From: PA Bear [MS MVP] on
Then don't let your anti-virus application subscription expire again.

Klauwaart wrote:
> Sure,
> will give that a go too
> Don't really want to go through all that misery again.
> Thanks.
>
>
> "Ottmar Freudenberger" <freudi(a)gmx.net> wrote in message
> news:855i82FgddU1(a)mid.individual.net...
>> "Klauwaart" <admin(a)vlaanderen-flanders.org.uk> schrieb:
>>
>>> I have even strengthened my security now.
>>
>> Not really until you've rebuilded your compormised system from scratch.
>>
>> Bye,
>> Freudi
From: MowGreen on
Klauwaart wrote:
> MOW, YOU DID IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> I don't know how to thank you.
> I REALLY owe you BIG TIME!!!!!
>
> The scan with the Malicious Software Remover took almost 7 hours, and it
> turned out 2 files on my hard drive were infected with the Alureon.H
> virus, which apparentlyy looks at your drivers, and, as I experienced,
> sends users to sites of the hacker's choice (hence the redirection from
> Google to advert sites).
>
> Also, after the reboot, I saw that orange shield with an exclamation
> mark on my "Shut Down" button, which indicated to me that the updates
> were up and running again, and yes, when I opened Windows Update, there
> it came, telling me there were updates waiting for me.
>
> Like I said before, I really don't know how to thank you, all the
> patience you have shown, and all the detailed explanations.
> If there is ever anything I can do for you, I'll be only too glad to do so.
>
> Thanks a thousand times again.
> Klauwaart.
> (You saved my blond hair from going grey).

At least you still have hair. The only hair on me that is grey is my
" Stanley Cup Playoff beard ". And I'm not even playing in the Stanley Cup !

You're mowst welcome but please *heed the advice* from Ottmar and
PABear. There's no way this system should ever engender Trust until it's
flattened and rebuilt. At least now you have some control over it and
can back up, and SCAN, the personal data that you want preserved.

The * only * way that you can clean the infected drive is by booting
from an antivirus rescue CD and cleaning it while it is not active.
One must usually create the rescue CD and it's usually Linux based.
Some AVs include this rescue CD capability if one purchases the AV and a
CD is included instead of just downloading and installing it via the
internet. Here's a review on some of the AV rescue CDs:

Analyst's View: Antivirus Rescue CDs
http://www.pcmag.com/article2/0,2817,2363533,00.asp

I've heard good things about the BitDefender and F-Secure CDs and,
they're *free*. <w>

Whether you attempt to clean the system from an AV rescue CD or you
simply flatten and rebuild is your choice. I'd recommend flattening and
rebuilding. When you get Win 7 reinstalled I *** strongly suggest ***
that you do day to computing from within a *Standard User* account as
opposed to a User Account that has Admin privileges.
When you need to install software/hardware or do some configuring of the
OS you can log off and log on with the User Account that has the Admin
privileges:

Configuring Windows 7 for a Limited User Account
http://unixwiz.net/techtips/win7-limited-user.html

You can install updates without issue from within a Standard User
account in Vista and Win 7 by enabling that option in Control Panel >
Windows Update > click the Change settings link in the left frame >
Under " Who can install updates " put a check mark next to " Allow all
users to install updates on this computer ". Click OK.

You can send me a virtual bottle of Jack Daniels and we can consider
this thread done.
Take care and 'Safe Standard User Surfing' to you !

Report: 64% of all Microsoft vulnerabilities for 2009 mitigated by Least
Privilege accounts
http://blogs.zdnet.com/security/?p=5964

" According to a newly released report, 64% of all the reported
Microsoft vulnerabilities for 2009 could have been mitigated by using
the principle of the least privileged accounts.

By collecting data from Microsoft�s Security Bulletins published
throughout the year, and identifying the vulnerabilities who would have
been mitigated by users whose accounts are configured to have fewer user
rights on the system, BeyondTrust�s quantitative report message is
simple - get back to the basics.

Key summary points on the percentage of flaws mitigated:

---> **** 90% of Critical Windows 7 operating system vulnerabilities are
mitigated by having users log in as standard users ******<----

* 100% of Microsoft Office vulnerabilities reported in 2009
* 94% of Internet Explorer and 100% of IE 8 vulnerabilities reported in 2009
* 64% of all Microsoft vulnerabilities reported in 2009
* 87% of vulnerabilities categorized as Remote Code Execution
vulnerabilities are mitigated by removing administrator rights "



MowGreen
================
*-343-* FDNY
Never Forgotten
================

banthecheck.com
"Security updates should *never* have *non-security content* prechecked