We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Re:Very Slow Boot Up Speed?
Samanthas_2
Posts: 132 Forumite
in Techie Stuff
Re:Very Slow Boot Up Speed?
Using Windows XP Pro How do I limit the number of programs that load up on Boot time?
What are the essentials?
I know there are specialist StartUp Software Programs available.
I currently have a Keylogger I want to uninstall on my PC it wants reg code when purchased but refuses to accept the one that worked on download I purchased off Ebay I checked this keylogger website it was based in Russia with some strange names
other contact was in Kiev Ukraine
I am worried this keylogger is leaking information to third parties through Stealth
I did a check with Speedtest.net my local Server was London UK very strange indeed,the Ebay Seller asked me earlier would I like to leave feedback as I must have received the CD Rom by now I said no he said must be Christmas Post so offered the link website download address and registration details.
I have scanned my PC with a lot of Antispyware but its coming back negative.
I have tried System Restore no good either.
Would using Hijack This identify whats wrong?
this seller has 100% Feedback
121 software says they been going 20 years of course they can say anything.
Samantha
Using Windows XP Pro How do I limit the number of programs that load up on Boot time?
What are the essentials?
I know there are specialist StartUp Software Programs available.
I currently have a Keylogger I want to uninstall on my PC it wants reg code when purchased but refuses to accept the one that worked on download I purchased off Ebay I checked this keylogger website it was based in Russia with some strange names
other contact was in Kiev Ukraine
I am worried this keylogger is leaking information to third parties through Stealth
I did a check with Speedtest.net my local Server was London UK very strange indeed,the Ebay Seller asked me earlier would I like to leave feedback as I must have received the CD Rom by now I said no he said must be Christmas Post so offered the link website download address and registration details.
I have scanned my PC with a lot of Antispyware but its coming back negative.
I have tried System Restore no good either.
Would using Hijack This identify whats wrong?
this seller has 100% Feedback
121 software says they been going 20 years of course they can say anything.
Samantha
0
Comments
-
Please download Malwarebytes Anti-Malware and save it to your desktop.
- Make sure you are connected to the Internet.
- Double-click on mbam-setup.exe to install the application.
- When the installation begins, follow the prompts and do not make any changes to default settings.
- When installation has finished, make sure you leave both of these checked:
- Update Malwarebytes' Anti-Malware
- Launch Malwarebytes' Anti-Malware
- Then click Finish.
- MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
- On the Scanner tab:
- Make sure the "Perform Quick Scan" option is selected.
- Then click on the Scan button.
- If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
- The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
- When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
- Click OK to close the message box and continue with the removal process.
- Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
- Make sure that everything is checked, and click Remove Selected.
- When removal is completed, a log report will open in Notepad.
- The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
- Copy and paste the contents of that report in your next reply and exit MBAM.
Ex forum ambassador
Long term forum member0 -
You must be kidding. It's a format job.0
-
Do a format job, and just to be safe when you boot from the install cd use FDisk to delete and recreate your hard drive partition, then format and re-install.0
-
>>>>>Please download Malwarebytes Anti-Malware and save it to your desktop.- Make sure you are connected to the Internet.
- Double-click on mbam-setup.exe to install the application.
- When the installation begins, follow the prompts and do not make any changes to default settings.
- When installation has finished, make sure you leave both of these checked:
- Update Malwarebytes' Anti-Malware
- Launch Malwarebytes' Anti-Malware
- Then click Finish.
- MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
- On the Scanner tab:
- Make sure the "Perform Quick Scan" option is selected.
- Then click on the Scan button.
- If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
- The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
- When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
- Click OK to close the message box and continue with the removal process.
- Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
- Make sure that everything is checked, and click Remove Selected.
- When removal is completed, a log report will open in Notepad.
- The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
- Copy and paste the contents of that report in your next reply and exit MBAM.
Thanks for taking the time out and effort to explain this to me I really appreciate it
I have in fact Malwarebytes full thorough scan completed on a number of ocassions
it returns clean so its deceived if I contacted Malware bytes with this information
they could upgrade there Anti Malware how everwhen I enter in "unhide" the software keylogger appears so I know for sure its still there I found this
Do I need to start from Square One and Verbatim install Malwarebytes as you say
as the original Malwarebytes was somehow "compromised" during Keylogger Installation they tell you specifically to turn it off all ANTI VIRUS SOFTWARE and ANTI MALWARE like Malware Bytes which I did
Icesword Keylogg detect program
is fairly specialised this just good at only detecting Stealth Keyloggers and NOT eliminating them
If I was to shut down my other Firewall and put in it place a fresh install of ZoneAlarm Firewall would this at least stop the suspected leakage
I know Keyloggers can phone home through Ftp,Email and www too?
I have opendns.org on my PC so all my DNS appear as same number IP
I guess that would have to go final measure is format Windows
Is Linux user friendly or restrictive?
Thanks,
Samantha0 -
Linux is *not* restrictive but it is different to Windows. Ubuntu is one of the friendlier distros, and most things can be done in the GUI Graphical User Interface (which is what windows is) one major difference however is that it normally runs a restricted desktop by default so you have to log as super user to allow changes to the system. much like an office XP desktop with restricted priveliges. Being a UNIX alike system the command line is case sensitive as is the filesystem so you can have two folders with the same name one uppercase and another lower case. Once set up it is really no harder than windoze just different.0
-
A decent firewall 'should' prevent said keylogger (So long as its set so that you customise ALL connection programs )
But the fact its on there may prevent the firewall from installing and working properly
But you would need to know EXACTLY what the connection was to stop! That could be a long task. but basically id block EVERYTHING your unsure of and systematically allow them one by one to get the net running. You sound like you have a bit of an idea though so intuition will probably tell you when its trying (And it will almost certainly be calling 'outwards' all the time so at least you can eliminate all the others with this information)
try Dr webs CURE IT on a FULL scan and see if it finds it
http://www.freedrweb.com/:idea:0 -
A decent firewall 'should' prevent said keylogger (So long as its set so that you customise ALL connection programs )
But the fact its on there may prevent the firewall from installing and working properly
But you would need to know EXACTLY what the connection was to stop! That could be a long task. but basically id block EVERYTHING your unsure of and systematically allow them one by one to get the net running. You sound like you have a bit of an idea though so intuition will probably tell you when its trying (And it will almost certainly be calling 'outwards' all the time so at least you can eliminate all the others with this information)
try Dr webs CURE IT on a FULL scan and see if it finds it
http://www.freedrweb.com/
>>>>>
Thanks for your reply in otherwords it will be a steep learning curve especially when this particular software tries to secretly "phone home"
I found this on web google search
http://www.spywaredb.com/remove-elite-keylogger/
Should I be suspicious of this product or at least look for Third Party Indepedent Reviews if they exist?
Could be another "RogueWare" trying to cash in
Another thing did I end up purchasing "Cracked Warez" Unknowningly
as it says on Sellers listing as many licenses as you want for the one price.
Plus even though I was supposed to get CD ROM in POst nothing ever arrived.
They say on the "official website" they never send CD Roms because they do not want the wrong people knowing you are using Keylogger Software.
http://www.elite-keylogger.com/elite-keylogger-purchase.html
Samantha
.
Thanks
Samantha0 -
A decent firewall 'should' prevent said keylogger (So long as its set so that you customise ALL connection programs )
But the fact its on there may prevent the firewall from installing and working properly
But you would need to know EXACTLY what the connection was to stop! That could be a long task. but basically id block EVERYTHING your unsure of and systematically allow them one by one to get the net running. You sound like you have a bit of an idea though so intuition will probably tell you when its trying (And it will almost certainly be calling 'outwards' all the time so at least you can eliminate all the others with this information)
try Dr webs CURE IT on a FULL scan and see if it finds it
http://www.freedrweb.com/
>>>>>>
I downloaded this software it scanned and crashed my PC luckly it restarted
How do I Uninstall it because it certainly is not in Add/Remove Programs
System Restore hardly ever works
Samantha0 -
Reformat the Hard drive.0
-
Do you still have the disc with the key logger on? send the files off to some antivirus company's for analysis so it gets detected0
This discussion has been closed.
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 352.3K Banking & Borrowing
- 253.6K Reduce Debt & Boost Income
- 454.3K Spending & Discounts
- 245.3K Work, Benefits & Business
- 601.1K Mortgages, Homes & Bills
- 177.6K Life & Family
- 259.2K Travel & Transport
- 1.5M Hobbies & Leisure
- 16K Discuss & Feedback
- 37.7K Read-Only Boards
