I have gone through the steps and scans mentioned by the forum. When my computer starts userinit.exe error comes up saying that there has been an application failure, click to terminate. After clicking twice the desktop loads only the background. I then use task manager command for the control panel which jump starts the desktop loading. But, many applications, upon being clicked, show rundll32.exe error with the same message as above.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:31:32 PM, on 8/4/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Monday, August 4, 2008
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Monday, August 04, 2008 16:07:43
Records in database: 1053458
--------------------------------------------------------------------------------
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - File:
Scan statistics:
Files scanned: 69820
Threat name: 2
Infected objects: 42
Suspicious objects: 0
Duration of the scan: 01:45:10
File name / Threat name / Threats count
C:\WINDOWS\system32\zfdtuj.dll/C:\WINDOWS\system32\zfdtuj.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cat 36
C:\WINDOWS\System32\zfdtuj.dll/C:\WINDOWS\System32\zfdtuj.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cat 4
C:\Documents and Settings\Mark Harper\My Documents\FrostWire\Saved\tech n9ne killer.mp3 Infected: Trojan-Downloader.WMA.Wimad.n 1
C:\WINDOWS\system32\zfdtuj.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cat 1
The selected area was scanned.
I was hoping someone could look at my HJT log and tell me how to get rid of the userinit.exe and rundll32.exe problems.
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
Can I repair my system files without my xp disk. I have the i386 folder but my cd is at home and I am on vacation? If not, is it possible to use another xp disk to obtain the files I need?
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
This message has been edited since posting. Last time this message was edited on 5. August 2008 @ 04:13
My i386 file is in the C drive but not under windows and sourcepath has it set for the c drive but sfc still asks for a service pack 3 cd. My original cd did not include any of the service packs to my knowledge. I updated my windows with service pack 3 via windows update.
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
I will not have internet for the next week but when i get home I will have the windows cd to repair my system. Then I post the HJT log. My computer does not get the internet where I am at this time so I cannot get the report to you now.
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
NO, look at the bottom of the screen as you boot up, it should give you a key to press for Recovery - if you don't have one contact the manufacturer or get an installation disk.. That's all I can tell you.
I work with malware not computer failure.....
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
I'm posting in this thread to conserve energy (?) since my issue is identical to the first post in this thread. Here's what I've done so far thanks to this great forum: :)
1. ran "explorer.exe" under Windows Task Manager to get icons and taskbar back.
2. ran scannow from win xp cd to fix damaged system files; the progress bar ran to the end and then the dialog box just disappeared without anything more such as a confirmation that the process completed successfully; so i'm not sure if scannow completed successfully.
3. ran malwarebytes' antimalware(mbam) (latest updates couldn't be had since internet connection screwed) and the log follows below.
4. ran combofix and the log follows below.
5. ran superantispyware (with latest updates since internet connection restored) and the log follows below.
6. ran trendmicro's online housecall and the only thing detected were tracking cookies, which I directed to be deleted/removed.
7. ran mbam again (this time with latest updates since internet connection restored since last run) and the log follows below.
8. ran hijackthis and the log follows below.
ComboFix 08-08-08.07 - Juan 2008-08-09 3:08:43.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.344 [GMT -4:00]
Running from: I:\Documents and Settings\Juan\Desktop\ComboFix.exe
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !! .
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
I:\Documents and Settings\Bruce\Application Data\macromedia\Flash Player\#SharedObjects\DE7RVP2P\interclick.com
I:\Documents and Settings\Bruce\Application Data\macromedia\Flash Player\#SharedObjects\DE7RVP2P\interclick.com\ud.sol
I:\Documents and Settings\Bruce\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
I:\Documents and Settings\Bruce\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
I:\Documents and Settings\Chino\Application Data\macromedia\Flash Player\#SharedObjects\8EYHB8G5\interclick.com
I:\Documents and Settings\Chino\Application Data\macromedia\Flash Player\#SharedObjects\8EYHB8G5\interclick.com\ud.sol
I:\Documents and Settings\Chino\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
I:\Documents and Settings\Chino\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
I:\Documents and Settings\Juan\Application Data\macromedia\Flash Player\#SharedObjects\FHNTXTXE\interclick.com
I:\Documents and Settings\Juan\Application Data\macromedia\Flash Player\#SharedObjects\FHNTXTXE\interclick.com\ud.sol
I:\Documents and Settings\Juan\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
I:\Documents and Settings\Juan\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
I:\WINDOWS\pskt.ini
I:\WINDOWS\system32\ihpfnw.dll
I:\WINDOWS\system32\MSINET.oca
I:\WINDOWS\system32\pujdgijh.dll
I:\WINDOWS\system32\rpbciyst.ini
.
((((((((((((((((((((((((( Files Created from 2008-07-09 to 2008-08-09 )))))))))))))))))))))))))))))))
.
Browser Hijacker.Favorites
I:\DOCUMENTS AND SETTINGS\ALL USERS\START MENU\ANTIVIRUS SCAN.URL
Adware.Tracking Cookie
I:\Documents and Settings\Bruce\Cookies\bruce@bs.serving-sys[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@scanner.vav-scan[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@adopt.specificclick[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@cache.trafficmp[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@chitika[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@trafficmp[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@adopt.euroclick[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@rotator.adjuggler[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@adbrite[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@statcounter[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@apmebf[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@www.3dstats[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@angleinteractive.directtrack[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@data.coremetrics[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ads.ovguide[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@adrevolver[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@statsync[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@atdmt[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@reduxads.valuead[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ad.zanox[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@realmedia[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ads.revsci[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@fastclick[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@revenue[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ads.bridgetrack[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@tremor.adbureau[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@mediaplex[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ads.realtechnetwork[3].txt
I:\Documents and Settings\Bruce\Cookies\bruce@advertising[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ads.realtechnetwork[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@questionmarket[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@specificclick[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ad.yieldmanager[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@www.burstnet[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@ad.yieldmanager[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@tracking.profitsource[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@optimost[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@tradedoubler[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@casalemedia[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@mediaresponder[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@zedo[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@bgu.directtrack[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@media.adrevolver[3].txt
I:\Documents and Settings\Bruce\Cookies\bruce@media.adrevolver[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@serving-sys[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@collective-media[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@aff.primaryads[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@mediatraffic[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@www.burstbeacon[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@2o7[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@serve.clickbooth[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@doubleclick[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@linksynergy[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@directtrack[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@hornymatches[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@www.statsync[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@bluestreak[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@tribalfusion[3].txt
I:\Documents and Settings\Bruce\Cookies\bruce@tribalfusion[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@scanner.anvi-scanner[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@media6degrees[1].txt
I:\Documents and Settings\Bruce\Cookies\bruce@burstnet[2].txt
I:\Documents and Settings\Bruce\Cookies\bruce@interclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@at.atwola[1].txt
I:\Documents and Settings\Chino\Cookies\chino@view.atdmt[1].txt
I:\Documents and Settings\Chino\Cookies\chino@microsoftwindows.112.2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@cache.trafficmp[1].txt
I:\Documents and Settings\Chino\Cookies\chino@media6degrees[1].txt
I:\Documents and Settings\Chino\Cookies\chino@roiservice[1].txt
I:\Documents and Settings\Chino\Cookies\chino@adnetserver[1].txt
I:\Documents and Settings\Chino\Cookies\chino@traffic.buyservices[1].txt
I:\Documents and Settings\Chino\Cookies\chino@doubleclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@ehg-dig.hitbox[2].txt
I:\Documents and Settings\Chino\Cookies\chino@eas.apm.emediate[1].txt
I:\Documents and Settings\Chino\Cookies\chino@scanner.vav-scan[2].txt
I:\Documents and Settings\Chino\Cookies\chino@incentaclick[2].txt
I:\Documents and Settings\Chino\Cookies\chino@interclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@stats.adbrite[2].txt
I:\Documents and Settings\Chino\Cookies\chino@bluestreak[2].txt
I:\Documents and Settings\Chino\Cookies\chino@prospect.adbureau[1].txt
I:\Documents and Settings\Chino\Cookies\chino@hypertracker[1].txt
I:\Documents and Settings\Chino\Cookies\chino@rotator.adjuggler[2].txt
I:\Documents and Settings\Chino\Cookies\chino@scanner.anvi-scanner[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ehg-myspaceinc.hitbox[2].txt
I:\Documents and Settings\Chino\Cookies\chino@adopt.euroclick[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ar.atwola[1].txt
I:\Documents and Settings\Chino\Cookies\chino@burstnet[1].txt
I:\Documents and Settings\Chino\Cookies\chino@adprofile[2].txt
I:\Documents and Settings\Chino\Cookies\chino@richmedia.yahoo[2].txt
I:\Documents and Settings\Chino\Cookies\chino@bs.serving-sys[1].txt
I:\Documents and Settings\Chino\Cookies\chino@hitbox[1].txt
I:\Documents and Settings\Chino\Cookies\chino@statcounter[2].txt
I:\Documents and Settings\Chino\Cookies\chino@stats.sitesuite[1].txt
I:\Documents and Settings\Chino\Cookies\chino@server.iad.liveperson[3].txt
I:\Documents and Settings\Chino\Cookies\chino@data.coremetrics[1].txt
I:\Documents and Settings\Chino\Cookies\chino@buycom.122.2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@ads.pointroll[2].txt
I:\Documents and Settings\Chino\Cookies\chino@adtrackingserver[2].txt
I:\Documents and Settings\Chino\Cookies\chino@server.iad.liveperson[1].txt
I:\Documents and Settings\Chino\Cookies\chino@angleinteractive.directtrack[2].txt
I:\Documents and Settings\Chino\Cookies\chino@atdmt[2].txt
I:\Documents and Settings\Chino\Cookies\chino@adecn[2].txt
I:\Documents and Settings\Chino\Cookies\chino@viacom.adbureau[1].txt
I:\Documents and Settings\Chino\Cookies\chino@dynamic.media.adrevolver[1].txt
I:\Documents and Settings\Chino\Cookies\chino@homestore.122.2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@login.tracking101[2].txt
I:\Documents and Settings\Chino\Cookies\chino@imrworldwide[2].txt
I:\Documents and Settings\Chino\Cookies\chino@trafficmp[1].txt
I:\Documents and Settings\Chino\Cookies\chino@adrevolver[2].txt
I:\Documents and Settings\Chino\Cookies\chino@msnportal.112.2o7[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ads.vlaze[2].txt
I:\Documents and Settings\Chino\Cookies\chino@questionmarket[2].txt
I:\Documents and Settings\Chino\Cookies\chino@tremor.adbureau[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ads.revsci[1].txt
I:\Documents and Settings\Chino\Cookies\chino@media.mtvnservices[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ad.yieldmanager[2].txt
I:\Documents and Settings\Chino\Cookies\chino@insightexpressai[1].txt
I:\Documents and Settings\Chino\Cookies\chino@specificclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@adopt.specificclick[2].txt
I:\Documents and Settings\Chino\Cookies\chino@specificclick[3].txt
I:\Documents and Settings\Chino\Cookies\chino@ad.yieldmanager[1].txt
I:\Documents and Settings\Chino\Cookies\chino@realmedia[1].txt
I:\Documents and Settings\Chino\Cookies\chino@advertising[2].txt
I:\Documents and Settings\Chino\Cookies\chino@searchfeed[1].txt
I:\Documents and Settings\Chino\Cookies\chino@fastclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@www.burstnet[2].txt
I:\Documents and Settings\Chino\Cookies\chino@fastclick[2].txt
I:\Documents and Settings\Chino\Cookies\chino@advertising[1].txt
I:\Documents and Settings\Chino\Cookies\chino@edge.ru4[1].txt
I:\Documents and Settings\Chino\Cookies\chino@overture[2].txt
I:\Documents and Settings\Chino\Cookies\chino@ad.zanox[1].txt
I:\Documents and Settings\Chino\Cookies\chino@adbrite[2].txt
I:\Documents and Settings\Chino\Cookies\chino@tacoda[1].txt
I:\Documents and Settings\Chino\Cookies\chino@www.incentaclick[2].txt
I:\Documents and Settings\Chino\Cookies\chino@revsci[2].txt
I:\Documents and Settings\Chino\Cookies\chino@mediaresponder[2].txt
I:\Documents and Settings\Chino\Cookies\chino@collective-media[1].txt
I:\Documents and Settings\Chino\Cookies\chino@mediaplex[2].txt
I:\Documents and Settings\Chino\Cookies\chino@media.adrevolver[3].txt
I:\Documents and Settings\Chino\Cookies\chino@media.adrevolver[2].txt
I:\Documents and Settings\Chino\Cookies\chino@perf.overture[1].txt
I:\Documents and Settings\Chino\Cookies\chino@zedo[3].txt
I:\Documents and Settings\Chino\Cookies\chino@zedo[2].txt
I:\Documents and Settings\Chino\Cookies\chino@tracking.profitsource[1].txt
I:\Documents and Settings\Chino\Cookies\chino@trafficdashboard[1].txt
I:\Documents and Settings\Chino\Cookies\chino@tracking.vindicosuite[1].txt
I:\Documents and Settings\Chino\Cookies\chino@servedby.onlinemediadiva[2].txt
I:\Documents and Settings\Chino\Cookies\chino@bgu.directtrack[2].txt
I:\Documents and Settings\Chino\Cookies\chino@serve.clickbooth[1].txt
I:\Documents and Settings\Chino\Cookies\chino@casalemedia[2].txt
I:\Documents and Settings\Chino\Cookies\chino@mediatraffic[1].txt
I:\Documents and Settings\Chino\Cookies\chino@statse.webtrendslive[2].txt
I:\Documents and Settings\Chino\Cookies\chino@fls.doubleclick[1].txt
I:\Documents and Settings\Chino\Cookies\chino@hearstmagazines.112.2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@atwola[1].txt
I:\Documents and Settings\Chino\Cookies\chino@apmebf[1].txt
I:\Documents and Settings\Chino\Cookies\chino@serving-sys[1].txt
I:\Documents and Settings\Chino\Cookies\chino@homesteadtechnologies.122.2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@hornymatches[2].txt
I:\Documents and Settings\Chino\Cookies\chino@2o7[1].txt
I:\Documents and Settings\Chino\Cookies\chino@directtrack[2].txt
I:\Documents and Settings\Chino\Cookies\chino@tribalfusion[2].txt
I:\Documents and Settings\Chino\Cookies\chino@tribalfusion[1].txt
I:\Documents and Settings\Chino\Cookies\chino@media.vlzserver[1].txt
I:\Documents and Settings\Chino\Cookies\chino@linksynergy[1].txt
I:\Documents and Settings\Chino\Cookies\chino@tradedoubler[2].txt
Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 1:06:54 PM, on 8/9/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Number of processes/threads found: 1153
Number of processes/threads scanned: 1153
Number of processes/threads not scanned: 0
Number of infected processes/threads terminated: 0
Total scanning time: 28s
Scanning file system...
Scanning: I:\*.*
Running post-scan cleanup routine:
Number of files found: 4205
Number of archives unpacked: 136
Number of files scanned: 4199
Number of files not scanned: 6
Number of files skipped due to exclude list: 0
Number of infected files found: 0
Number of infected files repaired/deleted: 0
Number of infections removed: 0
Total scanning time: 2m 6s
ALRIGHT, coqui3l, you did an excellent job of cleanup. That?s what happens when someone can follow directions.
Congratulations your log looks CLEAN
Here is a suggestion to STAY Clean:
Download and install Spywareblaster<=SpywareBlaster will prevent ActiveX and spyware from being installed.
Also, in order to prevent the installation of Trojans and Malware on your machine Please download and install:
Comodo BOClean This little jewel is an AntiMalware/AntiTrojan program that is very non-invasive. It doesn?t scan for malware that has been installed, it just sits in the tray and captures malware BEFORE it is installed.. It has about 60,000 definitions in the data base and updates 2 or 3 times a week, sometimes. Install this and you?ll never get another Vundo Trojan?..
There are a few things you must do once you are completely clean:
? Save it to your desktop. ? Run the tool by clicking on the icon.
? Click the Cleanup button.
? The tools that we used as well as this one will be removed from your system.
2. Please downloadATF Cleanerby Atribune.
This program is for XP and Windows 2000 only
Double-click ATF-Cleaner.exe to run the program.
? Under Main "Select Files to Delete" choose: Select All. ? Click the Empty Selected button.
? If you use Firefox browser click Firefox at the top and choose: Select All ? Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
? If you use Opera browser click Opera at the top and choose: Select All ? Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
? Click Exit on the Main menu to close the program.
3. Now Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.
The easiest and safest way to do this is:
? Go to Start > Programs > Accessories > System Tools and click "System Restore".
? Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
? Then go to Start > Run and type: Cleanmgr ? Click "OK"
Select the drive you want to clean usually C: Click OK When it completes the scan:
? Click the "More Options" Tab.
? Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
4. Defragment your Hard Drive
1.Open My Computer.
2.Right-click the local disk volume that you want to defragment, and then click Properties. 3.On the Tools tab, click Defragment Now. 4.Click Defragment.
And here are some tips to reduce the potential for spyware infection in the future:
Make sure you keep your Windows OS current by visiting Windows update regularly to download and install any critical updates and service packs. With out these you are leaving the backdoor open.
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
There are three kinds of men: The ones that learn by reading; The few who learn by observation;
The rest of them have to pee on the electric fence and find out for themselves...
Hey Im back again and now I have a cd that is called the reinstallation dvd. My computer did not come with any other disks for the operating system because the os was preinstalled. Is this the correct dvd?