Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.

Slides:



Advertisements
Similar presentations
Shutdown the Computer Note : Dont Use Ctrl + Alt + Del.
Advertisements

Cosc 4765 Cleaning up.. So… The Windows machine has been infected/comprised or just “acting funny”. How to clean it up. Hope you have backups…
Explanations Of Software Utilities By Tim Wong.
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 20 Security Practices.
Format Scandisk Defragmentation Antivirus Compression Software
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Introduction to Computers II A Presentation of the Elmhurst Public Library.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Physical Cleaning Disconnect Power Open the Case.
Basic Computer Maintenance Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to.
How to maintain your computer
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Information Technology – Section 2-4. Objectives The Student will Understand the basic system tools and how to use them Understand virus and.
A+ Guide to Managing and Maintaining Your PC, 7e
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 11 Security Practices.
Get the best performance out of your PC By Matthew Pinch.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Basic Computer Cleanup Larry James ResNet Manager.
Computer Update March Just a Bit of an Update Equipment Security.
PC Maintenance How to keep your computer healthy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
WindowsXP Explorer The Explorer is a used to organize and control the files and folders of the different storage systems such as the hard drive, floppy.
Unit 7 – Installing computer hardware
Your Interactive Guide to the Digital World Discovering Computers 2012.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Computer Information Technology – Section 2-4. Objectives The Student will Understand the basic system tools and how to use them Understand virus and.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
Microsoft Office XP Illustrated Introductory, Enhanced with Programs, Files, and Folders Working.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CompTIA A+ Guide to Managing & Maintaining Your PC By: JEAN ANDREW Computer Maintenance Chapter 5 Security (Computer & Network) Part II.
1.Nattawut Chaibuuranapankul M.2/6 No. 8 2.Poonnut Sovanpaiboon M.2/6 No.11 3.Sarin Jirasinvimol M.2/6 No Attadej Rujirawannakun M.2/6 No.28.
Instructor Suleiman Muhammad (mcpn,mncs)
SIR Area2 Computers & Technology Dean Steichen Sept
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Why should I run Disk Cleanup Remove temporary Internet files Remove temporary Internet files Delete downloaded program files, such as Microsoft ActiveX.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
What is Reformatting? Reformatting the disk means to, refresh the hard drive to a new state. A full format permanently erases everything on the disk as.
W elcome to our Presentation. Presentation Topic Virus.
Your Interactive Guide to the Digital World Discovering Computers 2012.
 How to install and Activate Kaspersky Endpoint Security 10  How to block usb drives and CD/DVD drives  How to manually update Virus definition  How.
Myrtle Entertainment System Scanner How to work your way to installing a program via Myrtle Entertainment System Scanner.
Running Windows Securely and Efficiently By Gary Esworthy.
Advance startup options Shift Restart. Restart options.
How to fix Missing Windows Sockets Registry Entries required for Network Connectivity in Windows 10 /pages/Reimage- Repair- Tool/ /u/6/b/
/alexwaston14/fix-pc-error u/0/b/ /pages/Fix-PC- Error/

For more information on Rouge, visit:
How to Fix the Blue Screen of Death on Windows
Keeping your System/Computer healthy and Operating
A+ Guide to Managing and Maintaining Your PC, 7e
A+ Guide to Managing and Maintaining Your PC, 7e
oad or wrong installation or Call
Introduction to Computers
1(844) How to fix Smart test failed Error Code 303 in HP
xbfxcbcbxcb
Steps to Fix McAfee Error 1336 Call
njh
Basic Computer Maintenance
Article Source:
Keeping your System/Computer healthy and Operating
HOW TO FIX AOL 5 ERROR CODE AOL ERROR 5 MAY APPEAR DURING THE INSTALLATION OF THE PROGRAM OR SOFTWARE RELATED TO AOL INSTANT MESSENGER IS RUNNING DURING.
How to Remove Virus Form Laptop.
Presentation transcript:

Attack Plan Alex

Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean up an infected computer For basic clean up run AV(anti-virus) software and anti-adware software For basic clean up run AV(anti-virus) software and anti-adware software For the harder to remove viruses use other more complex tools to remove them For the harder to remove viruses use other more complex tools to remove them

Run AV Software In order to run AV software you first need to purchase it In order to run AV software you first need to purchase it Disconnect from the Internet to save yourself from more mischief Disconnect from the Internet to save yourself from more mischief Boot into Safe Mode (press F8 when Windows begins to load) Boot into Safe Mode (press F8 when Windows begins to load) Insert the AV software CD. Then when the menu appears, install the software Insert the AV software CD. Then when the menu appears, install the software

AV (PART 2) Enter the information to register the Anti- virus software. You won’t be connected to the internet, but you will be set up to fully register when the connection works Enter the information to register the Anti- virus software. You won’t be connected to the internet, but you will be set up to fully register when the connection works During the installation, choose scan the system for viruses. Set the software to scan all type files and to look for all types of malware. During the installation, choose scan the system for viruses. Set the software to scan all type files and to look for all types of malware.

AV (PART 3) Sometimes the software detects a program you know you downloaded and want to keep. This is called grayware. Sometimes the software detects a program you know you downloaded and want to keep. This is called grayware. Reboot into Safe Mode with Networking, connect to the internet and allow you AV software to get any updates and if it requires you to reboot, then reboot into safe mode w/networking Reboot into Safe Mode with Networking, connect to the internet and allow you AV software to get any updates and if it requires you to reboot, then reboot into safe mode w/networking

AV (PART 4) After the updating is finished, scan your system again. Some malware will be discovered for you to delete. Keep repeating the process until all malware is deleted. After the updating is finished, scan your system again. Some malware will be discovered for you to delete. Keep repeating the process until all malware is deleted. Reboot your system and see if pop-ups still open up. If so you still have malware. Reboot your system and see if pop-ups still open up. If so you still have malware.

Clean-up (PART 1) Run Windows Defender and Ad-Adware to remove what is left. Run Windows Defender and Ad-Adware to remove what is left. However, you may need to go through and manually clean out your system. However, you may need to go through and manually clean out your system. After the first boot of AV software, you might find some start-up errors caused by incomplete removal of the malware. After the first boot of AV software, you might find some start-up errors caused by incomplete removal of the malware.

Clean-up (PART 2) For each program file the AV software said it couldn’t delete, try to delete it yourself using Windows Explorer. For each program file the AV software said it couldn’t delete, try to delete it yourself using Windows Explorer. Don’t forget to empty the recycle bin when finished. Don’t forget to empty the recycle bin when finished. To get rid of other malware files, you may need to delete temporry ie files. To do so use disk cleanup To get rid of other malware files, you may need to delete temporry ie files. To do so use disk cleanup

Clean-up (PART 3) Some malware hides itself in system restore. Some malware hides itself in system restore. To get rid of this malware, you must turn off system restore then reboot and turn system restore back on To get rid of this malware, you must turn off system restore then reboot and turn system restore back on Clean your registry. Clean your registry.

Clean-up (PART 4) Root out Rootkits: a rootkit is a program that uses unusually complex methods of hiding itself on a system Root out Rootkits: a rootkit is a program that uses unusually complex methods of hiding itself on a system Was originally used on Unix Was originally used on Unix Can prevent task manager from displaying the process or might cause it to rename the rootkit process Can prevent task manager from displaying the process or might cause it to rename the rootkit process Also might be hidden from registry editor Also might be hidden from registry editor

Clean-up (PART 5) Anti-rootkit software looks for running processes that don’t match up with the underlying program filename, and the software campares files, registry entries, and processes provided by the OS to the lists it generates from the raw data Anti-rootkit software looks for running processes that don’t match up with the underlying program filename, and the software campares files, registry entries, and processes provided by the OS to the lists it generates from the raw data

Finally, If you have done everything that is said here you will have to restore the entire system, or wipe your hard drive and re- install Windows and all of your applications and then restore your data. If you have done everything that is said here you will have to restore the entire system, or wipe your hard drive and re- install Windows and all of your applications and then restore your data.