Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. "Perform a C.P.R. (CPU Parameter Recall) which resets the chipset. Power down, remove power cord from the PSU for 2 minutes and then power up." Not too important. What is important is that "it shows 2104 version". So now we get back to the ORIGINAL problem. On a cold boot, are you still getting the Beep Codes ?
  2. I don't understand what you mean by CPR. To me, CPR is Coronary Pulmonary Resuscitation which I am sure isn't what you mean. When it boots, does the system now show P5B BIOS version 2104 ? If yes, what about Beep Codes upon a cold boot ?
  3. http://www.asus.com/Motherboards/Intel_Socket_775/P5B/#download --> "OS: DOS" --> "BIOS-Utilities" --> "ASUS Update V7.10.05 Install Program for Windows 2000/XP/2003/Vista & Windows" Extract files and install. Then use the ASUSUpdate utility to "Update BIOS from file" pointing the utility to the folder where you previously downloaded the P5B BIOS v2104 .ROM file.
  4. It doesn't matter how you download it. BIOS upgrade instructions
  5. P5B BIOS 2104 http://support.asus.com/Download.aspx?SLanguage=en&m=P5B&p=1&s=22
  6. Since there is no 'nix versions of MBAM, where are you downloading this software ?
  7. You asked... "Wouldn't it just leave the password the same if changing other information on the router?" Not necessarily. It would likely change the password to lock you out such that you can't easily note there had been changes made as well as making it more difficult for you to correct those changes. As for... "I did a system image restore, wiping off everything on my windows 7 home premium addition." That would depend completely on how it was done. For example if you booted off a CD/DVD and restored a factory image from external media. If it was software on a partition then whatever was
  8. The declaration "backdoor.bot" is a generic name and as a non-specified malware, the answer can't be completely specific. However... Backdoor.Bot usually refers to to externally controller sub-system that exists on your system and has entered through your computer as if through a backdoor. It is not a virus so it doesn't self replicate. You say "Once the hacker has your ip address..." What hacker ? How did we go from a Backdoor.Bot to a hacker who is a specific who has gained full or partial access to your system ? The Bot may be on your system but that doesn't mean there is a person behi
  9. That's a lot of information that's dizzying. Can you please boil it down to just the simple facts and your question.
  10. Yes... http://theos.in/windows-xp/free-fast-public-dns-server-list/
  11. You are correct. When you choose "remove selected", items removed are automatically quarantined. The objective is to keep this in quarantine for roughly 3 weeks. By that time you will either know there is no problem or have no indications of a problem with that registry key being removed, After that quarantine period of roughly 3 weeks, it can be purged from the quarantine.
  12. Yes, it can be removed and Quarantined. Since it is a singular event in the log, keep it in quarantine. If after a few weeks where you have rebooted the PC and no software shows any detriment (complains, Pop-Up errors, etc) due to the removal of the Registry key, it can be purged from quarantine.
  13. The Cloud concept is hype and marketing. Nothing more than a buzz word. Focus your attention on the ability to get new signatures to detect and mitigate new threats. Malwarebytes will focus their attention on supplying the signatures, doing so frequently and with relative high bandwidth downloads even when numerous clients are requesting updates. As long as Malwarebytes does this, as they have been doing, you, the client will have whats needed. Malwarebytes will address what is known as Quality of Service (QoS) as well as concepts such as differential updates to make updating easier.
  14. Yes please. Realize that a Registry key under HKLM or HKCU are not "files". Registry keys are anomalous to leaves and twigs on a tree where the entire Registry itself exists as disk files.
  15. I'm sorry, you supplied insufficient information to give you a good response. In the subject you infer the Registry with "HKey_local" and in the body of your post you mention a "file". Please do reply with all pertinent information about the problem you are experiencing and any log or log snippet you may be referring to.
  16. The concept of "Cloud" computing is overhyped and there are security concerns. The concept of "Cloud" computing is really just a marketing scheme with a lemming following.
  17. Did you see So how did I get infected in the first place? If not, please do. It is extremely hard to determine the exact cause of some infection. Examining logs, browser history, anti malware scan logs, etc. may shed some light but is only occasionally indicative. We can talk in generalities and common causes whivh may/may not be the root of your problem. What is the most usual source of infection is what's called the vulnerability exploitation vector. In simple terms that means there is an unpatched vulnerability, software bug, that when it is exploited software is installed without your k
  18. Your reply was was just fine. Manage topic poll is a totally different concept.
  19. You misunderstand what was on the web site and the advice from Tom. He is indicating that if MBAM detects malware the anti virus you have installed may not be as effective as you may think it was. The fact is MBAM is an adjunct to your already installed anti virus application , what you indicated to be McAfee. The fact is MBAM picks up where a traditional anti virus leaves off as indicated by Tom's statement "...we do not indicate you don't need antivirus, in fact. just the opposite." Here's why... There are numerous forms of malware or malicious software. There are two major classes of malwa
  20. Like I wrote... "if the Trojan.agents are executable files (EXE, DLL, CPL, SYS, etc), the submission would be appreciated." If not here in Newest Malware Threats you are welcome to upload it and/or any malware to Upload Malware and if it isn't detected by MBAM, it will still get submitted to Malwarebytes.
  21. The tracking Cookies are worthless - really are. However, if the Trojan.agents are executable files (EXE, DLL, CPL, SYS, etc), the submission would be appreciated. That I am sure of.
  22. Why didn't you just delete the malicious email ?
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.