Crossroad Technologies We Make Computers Work For You

November 8, 2010

How to erase this virus?

Filed under: Windows Disaster Recovery — wayne @ 7:52 pm

Hi,
Yesterday a friend of mine came to my place to drop him some music files into his usb. But into his usb, there were some other files, that he wasn’t able to recognise himself!
My pc started lagging, and therefore I was forced to do a reset.
When it opened, I formatted the usb just to be sure that no virus is on it, and then disaster started.
First of all, the antivirus starts and closes immediately. I’ve runned trojan remover 3 times , removed what was found but nothing… The virus is still here… And what do I mean? Internet Explorer windows pop-up every once in a while getting me into strange chinese sites.
In addition I can’t download many things from rapidshare (… when I press download firefox closes)! WinRar opens whatever it wants!
I’ve runned Eset Online Virusscan, and it found 10 viruses. I’ve made even a system recovery, but still nothing..
I have 2 hdds, and therefore if I must format them, I will lose all the important personal files of my.
So what to do? Back the files and format the hdds? Try another magical antivirus? or just get my pc done in a technician and get me ripped off?
Thanks for the instant response. I’m currently running MalwareByte’s Anti-Malware and then I will use the other software you recommended. I was surprised to see that it was successfully installed as I thought there was some kind of banlist to the files used 😛

If you have to reformat you only have to do the hard drive with your OS on it. Viruses don’t attack data. I have two HDs and four partitions on my desktop: one for XP, one for Vista, one saved for Win7, and one for data. If/when I get malware that causes too much damage to repair I just reformat the infected partition and everything else is safe. But I still backup to another PC and DVDs frequently in case the second hd crashes.

Help!!! Please – I’m not really a computer expert quiz!!?

Filed under: Backup Best Practices — wayne @ 7:52 pm

1. What is the default music and video player in Windows? (1 point)
Real Player
Quicktime Player
Windows Media Player
Itunes Player
2. The disk defragmenter is found in what section of the Accessories feature?
(1 point)
System Tools
Accessibility
Communications
Entertainment
3. The disk cleanup tool is where you can backup your files. (1 point)
True
False
4. The best way to get a quick summary of your computer system is through the System Information tool. (1 point)
True
False
5. The sound recorder will allow you to record up to a maximum of how many seconds? (1 point)
45 seconds
120 seconds
90 seconds
60 seconds
6. What feature in the Accessories panel would you use to restore your computer that has been affected by spy ware? (1 point)
System Information
System Restore
Disk Defragmenter
Sound Recorder
7. Which feature would you use to clean up the unwanted files on your computer? (1 point)
System Restore
Disk Defragmenter
Disk Cleanup
Backup Tool
8. It is a good practice to back up your files on a regular basis. (1 point)
True
False
9. Which feature would you use to back up your files? (1 point)
Disk Cleanup
Backup tool
Disk Defragmenter
Paint tool
10. Which feature would you use to play an audio CD? (1 point)
Disk Cleanup tool
Sound Recorder
Windows Media Player
System Restore

1 Windows Media Player
2 System Tools
3 False
4 True
5 60 seconds
6 System Restore
7 Disk Cleanup
8 True
9 Backup tool
10 Windows Media Player

It doesn’t take an expert to answer these – "Are You Smarter Than a 5th Grader?"

November 1, 2010

Cisco Answers Please help meeeeeeeeeeeeeeeeeeeeeee?

Filed under: Backup Best Practices — wayne @ 2:00 am

Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
LEAP
WEP
WPA
WTLS

6
Which two characteristics describe a worm? (Choose two.)
Executes when software is run on a computer.
Is self-replicating.
Hides in a dormant state until needed by an attacker.
Infects computers by attaching to software code.
Travels to new computers without any intervention or knowledge of the user.

7
Which two statements are true about username and password standards? (Choose two.)
The username naming convention should be kept simple.
Usernames should expire periodically.
The passwords should be kept simple and easy to remember.
Rules about password expiration and lockout should be defined.
BIOS passwords should be given to users to enable them to configure their computer.

8
Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
ROM upgrades
service packs
security patches
BIOS upgrades
DirectX updates

9
A fingerprint reader is an example of which security technology?
authorization
biometric
keylogging
secureware
smartcard

10
Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file.
Enforce password protection at the BIOS level.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Restrict passwords to text-based strings.

11
What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule anti-virus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the anti-virus manufacturer website.

12
Where is the safest place to store backups?
portable lock box
locked telecommunications room
locked server room
offsite secure facility

13
Which type of program causes banners and ads to appear on the desktop without any user intervention?
adware
spyware
stealth virus
trojan horse

14
An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
man-in-the-middle
phishing
physical
social engineering
spoofing

15
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
Create a restore point.
Manually update the Last Known Good Configuration.
Reinstall the anti-virus software.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

The only Cisco related question i can see would possibly be:

Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
LEAP
WEP
WPA
WTLS

And with that question i would answer WPA

« Newer PostsOlder Posts »

Powered by WordPress