Saturday, March 27, 2010
Special Bob's
Comprehensive Malware Removal Guide
The title of this article is a
funny one, Special Bob's
Comprehensive Malware Removal
Guide. However, when
you actually visit Special Bob's
web page, it makes sense:
Malware Removal
Here's a guy who clearly loves
computers. He would not have
compiled such a comprehensive
list of malware removal tools
if he did not.
No one would do what he has done
just for the money. It takes a
special kind of dedication to
learn how to fix computers and
remove malware. Furthermore, it
takes much time and energy
discovering all of these malware
removal resources and learning
how to use them.
Time put in and patience brings a
happy result. Clearly Bob has
put in the time and he has the
patience to work with all these
tools. No doubt that's why he
is called Special Bob.
Ed Abbott
Friday, March 26, 2010
Removing Malware
Using Windows Safe Mode
Here's an article that describes
how to get into Windows Safe Mode:
Windows XP Safe Mode Explained
As the article explains, getting
into safe mode is a two-step
process:
- Start Windows (boot it up)
- Hold down the f-8 key
Why Safe mode? Why would you want
to boot up in safe mode to remove
viruses and spyware?
In some cases, you can prevent malware
from running by booting up into safe
mode. If you can do this, you stop
the malware from running and thus taking
steps to protect itself.
Malware is famous for protecting itself.
Try to remove it and it will try to protect
itself from removal. Of course, the malware
has to be running in order for it to
practice self-protection.
You might say that Windows Safe Mode
is the middle path. It is the middle path
between two extremes.
Running your copy of Windows in Windows
Normal Mode is one end of the extreme.
This is the mode that will almost surely
allow your malware problem to be running
concurrently to you running something that
is trying to remove your malware problem.
If this happens, you will likely have two
pieces of software doing battle.
One piece of software is the evil piece
of software, the malware that has infected
your computer. The other piece of software
is the good software, the malware removal
tool that is trying to fix your computer.
Both do battle with each other if both
are allowed to run at the same time.
Sometimes the battle is over before it
begins. Try to visit a website that has
a malware removal tool on it and you
are prevented from visiting that website
by the offending malware itself. I call
this phenonema malware redirection.
With maleware redirection any attempts
to visit a website that will help you to
remove malware are redirected to another
website. Often this redirection is to
a site that runs advertising of some kind.
I don't have enough experience to know
whether or not running your computer in
safe mode will solve this problem for you.
However, I'd at least give safe mode a try
if I had this problem.
Here's my hierarchy of good, better and
best when it comes to removing malware:
- It is good to try to remove malware
while running your copy of Windows in
mormal mode. This often does some good,
especially if your computer is not too
badly infected. This has worked for me
for years as of this writing. - Better yet is to run Windows in
Safe Mode as this may knock
out some malware temporarily. Of course,
I can't guarantee this. However, it
is worth a try. - For profound malware infections,
it is best to run Windows off of a
separate boot disk. For example, a
copy of Windows on a CD or a DVD.
Of the three ways to run malware removal
tools, the bootable disk option
is the best in terms of effectiveness.
While I've not tried this mywelf, because
I've never had to, I can see that doing
this has a great advantage:
The advantage of a boot disk is that your
infected copy of Windows becomes a passive
entity that is asleep and totally dormant.
In other words, the infected copy of Windows
has no way to defend itself against malware
disinfection.
Here's a post that I've written that gives more
information about running Windows off of a
stand-alone disk for malware disinfection
purposes:
Michael Horowitz on Removing Spyware
Here's something to keep in mind when trying
to remove malware from your infected copy
of Windows: A good decision represents
a balance of interests.
Here's the two interets you want to consider
when trying to remove malware from your system:
- Convenience
- Effectiveness
Balancing these two interests might lead
me to try to remove malware in this order of
preference:
- Try removing the malware in Safe Mode
first using an online malware scanner. - If Safe Mode fails, use your credit card
to order a bootable disk that has malware
removal utilities on it. - If your problems are very minor,
or you are very lazy about discovering Windows
Safe Mode, then you might as well try running
a malware removal tool in Windows Normal
Mode first. Normal mode is better than
nothing and hey, it might work.
Here's a broad outline of how to remove
malware in safe mode:
- Boot up in safe mode
by holding down the
f-8 key on the
top row of your keyboard. - Go to a website that has
a malware removal tool that
comes highly remcommended by
more than one reputable source
of information - Run the malware removal
tool
It is important that you read
about your malware removal tool
first. Make sure it does malware
removal, not malware installation.
Your read this right. Some tools
that purport to remove malware
actually install it instead. Be
sure to seek out independent reviews
to make sure that your so-called
malware removal tool is not in fact
evil software masquerading as your
friend.
Ed Abbott
Wednesday, March 24, 2010
Michael Horowitz on Removing Spyware
Here's a page I've just discovered
while doing research on removing
maleware in safe mode on
a Windows machine:
Removing Spyware
The above link references 3 articles
written by Michael Horowitz. Seems
that some of the best things in life
come in a series of 3. These articles
are no exception.
In article number 1, Michael Horowitz
goes over two things:
- Removing malware from inside of
Windows - Removing malware from outside of
Windows
In article number 2, Michael Horowitz
assumes that you will be removing
malware from a bootable CD. In this
second article he discusses two choices:
- Running the boot CD in the infected
machine - Running the boot CD over a network
Note that however you run the boot CD,
you are running the CD outside the infected
machine in the sense that the infected hard
drive is a passive entity only.
In article number 3, Michael Horowitz describes
what is essentially a two-step process.
- Run a series of anti-malware programs on
the ultimate boot CD to clear your computer
of the worst of the infections - Boot the newly disinfected machine and
run a series of online scanners to further
correct anomalies.
In a world of misdirection and wasted time,
Michael Horowitz gets right to the point.
He tells you how to remove malware from
your infected machine in the most effective
way possible.
Ed Abbott
SUPERAntiSpyware Free Edition
Here's another malware removal
tool I've recently become aware
of:
SUPERAntiSpyware
This tool installs on your system
as a .exe file. You download
the file and run the .exe.
In the case, the .exe fill is called
SUPERAntiSpyware.exe, appropriately
enough.
Here's where I found out about this
program:
How to Remove Malware From Your Computer
I ran SUPERAntiSpyware Free Edition
and it found approximately 32 adware
cookies. This was more than I expected as
I keep a very clean machine.
I'm trying to help someone clean up their
machine. They have an adware redirection
problem. At least, that's what I call
it.
Basically, if they try to run malware removal
software, they get redirected away from the
malware scanner site to a site that runs
an ad instead. This makes it very hard to
clean their machine.
I'm beginning to believe that the solution
is to send them a bootable CD-ROM with
.exe files that remove malware. If this
bootable CD-ROM were to run in safe mode,
it might do the trick.
Ed Abbott
Saturday, March 20, 2010
TDSSKiller.exe Malware Removal Tool
Today I'm trying out an application
called TDSSKiller.exe. It is
a malware removal tool.
I don't have any known malware on my
Windows XP machine. The only reason
I'm trying this is to do research.
Here are the steps I've taken to obtain
this malware removal utility:
- Fire up the Google Chrome browser
- Go to the TDSSKiller webpage
- Download TDSSKiller.zip
- In Chrome, click on tdskiller.zip
- Look for folder tasks on
the left side of you screen - Choose Extract all files
underneath folder tasks - Unzip the file into a folder of
your choice
For easy reference, here's the webpage
that TDSSKiller.exe comes from:
Viruses and solutions
Here's where I chose to place
TDSSKiller.exe
c:\tdsskiller
Here's how I created the
tdsskiller folder:
- Right click on the Windows XP
start button - Click run
- Fill in the blank with
the word cmd - Look for the DOS
prompt - at the DOS prompt, type
cd c:\ - type mkdir tdsskiller
to create a temporary folder
- Right click on the Windows XP
start button - Click run
- Fill in the blank with
the word cmd - Look for the DOS
prompt - at the DOS prompt, type
cd c:\ - Look for the c:\
prompt - At the prompt, type
cd tdsskiller to
change directory to the
tdsskiller folder - Type tdskiller.exe to
run the TDSSKiller malware removal
utility
Doing any kind of computer work
is very detailed. That's why I
write out how I do things so
carefully.
Even when I write carefully, I
realize that it is hard for others
to duplicate precisely what I did.
Here's a post that gives some helpful
information:
How to Remove Rootkit.Win32.TDSS using TDSSKiller
Ed Abbott
Thursday, March 18, 2010
Search Results Hijacked by Malware
I tutored someone over the phone
today. We were trying to install
the Google Toolbar on his home
computer.
I thought it was going to be an
easy task. I was wrong.
Seems that everytime this man
tried to install the Google
toolbar on his browser, he got
redirected by adware to a site
advertising something.
The same thing happened when he
tried to go to the the home page
for Trend Micro's Housecall software.
Again, he was redirected to adware.
I just found it so hard to believe
that this was actually happening.
Keep in mind that the man is describing
all this to me over the phone.
After we hung up our phones I did a
Google search on adware redirection.
Here the web page that came up:
Search Results Hijacked
OK. Now I know it is possible. Now I
know that is malware out there that will
hijack your search results. I'm loosely
calling this adware though this may
not be the correct term.
The lesson? Always challenge assumptions
by seeking out hard evidence to either prove
or disprove the assumption.
In this case, I had assumed that it was not
possible to get your search results hijacked.
It was not a strongly felt assumption. It was
just an assumption based on the fact I had
never thought of this possibility before.
I'll be looking more into adware hijacking
in the future.
Ed Abbott
Subscribe to:
Posts (Atom)