Your machine appears clean!
Are you having any additional problems at this point? If so, please let me know. Otherwise feel free to enjoy use of your repaired machine
----------------Please set your system to hide all hidden files.
Removing all System Restore points except the last
- Click Start, open My Computer, select the Tools menu and click Folder Options.
- Select the View Tab. Under the Hidden files and folders heading,
- Uncheck Show hidden files and folders.
- Check: Hide file extensions for known file types.
- Check: Hide protected operating system files (recommended) option.
- Click Yes to confirm.
- Click Start, Run and type CLEANMGR and press Enter
- Select the hard disk partition (usually C:) then press OK
- At the top of the dialog, click the tab More Options. - If the tab this is not visible then press Clean up system files, then Select the hard disk partition (usually C:), then press OK. Then click on the More options button.
- Under System Restore section, click the button Clean up....
- Click Delete.
The most common cause of an infected machine is the Trojan Horse
, or programs which appear to be legitimate but which contain malicious payloads, or which are simply malicious in and of themselves. No antivirus, firewall, host-based intrusion prevention system (HIPS), or other security software can fully protect you against this kind of attack. The best way to project yourself is not to run email attachments from untrusted sources, and avoid software downloaded from the internet wherever possible. Remember, when you run an application, you are giving that application permission to do to your machine anything you
can do the machine, including create, modify, or destroy files or other data. In the Windows (and most other systems' such as Unix) security model, applications don't have privileges, users do
The second most common cause of infection is out of date software. Leaving your system unpatched leaves holes through which attackers can execute code on your behalf without your consent. This goes for far more than common targets such as Windows and Internet Explorer. Most recent threats target other third party software, such as Adobe's Adobe Reader, Shockwave Player, or Flash Player, or Oracle's Java browser plugins. You can check your system for out of date software manually, or by using automated tools such as Secunia's Personal Software Inspector
. This goes doubly for security applications such as antivirus and other antimalware products based on definition lists, where out of date lists mean no detection of newer malware.
Finally, occasionally you will be forced to run some potentially infected binary, or attackers will use a hole which is unpatched by software vendors, so a last line of defense is needed. That means turning on a firewall (Windows Firewall included with Windows XP SP2 or later is fine) and leaving it on, and using and keeping up to date an antivirus solution such as Norton AntiVirus. Antiviral solutions don't even have to cost money; for instance Microsoft Secuity Essentials
provides perfectly acceptable protection for free. If for some reason you don't like MSE, there are other free products available as well:
- Avast (home use only)
- Avira (shows nag screen to purchase full product when updating, home use only)
- AVG (slightly poorer performance as of late)
That should be fine for the majority of users. However, if you absolutely want additional protection, consider one or more of the following products:
If you want more information on methods malware use to infect your computer, consider browsing our How did I get infected?