Jim Lawrence
accessd at shaw.ca
Sat Feb 16 20:04:58 CST 2013
Hi Hans: This may be true but how many serious hackers or government agencies are going to target some old aunt or small business? The type of hacker alluded to in the article are bottom feeders...penny-anti type crooks. They may know all the registry hacks, boot-up run-time scripts and maybe a SMTP call or two that is it. It would not take long for any tech, in the business, to see what level of infection the client has been injured with and be able to decide on the appropriate exorcism. Rest assured ninety-nine percent of malware falls within the nuisance category...easy for most techs to remove. That one percent left that might require a re-image. I doubt whether most techs have even seen the type of major attacks and system corruption you are describing. Real attackers make it their business not to be discovered. Jim -----Original Message----- From: dba-tech-bounces at databaseadvisors.com [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian Andersen Sent: Saturday, February 16, 2013 4:21 PM To: Discussion of Hardware and Software issues Subject: Re: [dba-Tech] How to remove Malware What part of what I said was paranoid? Rootkits are oldhat by now and cyber attacks are so sophisticated that it can be customised to target a specific facility half way across the world that isn't even connected to the internet (aka. sneakernet)... and you call it paranoid? Do you follow security news? :p - Hans On 2013-02-16, at 4:02 PM, "John Bartow" <john at winhaven.net> wrote: > Let's just throw our arms and the air and give up! Wow, not really buying > into that paranoia. > > -----Original Message----- > From: dba-tech-bounces at databaseadvisors.com > [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian > Andersen > Sent: Saturday, February 16, 2013 3:32 PM > To: Discussion of Hardware and Software issues > Subject: Re: [dba-Tech] How to remove Malware > > I wouldn't trust a compromised system as far as I can try it, even if I did > try to remove the malware. The bad guys are far more advanced than we are. > Format and reinstall is usually the quicker and best option. > > - Hans > > > On 2013-02-16, at 10:55 AM, "Jim Lawrence" <accessd at shaw.ca> wrote: > >> Hi All: >> >> Many people depend on their various security software packages to >> detect and destroy all threats. When a user has done something really >> stupid and a piece of malware has secured itself within their OS what >> steps do you take to remove it? >> >> Over the years I would suspect that you, techs have done much of this >> type work already but here is a concise little article on the step by >> step removal and recovery process. >> >> http://blogs.technet.com/b/markrussinovich/archive/2013/01/07/3543763. >> aspx >> >> Hope this helps someone. >> Jim >> >> _______________________________________________ >> dba-Tech mailing list >> dba-Tech at databaseadvisors.com >> http://databaseadvisors.com/mailman/listinfo/dba-tech >> Website: http://www.databaseadvisors.com > > _______________________________________________ > dba-Tech mailing list > dba-Tech at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/dba-tech > Website: http://www.databaseadvisors.com > > _______________________________________________ > dba-Tech mailing list > dba-Tech at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/dba-tech > Website: http://www.databaseadvisors.com _______________________________________________ dba-Tech mailing list dba-Tech at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/dba-tech Website: http://www.databaseadvisors.com