InterviewSolution
Saved Bookmarks
| 1. |
Solve : PAGE REDIRECT VIRUS???? |
|
Answer» DOWNLOAD this << file >> & extract TDSSKiller.exe onto your Desktop Then create this batch file to be placed next to TDSSKiller ===== Open NOTEPAD.exe and copy/paste the text in the quotebox below into it: Code: [Select]@ECHO OFF START /WAIT TDSSKILLER.exe -l Logit.txt -v START Logit.txt del %0Save this as fix.bat Choose to "Save type as - All Files" It should look like this: Double click on fix.bat & allow it to run Post back to tell me what it saysThanks DMJ for getting back to me I know your a busy guy, I have the log it appears to have found something and I'm sending a SCREEN SHOT of what it did before I had to rebbot my comp. I haven't checked to see if the problem presist(try any search engine), I'll wait till you tell me. MODIFIED:On second thought I tried my search engines and they are working and alot faster, so I'll just wait till you tell me my next scan and clean-up options. ------------------------------------------------------------------------------------------------------------- 23:31:37:467 3088TDSS rootkit removing tool 2.2.3 Feb 4 2010 14:34:00 23:31:37:467 3088================================================================================ 23:31:37:467 3088SystemInfo: 23:31:37:467 3088OS Version: 6.0.6002 ServicePack: 2.0 23:31:37:467 3088Product type: Workstation 23:31:37:467 3088ComputerName: J-BIRD-PC 23:31:37:468 3088UserName: J-BIRD 23:31:37:468 3088Windows directory: C:\Windows 23:31:37:468 3088Processor architecture: Intel x86 23:31:37:468 3088Number of processors: 2 23:31:37:468 3088Page size: 0x1000 23:31:37:471 3088Boot type: Normal boot 23:31:37:471 3088================================================================================ 23:31:37:475 3088ForceUnloadDriverW: Old driver(klmd21) unloaded successfully 23:31:38:098 3088MyNtCreateFileW: NtCreateFile(\??\C:\Windows\system32\drivers\klmd.sys) returned status 00000000 23:31:38:109 3088UtilityInit: KLMD drop and load success 23:31:38:109 3088KLMD_OpenDevice: Trying to open KLMD Device(KLMD201010) 23:31:38:109 3088UtilityInit: KLMD open success 23:31:38:109 3088UtilityInit: Initialize success 23:31:38:109 3088 23:31:38:110 3088ScanningServices ... 23:31:38:110 3088CreateRegParser: Registry parser init started 23:31:38:110 3088CreateRegParser: DisableWow64Redirection error 23:31:38:110 3088wfopen_ex: Trying to open file C:\Windows\system32\config\system 23:31:38:110 3088MyNtCreateFileW: NtCreateFile(\??\C:\Windows\system32\config\system) returned status C0000043 23:31:38:110 3088wfopen_ex: MyNtCreateFileW error 32 (C0000043) 23:31:38:110 3088wfopen_ex: Trying to KLMD file open 23:31:38:111 3088KLMD_CreateFileW: Trying to open file C:\Windows\system32\config\system 23:31:38:111 3088wfopen_ex: File opened ok (Flags 2) 23:31:38:134 3088CreateRegParser: HIVE_ADAPTER(C:\Windows\system32\config\system) init success: 1BA1290 23:31:38:134 3088wfopen_ex: Trying to open file C:\Windows\system32\config\software 23:31:38:134 3088MyNtCreateFileW: NtCreateFile(\??\C:\Windows\system32\config\software) returned status C0000043 23:31:38:134 3088wfopen_ex: MyNtCreateFileW error 32 (C0000043) 23:31:38:134 3088wfopen_ex: Trying to KLMD file open 23:31:38:134 3088KLMD_CreateFileW: Trying to open file C:\Windows\system32\config\software 23:31:38:134 3088wfopen_ex: File opened ok (Flags 2) 23:31:38:134 3088CreateRegParser: HIVE_ADAPTER(C:\Windows\system32\config\software) init success: 1BA12B8 23:31:38:134 3088CreateRegParser: EnableWow64Redirection error 23:31:38:135 3088CreateRegParser: RegParser init completed 23:31:39:136 3088GetAdvancedServicesInfo: Raw services enum returned 436 services 23:31:39:280 3088fclose_ex: Trying to close file C:\Windows\system32\config\system 23:31:39:280 3088fclose_ex: Trying to close file C:\Windows\system32\config\software 23:31:39:280 3088 23:31:39:281 3088ScanningKernel memory ... 23:31:39:281 3088KLMD_GetSystemObjectAddressByNameW: Trying to get system object address by name \Driver\Disk 23:31:39:281 3088DetectCureTDL3: \Driver\Disk PDRIVER_OBJECT: 84FDDB00 23:31:39:281 3088DetectCureTDL3: KLMD_GetDeviceObjectList returned 2 DevObjects 23:31:39:281 3088 23:31:39:281 3088DetectCureTDL3: DEVICE_OBJECT: 8DB467A8 23:31:39:281 3088KLMD_GetLowerDeviceObject: Trying to get lower device object for 8DB467A8 23:31:39:281 3088DetectCureTDL3: DEVICE_OBJECT: 8DB302E8 23:31:39:281 3088KLMD_GetLowerDeviceObject: Trying to get lower device object for 8DB302E8 23:31:39:281 3088KLMD_ReadMem: Trying to ReadMemory 0x8DB302E8[0x38] 23:31:39:281 3088DetectCureTDL3: DRIVER_OBJECT: 85AA2F38 23:31:39:281 3088KLMD_ReadMem: Trying to ReadMemory 0x85AA2F38[0xA8] 23:31:39:282 3088KLMD_ReadMem: Trying to ReadMemory 0x85AB2E48[0x1C] 23:31:39:282 3088DetectCureTDL3: DRIVER_OBJECT name: \Driver\RTSTOR, Driver Name: RTSTOR 23:31:39:282 3088DetectCureTDL3: IrpHandler (0) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (1) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (2) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (3) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (4) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (5) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (6) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (7) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler ( addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (9) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (10) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (11) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (12) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (13) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (14) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (15) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (16) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (17) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (18) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (19) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (20) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (21) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (22) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (23) addr: 8ACDB30E 23:31:39:282 3088DetectCureTDL3: IrpHandler (24) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (25) addr: 81C409D2 23:31:39:282 3088DetectCureTDL3: IrpHandler (26) addr: 81C409D2 23:31:39:282 3088KLMD_ReadMem: Trying to ReadMemory 0x8ACD9C94[0x400] 23:31:39:283 3088TDL3_StartIoHookDetect: CheckParameters: 0, 00000000, 0 23:31:39:283 3088TDL3_FileDetect: Processing driver: RTSTOR 23:31:39:283 3088TDL3_FileDetect: Processing driver file: C:\Windows\system32\drivers\RTSTOR.SYS 23:31:39:283 3088KLMD_CreateFileW: Trying to open file C:\Windows\system32\drivers\RTSTOR.SYS 23:31:39:308 3088TDL3_FileDetect: C:\Windows\system32\drivers\RTSTOR.SYS - Verdict: Clean 23:31:39:309 3088 23:31:39:309 3088DetectCureTDL3: DEVICE_OBJECT: 844B0AC8 23:31:39:309 3088KLMD_GetLowerDeviceObject: Trying to get lower device object for 844B0AC8 23:31:39:309 3088DetectCureTDL3: DEVICE_OBJECT: 843AA918 23:31:39:309 3088KLMD_GetLowerDeviceObject: Trying to get lower device object for 843AA918 23:31:39:309 3088DetectCureTDL3: DEVICE_OBJECT: 8398F528 23:31:39:309 3088KLMD_GetLowerDeviceObject: Trying to get lower device object for 8398F528 23:31:39:309 3088KLMD_ReadMem: Trying to ReadMemory 0x8398F528[0x38] 23:31:39:309 3088DetectCureTDL3: DRIVER_OBJECT: 8432FBB8 23:31:39:309 3088KLMD_ReadMem: Trying to ReadMemory 0x8432FBB8[0xA8] 23:31:39:309 3088KLMD_ReadMem: Trying to ReadMemory 0x839ABC20[0x1A] 23:31:39:309 3088DetectCureTDL3: DRIVER_OBJECT name: \Driver\atapi, Driver Name: atapi 23:31:39:309 3088DetectCureTDL3: IrpHandler (0) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (1) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (2) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (3) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (4) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (5) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (6) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (7) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler ( addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (9) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (10) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (11) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (12) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (13) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (14) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (15) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (16) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (17) addr: 807209B0 23:31:39:309 3088DetectCureTDL3: IrpHandler (18) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (19) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (20) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (21) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (22) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (23) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (24) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (25) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: IrpHandler (26) addr: 807209B0 23:31:39:310 3088DetectCureTDL3: All IRP handlers pointed to one addr: 807209B0 23:31:39:310 3088KLMD_ReadMem: Trying to ReadMemory 0x807209B0[0x400] 23:31:39:310 3088TDL3_IrpHookDetect: TDL3 Stub signature found, trying to get hook true addr 23:31:39:310 3088KLMD_ReadMem: Trying to ReadMemory 0xFFDF0308[0x4] 23:31:39:310 3088KLMD_ReadMem: Trying to ReadMemory 0x8432F58C[0x4] 23:31:39:310 3088TDL3_IrpHookDetect: New IrpHandler addr: 857988C8 23:31:39:310 3088KLMD_ReadMem: Trying to ReadMemory 0x857988C8[0x400] 23:31:39:310 3088TDL3_IrpHookDetect: CheckParameters: 10, FFDF0308, 510, 134, 3, 120 23:31:39:310 3088Driver "atapi" Irp handler infected by TDSS rootkit ... 23:31:39:311 3088KLMD_WriteMem: Trying to WriteMemory 0x8579894E[0xD] 23:31:39:311 3088cured 23:31:39:311 3088TDL3_FileDetect: Processing driver: atapi 23:31:39:312 3088TDL3_FileDetect: Processing driver file: C:\Windows\system32\drivers\atapi.sys 23:31:39:312 3088KLMD_CreateFileW: Trying to open file C:\Windows\system32\drivers\atapi.sys 23:31:39:323 3088TDL3_FileDetect: C:\Windows\system32\drivers\atapi.sys - Verdict: Infected 23:31:39:323 3088File C:\Windows\system32\drivers\atapi.sys infected by TDSS rootkit ... 23:31:39:323 3088TDL3_FileCure: Processing driver file: C:\Windows\system32\drivers\atapi.sys 23:31:42:589 3088FileCallback: Backup candidate found: C:\Windows\system32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys:19944, checking.. 23:31:42:596 3088ValidateDriverFile: Stage 1 passed 23:31:42:598 3088ValidateDriverFile: Stage 2 passed 23:31:42:779 3088DigitalSignVerifyByHandle: Embedded DS result: 00000000 23:31:42:779 3088ValidateDriverFile: Stage 3 passed 23:31:42:779 3088FileCallback: File validated successfully, restore information prepared 23:31:46:346 3088FindDriverFileBackup: Backup copy found in DriverStore 23:31:46:346 3088TDL3_FileCure: Backup copy found, using it.. 23:31:46:347 3088TDL3_FileCure: Dumping CURED buffer to file C:\Windows\system32\drivers\tsk2FAC.tmp 23:31:46:495 3088TDL3_FileCure: New / Old Image paths: (system32\drivers\tsk2FAC.tmp, system32\drivers\atapi.sys) 23:31:46:495 3088TDL3_FileCure: KLMD jobs schedule success 23:31:46:495 3088will be cured on next reboot 23:31:46:496 3088UtilityBootReinit: Reboot required for cure complete.. 23:31:46:496 3088MyNtCreateFileW: NtCreateFile(\??\C:\Windows\system32\drivers\klmdb.sys) returned status 00000000 23:31:46:579 3088UtilityBootReinit: KLMD drop success 23:31:46:586 3088KLMD_ApplyPendList: Pending buffer(5009_66A6, 616) dropped successfully 23:31:46:586 3088UtilityBootReinit: Cure on reboot scheduled successfully 23:31:46:586 3088 23:31:46:587 3088Completed 23:31:46:587 3088 23:31:46:587 3088Results: 23:31:46:588 3088Memory objects infected / cured / cured on reboot:1 / 1 / 0 23:31:46:588 3088Registry objects infected / cured / cured on reboot:0 / 0 / 0 23:31:46:588 3088File objects infected / cured / cured on reboot:1 / 0 / 1 23:31:46:589 3088 23:31:46:589 3088UnloadDriverW: NtUnloadDriver error 1 23:31:46:589 3088KLMD_Unload: UnloadDriverW(klmd21) error 1 23:31:46:590 3088MyNtCreateFileW: NtCreateFile(\??\C:\Windows\system32\drivers\klmd.sys) returned status 00000000 23:31:46:590 3088UtilityDeinit: KLMD(ARK) unloaded successfully [Saving space, attachment deleted by admin]
. SeDebugPrivilege granted successfully ... . Windows Vista Home Edition (6.0.6002) Service Pack 2 [32_bits] - x86 Family 15 Model 104 Stepping 1, AuthenticAMD . [wscsvc] (Security Center) RUNNING (state:4) [MpsSvc] RUNNING (state:4) Windows Firewall -> Enabled Windows Defender -> Enabled User Account Control (UAC) -> Disabled ! . Internet Explorer 8.0.6001.18882 . C:\ [Fixed-NTFS] .. ( Total:232 Go - Free:156 Go ) D:\ [CD_Rom] F:\ [Removable] . Scan : 00:06.22 Path : C:\Users\J-BIRD\Desktop\Rooter.exe User : J-BIRD ( Administrator -> YES ) . ----------------------\\ Processes . Locked [System Process] (0) Locked System (4) ______ \SystemRoot\System32\smss.exe (400) ______ C:\Windows\system32\csrss.exe (540) ______ C:\Windows\system32\wininit.exe (604) ______ C:\Windows\system32\csrss.exe (616) ______ C:\Windows\system32\services.exe (648) ______ C:\Windows\system32\lsass.exe (660) ______ C:\Windows\system32\lsm.exe (668) ______ C:\Windows\system32\winlogon.exe (764) ______ C:\Windows\system32\svchost.exe (864) ______ C:\Windows\system32\svchost.exe (924) ______ C:\Windows\system32\Ati2evxx.exe (960) ______ C:\Windows\System32\svchost.exe (1036) ______ C:\Windows\System32\svchost.exe (1120) ______ C:\Windows\system32\svchost.exe (1140) Locked audiodg.exe (1220) ______ C:\Windows\system32\svchost.exe (1248) ______ C:\Windows\system32\SLsvc.exe (1272) ______ C:\Windows\system32\svchost.exe (1364) ______ C:\Windows\system32\Ati2evxx.exe (1452) ______ C:\Windows\system32\svchost.exe (1584) ______ C:\Windows\System32\spoolsv.exe (1812) ______ C:\Windows\system32\svchost.exe (1836) ______ C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe (320) ______ c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (508) ______ C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe (1176) ______ C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE (1580) ______ C:\Program Files\McAfee\MPF\MPFSrv.exe (736) ______ c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe (1284) ______ C:\Program Files\Novatel Wireless\Novacore\Server\NvtlSrvr.exe (496) ______ C:\Windows\system32\svchost.exe (2120) ______ c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe (2172) ______ C:\Program Files\IDT\WDM\STacSV.exe (2204) ______ C:\Windows\system32\svchost.exe (2252) ______ C:\Windows\System32\svchost.exe (2296) ______ C:\Windows\system32\SearchIndexer.exe (2320) ______ C:\Windows\system32\WUDFHost.exe (2452) ______ C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe (2976) ______ C:\Windows\system32\taskeng.exe (3008) ______ C:\Windows\system32\taskeng.exe (3700) ______ c:\PROGRA~1\mcafee.com\agent\mcagent.exe (3760) ______ C:\Windows\system32\Dwm.exe (3840) ______ C:\Windows\Explorer.EXE (3900) ______ C:\Program Files\Synaptics\SynTP\SynTPEnh.exe (2088) ______ C:\Program Files\Common Files\Java\Java Update\jusched.exe (712) ______ C:\Windows\sttray.exe (2828) ______ C:\Windows\ehome\ehtray.exe (1916) ______ C:\Windows\ehome\ehmsas.exe (2380) ______ C:\Program Files\Windows Media Player\wmpnscfg.exe (3468) ______ C:\Program Files\Windows Media Player\wmpnetwk.exe (3920) ______ C:\Windows\system32\wbem\unsecapp.exe (1024) ______ C:\Windows\system32\wbem\wmiprvse.exe (720) ______ c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe (2660) ______ C:\Program Files\Synaptics\SynTP\SynTPHelper.exe (2532) ______ C:\Windows\system32\taskeng.exe (4576) ______ C:\Windows\system32\SearchProtocolHost.exe (6052) ______ C:\Windows\system32\SearchFilterHost.exe (6068) ______ C:\Windows\system32\SearchProtocolHost.exe (3276) ______ C:\Users\J-BIRD\Desktop\Rooter.exe (5384) . ----------------------\\ Device\Harddisk0\ . \Device\Harddisk0 [Sectors : 63 x 512 Bytes] . \Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:1048576 | Length:250057064448) . ----------------------\\ Scheduled Tasks . C:\Windows\Tasks\McDefragTask.job C:\Windows\Tasks\McQcTask.job C:\Windows\Tasks\SA.DAT C:\Windows\Tasks\SCHEDLGU.TXT C:\Windows\Tasks\User_Feed_Synchronization-{7B7886CB-F69B-46D3-802C-6198EA461B1C}.job . ----------------------\\ Registry . . ----------------------\\ Files & Folders . ----------------------\\ Scan completed at 00:06.30 . C:\Rooter$\Rooter_1.txt - (15/02/2010 | 00:06.30) Last rootkit check. Please download Stealth MBR Rootkit Detector by GMER from GMER.net, and save to your Desktop.
--------------------------------------------------------------------------------------------------------- Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net device: opened successfully user: MBR read successfully kernel: MBR read successfully user & kernel MBR OK [Saving space, attachment deleted by admin]Atapi.sys is a core system file that got infected by the TDSS rootkit, a very serious infection. It was disinfected by TDSSkiller. What other Windows Service were you talking about?IT is these 3 services I dont know what they are they are stopped in my service list SRV - File not found [On_Demand | Stopped] -- -- (URRB) SRV - File not found [On_Demand | Stopped] -- -- (NZSCXJXN) SRV - File not found [On_Demand | Stopped] -- -- (KEA) this came from the first OTL Log you requested. I was just wondering if they are harmful . they are unknown services with no description of what they do. When I go to the highlighted folder destination it doesnt exist, but the service is still on the list [stopped] just wondering if I even need to worry about it, EVERYTHING SEEMS TO BE RUNNING WONDERFULLY, I can't thank you enough there should be a donate button in the forum somewhere [Saving space, attachment deleted by admin]Didnt mean to bump, but I removed the 3 services through the registry from the services list. I don't see em anymore and I have more peace of mind. I just didnt like seeing them there To manually create a new Restore Point
To remove all of the tools we used and the files and folders they created, please do the following: Please download OTC.exe by OldTimer:
== Please download TFC by OldTimer to your desktop
Download Security Check by screen317 from SpywareInfoforum.org or Changelog.fr.
----------------------------------------------------------------------------------------------------------- Results of screen317's Security Check version 0.99.1 Windows Vista Service Pack 2 (UAC is disabled!) `````````````````````````````` Antivirus/Firewall Check: Windows Firewall Disabled! ESET Online Scanner v3 McAfee SecurityCenter WMIC entry does not exist for antivirus; attempting automatic update. `````````````````````````````` Anti-malware/Other Utilities Check: SUPERAntiSpyware Free Edition HijackThis 2.0.2 Java(TM) 6 Update 18 Java AUTO Updater Out of date Java installed! Adobe Flash Player 10 Adobe Reader 9.3 `````````````````````````````` Process Check: objlist.exe by Laurent McAfee VIRUSS~1 mcshield.exe McAfee VIRUSS~1 mcsysmon.exe `````````````````````````````` DNS Vulnerability Check: GREAT! (Not vulnerable to DNS cache poisoning) `````````End of Log```````````Seems fine to me to run them. Please read the following information that I have provided, which will help you prevent malicious software in the future. Please keep in mind, malware is a continuous danger on the Internet. It is highly important to stay safe while browsing, to prevent re-infection. Software recommendations AntiSpyware
Resident Protection help A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall, and scanning anti-spyware program at a time. Passive protectors such as SpywareBlaster can be run with any of them. Rogue programs help There are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here: http://www.spywarewarrior.com/rogue_anti-spyware.htm Securing your computer
Mozilla's Firefox browser is a very good alternative. In addition to being generally more secure than Internet Explorer, it has a very good built-in popup blocker and add-ons, like NoScript, can make it even more secure. Opera is another good option. If you are interested:
|
|