[ale] [OT] Databases of viruses/malware

Ron Frazier atllinuxenthinfo at c3energy.com
Wed Mar 2 20:58:02 EST 2011


The problem is, you may never know if the remedy failed. If the virus 
returns in a mutated form, or in rootkit form, it may not show any 
evidence of it's presence until you boot another OS and scan again, 
which may be weeks or months or never. In my opinion, if a machine is 
compromised, the only way I can trust it again with confidential data, 
for sure, is to wipe the drive.

Ron

On 03/02/2011 08:38 PM, JD wrote:
> On 03/02/2011 03:30 PM, Randy Ramsdell wrote:
>    
>> Ron Frazier wrote:
>>      
>>> Hi Mike,
>>>
>>> I'm not a virus expert, but here are some resources I've come across in
>>> my reading and listening to virus related news over the years.
>>>
>>>        
>> My god man, you really know that much about windows virus and cleaning
>> methods.
>>
>> Short and simple.
>> 1. Run AV software and choose to remove virus.
>> 2. Go back to working on something important.
>>      
> 95% of all MS-Windows viruses, maybe more, can be cleaned by removing
> the HDD from the problem system and connecting it to a different machine
> with updated AV signatures and/or access to an online scanner. The key
> is to take the running virus out of the running OS.  Only if that fails
> would I rebuild the system from known good system images and restore
> backups of critical data.
>
>    

-- 

(PS - If you email me and don't get a quick response, you might want to
call on the phone.  I get about 300 emails per day from alternate energy
mailing lists and such.  I don't always see new messages very quickly.)

Ron Frazier

770-205-9422 (O)   Leave a message.
linuxdude AT c3energy.com



More information about the Ale mailing list