[dba-Tech] How to remove Malware

Jim Lawrence accessd at shaw.ca
Sat Feb 16 20:04:58 CST 2013


Hi Hans:

This may be true but how many serious hackers or government agencies are
going to target some old aunt or small business? The type of hacker alluded
to in the article are bottom feeders...penny-anti type crooks.

They may know all the registry hacks, boot-up run-time scripts and maybe a
SMTP call or two that is it. It would not take long for any tech, in the
business, to see what level of infection the client has been injured with
and be able to decide on the appropriate exorcism. 

Rest assured ninety-nine percent of malware falls within the nuisance
category...easy for most techs to remove.

That one percent left that might require a re-image. I doubt whether most
techs have even seen the type of major attacks and system corruption you are
describing. Real attackers make it their business not to be discovered. 

Jim     

-----Original Message-----
From: dba-tech-bounces at databaseadvisors.com
[mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian
Andersen
Sent: Saturday, February 16, 2013 4:21 PM
To: Discussion of Hardware and Software issues
Subject: Re: [dba-Tech] How to remove Malware

What part of what I said was paranoid? Rootkits are oldhat by now and cyber
attacks are so sophisticated that it can be customised to target a specific
facility half way across the world that isn't even connected to the internet
(aka. sneakernet)... and you call it paranoid? Do you follow security news?
:p

- Hans



On 2013-02-16, at 4:02 PM, "John Bartow" <john at winhaven.net> wrote:

> Let's just throw our arms and the air and give up! Wow, not really buying
> into that paranoia.
> 
> -----Original Message-----
> From: dba-tech-bounces at databaseadvisors.com
> [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian
> Andersen
> Sent: Saturday, February 16, 2013 3:32 PM
> To: Discussion of Hardware and Software issues
> Subject: Re: [dba-Tech] How to remove Malware
> 
> I wouldn't trust a compromised system as far as I can try it, even if I
did
> try to remove the malware. The bad guys are far more advanced than we are.
> Format and reinstall is usually the quicker and best option.
> 
> - Hans
> 
> 
> On 2013-02-16, at 10:55 AM, "Jim Lawrence" <accessd at shaw.ca> wrote:
> 
>> Hi All:
>> 
>> Many people depend on their various security software packages to 
>> detect and destroy all threats. When a user has done something really 
>> stupid and a piece of malware has secured itself within their OS what 
>> steps do you take to remove it?
>> 
>> Over the years I would suspect that you, techs have done much of this 
>> type work already but here is a concise little article on the step by 
>> step removal and recovery process.
>> 
>> http://blogs.technet.com/b/markrussinovich/archive/2013/01/07/3543763.
>> aspx
>> 
>> Hope this helps someone.
>> Jim
>> 
>> _______________________________________________
>> dba-Tech mailing list
>> dba-Tech at databaseadvisors.com
>> http://databaseadvisors.com/mailman/listinfo/dba-tech
>> Website: http://www.databaseadvisors.com
> 
> _______________________________________________
> dba-Tech mailing list
> dba-Tech at databaseadvisors.com
> http://databaseadvisors.com/mailman/listinfo/dba-tech
> Website: http://www.databaseadvisors.com
> 
> _______________________________________________
> dba-Tech mailing list
> dba-Tech at databaseadvisors.com
> http://databaseadvisors.com/mailman/listinfo/dba-tech
> Website: http://www.databaseadvisors.com


_______________________________________________
dba-Tech mailing list
dba-Tech at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/dba-tech
Website: http://www.databaseadvisors.com



More information about the dba-Tech mailing list