New
#31
@dranfu
Please read the forum rules, particularly number 2. No posting of any kind of malicious content, links, etc.
https://www.sevenforums.com/general-d...ease-read.html
@dranfu
Please read the forum rules, particularly number 2. No posting of any kind of malicious content, links, etc.
https://www.sevenforums.com/general-d...ease-read.html
@ Airbot,
I was wondering why that post got deleted. Also, I''m pretty sure that site does not have malicious content (besides programmatic examples of malicious code) , it was just a warning to readers, just in case. Was it the code or the link that was the problem?
Both. For the safety of members and guests alike, please follow the rule which is quite self explanatory. No exceptions.
I am here and can't believe how much information there is. I greatly appreciate all of it and will be spending my weekend working on this issue.
Meh... Don't spend your entire weekend on it. It's a waste of a weekend.
While I may not agree with some of the people here, they have valid points on the whole re-image your system for expediency. I am one who prefers to repair mostly because it is part of my job at times to recover stuff and two, when you put in the effort to setup a system and sometimes not have the freshest image or an image at all (And I do now image my system)... I find some people prefer keeping what they can as much as they can. Depending on the environment you are in and the kind of procedures you put into place, there are always options in how to handle things.
What is more important is knowing how to identify the situation and what your options are. In a nice corporate environment and having lots of space and backup and actual imaging tools available, re-imaging is the fastest way to get back up and running. If you don't have that ability, and you don't want to rebuild (As sometimes, reinstalling everything is as often times more painful than just cleaning out...) Knowing how to get rid of it helps.
The one thing both sides will harp though is to look at better means to mitigate an infection... Script blockers and firewall settings being the foremost, but simply being user aware in general, as the best counter-antivirus methodology hackers rely on is the ignorance of the user.
So true, so true, so true.but simply being user aware in general, as the best counter-antivirus methodology hackers rely on is the ignorance of the user.