466.photobucket.com/albums/rr21/JSntgRvr/tdss_1.jpg' alt='Posted Image'  /></span></li><li>Check the boxes beside <strong class='bbc'>Verify Driver Digital Signature and Detect TDLFS</strong> file system, then click OK.<br />
<span rel='lightbox'><img class='bbc_img' src='http://i466.photobucket.com/albums/rr21/JSntgRvr/tdss_2.jpg' alt='Posted Image'  /></span></li><li>Click the <strong class='bbc'>Start Scan</strong> button.<br />
<span rel='lightbox'><img class='bbc_img' src='http://i466.photobucket.com/albums/rr21/JSntgRvr/tdss_3.jpg' alt='Posted Image'  /></span></li><li>If a suspicious object is detected, the default action will be <strong class='bbc'>Skip</strong>, click on <strong class='bbc'>Continue</strong>.<br />
<span rel='lightbox'><img class='bbc_img' src='http://i466.photobucket.com/albums/rr21/JSntgRvr/tdss_4.jpg' alt='Posted Image'  /></span></li><li>If malicious objects are found, they will show in the Scan results and offer three (3) options.</li><li>Ensure <strong class='bbc'>Cure</strong> is selected, then click <strong class='bbc'>Continue</strong> =&gt; <strong class='bbc'>Reboot now</strong> to finish the cleaning process.<br />
<span rel='lightbox'><img class='bbc_img' src='http://i466.photobucket.com/albums/rr21/JSntgRvr/tdss_5.jpg' alt='Posted Image'  /></span></li><li>Note: <span  style='color: #FF0000'><strong class='bbc'>If <span  style='color: #0000FF'>Cure</span> is not available, please choose Skip instead, do not choose <span  style='color: #0000FF'>Delete</span> unless instructed.</strong></span></li></ul>A report will be created in your root directory, (usually C:\ folder) in the form of <strong class='bbc'>"TDSSKiller.[Version]_[Date]_[Time]_log.txt"</strong>.]]></description>
		<pubDate>Mon, 30 Mar 2015 16:09:25 +0000</pubDate>
		<guid isPermaLink="false">445</guid>
	</item>
	<item>
		<title>SecurityCheck</title>
		<link>https://www.geekstogo.com/forum/files/file/444-securitycheck/</link>
		<description><![CDATA[<p>SecurityCheck is a program that searches for installed and running security programs on a user's computer. After it is finished, SecurityCheck will then display a log file that contains information about the security programs found on your computer and the status of security services such as Windows Firewall.</p><p>&nbsp;</p><p><strong class='bbc'>How to use Security Check by Screen317:</strong><ul class='bbc'><li>Right-click on <span rel='lightbox'><img class='bbc_img' src='https://sites.google.com/site/cannedfixes/security-check/51c9d14017fa0-SecurityCheck.PNG' alt='Posted Image'  /></span> icon and select <span rel='lightbox'><img class='bbc_img' src='https://sites.google.com/site/cannedfixes/home/hosted-images-tools/RunAsAdmin.jpg' alt='Posted Image'  /></span><strong class='bbc'> Run as Administrator</strong> to start the tool.</li><li>Follow onscreen instructions inside the black box. This scan won't take long.</li><li>Soon a notepad document called <strong class='bbc'>checkup.txt</strong> will open automaticaly.</li></ul></p>]]></description>
		<pubDate>Sat, 28 Mar 2015 21:29:59 +0000</pubDate>
		<guid isPermaLink="false">444</guid>
	</item>
	<item>
		<title>WinUpdateFix</title>
		<link>https://www.geekstogo.com/forum/files/file/443-winupdatefix/</link>
		<description><![CDATA[<strong class='bbc'>WinUpdateFix</strong> is a tool that is able to fix some problems linked to Windows Update.<br />You can reboot essentials services of Windows Update if they are disabled. You can also restore some parameters, and create a logfile to get more informations.]]></description>
		<pubDate>Fri, 27 Mar 2015 18:56:51 +0000</pubDate>
		<guid isPermaLink="false">443</guid>
	</item>
	<item>
		<title>AdwCleaner</title>
		<link>https://www.geekstogo.com/forum/files/file/442-adwcleaner/</link>
		<description><![CDATA[AdwCleaner is a free removal tool for:<ul class='bbc'><li>Adware</li><li>PUP/LPI</li><li>Toolbars</li><li>Browser Hijackers</li></ul>]]></description>
		<pubDate>Fri, 27 Mar 2015 18:35:08 +0000</pubDate>
		<guid isPermaLink="false">442</guid>
	</item>
	<item>
		<title>MBRCheck</title>
		<link>https://www.geekstogo.com/forum/files/file/441-mbrcheck/</link>
		<description><![CDATA[How to use <strong class='bbc'>MBRCheck</strong>:<ul class='bbc'><li>Be sure to disable your security programs</li><li>Double click on the file to run it (Vista and Windows 7 users will have to confirm the UAC prompt)</li><li>A small window should open on your desktop</li><li>if an unknown bootcode is found you will have further options available to you, at this time press <strong class='bbc'>N</strong> then press <strong class='bbc'><em class='bbc'>Enter</em></strong> twice.</li><li>If nothing unusual is found just press <strong class='bbc'><em class='bbc'>Enter</em></strong></li><li>A .txt file named MBRCheck_mm.dd.yy_hh.mm.ss should appear on your deskop. Please post the contents of that file.</li></ul>]]></description>
		<pubDate>Thu, 05 Mar 2015 18:17:28 +0000</pubDate>
		<guid isPermaLink="false">441</guid>
	</item>
	<item>
		<title>RootRepeal</title>
		<link>https://www.geekstogo.com/forum/files/file/440-rootrepeal/</link>
		<description><![CDATA[<strong class='bbc'>Information</strong><br />&#160;<br /><strong class='bbc'>RootRepeal</strong> is a new rootkit detector currently in public beta.&#160; It is designed with the following goals in mind:<ul class='bbcol decimal'><li>Easy to use - a user with little to no computer experience should be able to use it.</li><li>Powerful - it should be able to detect all publicly available rootkits.</li><li>Stable - it should work on as many different system configurations as possible, and, in the event of an incompatibility, not crash the host computer.</li><li>Safe - it will not use any rootkit-like techniques (hooking, etc.) to protect itself.</li></ul>Currently, RootRepeal includes the following features:<ul class='bbcol decimal'><li>Driver Scan - scans the system for kernel-mode drivers.&#160; Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver's file is visible on-disk.</li><li>Files Scan - scans any fixed drive on the system for hidden, locked or falsified* files.</li><li>Processes Scan - scans the system for processes.&#160; Displays all processes currently running, and shows if a processes is hidden or locked.</li><li>SSDT Scan - shows whether any of the functions in the System Service Descriptor Table (SSDT) are hooked.</li><li>Stealth Objects Scan - attempts to determine if any rootkits are active by looking for typical symptoms.</li><li>Hidden Services Scan - scans for hidden system services.</li><li>Shadow SSDT Scan - counterpart to the SSDT Scan, but deals mostly with graphics and window-related functions.</li></ul>* - falsified files are files which have their size mis-reported to the Windows API.&#160; Some rootkits use this to hide data.<br />&#160;<br />RootRepeal is currently in public beta.&#160; Whereas every effort has been made to ensure compatibility with every system configuration on Windows 2000, XP, 2003 and Vista, it cannot be guaranteed.&#160; There is always some risk when scanning for rootkits.&#160; Before running RootRepeal, please make sure you have backups of all important data and have saved all open documents.<br />&#160;<br /><strong class='bbc'>Frequently Asked Questions</strong><br />Question: What is a rootkit?<br />Answer: A rootkit is a set of tools or a program that is designed to hide activity on a computer (legitimate or otherwise).&#160; A rootkit in itself is not malicious - many antivirus programs and some games (for example, nProtect GameGuard) use rootkit-like technology to hide or protect themselves.&#160; RootRepeal does not target any specific product or malware, but simply identifies rootkit-like activity on a computer and leaves the decision of what is malware or not to the user.&#160; For more information, please refer to the Wikipedia entry on rootkits here.<br />&#160;<br />Question: How do I install/run RootRepeal?<br />Answer: Simply run RootRepeal.exe by double-clicking on it.&#160; No installation is necessary.<br />&#160;<br />Question: How do I uninstall RootRepeal?<br />Answer: Delete RootRepeal.exe and (optionally) settings.dat, and reboot.&#160; RootRepeal is completely self-contained and no uninstallation is necessary.<br />&#160;<br />Question: How do I know if I have a rootkit?<br />Answer: Run a system scan using the "Report" tab, and send the log to an expert for analysis.&#160; Some good resources are the forums at Sysinternals here, and the GeeksToGo forums here.&#160; If you are unsure if something is a rootkit, DO NOT DELETE IT!<br />&#160;<br />Question: Does RootRepeal contain any malware/spyware/adware/other bad stuff?<br />Answer: Absolutely not!&#160; However, some Antivirus products may flag RootRepeal as malware because it is packed (compressed).&#160; See the VirusTotal link in the Download section for more information.<br />&#160;<br />Question: What is the SSDT?&#160; Why is it important?<br />Answer: The SSDT is a table that stores addresses of functions that are used by Windows.&#160; Whenever a certain type of function is called, Windows looks in this table to find the address for it.&#160; However, a lot of rootkits and some legitimate software hooks this table, redirecting these requests.&#160; This type of hooking can be used to hide just about anything on Windows.<br />&#160;<br />Question: What is a "system service"?<br />Answer: System service are a type of program that starts whenever Windows does.&#160; Most rootkits are started as a system service.&#160; Some rootkits attempt to hide these services so that a user cannot see them.<br />&#160;<br />Question: What is the "Disk Access Level"?&#160; Why is it important?<br />Answer: The disk access level controls how RootRepeal reads the disk to perform the Files and Hidden Services scan.&#160; If you experience a crash or unpredictable results when using either of those scans, please change the Disk Access Level to another level in the options dialog.&#160; The default level is recommended for most users.&#160; If you suspect that you have the MBR rootkit, you may want to change the level to the lowest possible level and run another scan.<br />&#160;<br /><strong class='bbc'>System Requirements</strong><br />Microsoft&#174; Windows 2008 Server; Windows Vista&#174;; Windows XP Professional or Home Edition; Windows 2000 with Service Pack 4; Windows 2003 Server<br />Note: Only x86 versions of Windows are supported.<br />128MB of RAM.<br />600KB of hard-drive space.<br />&#160;<br /><a href='https://sites.google.com/site/rootrepeal/' class='bbc_url' title='External link' rel='nofollow external'>https://sites.google...ite/rootrepeal/</a>]]></description>
		<pubDate>Thu, 05 Mar 2015 18:03:09 +0000</pubDate>
		<guid isPermaLink="false">440</guid>
	</item>
</channel>
</rss>