Jump to content

nar

Honorary Members
  • Posts

    30
  • Joined

  • Last visited

Reputation

0 Neutral

Recent Profile Visitors

952 profile views
  1. 3 questions: I assume the answer is because Chrome saves your browser history to your computer. Is this correct? Everyday after booting BEFORE connecting to internet (no wifi, ethernet connection only) I delete chrome browser history. Please google "chrome browser history can be deleted when not connected to internet." Do you get an answer? If there is a better site to post this issue please advise, I realize the question is not intrusion related or is it?
  2. You recommended FDISK, is that compatible with Windows 7 ? https://answers.microsoft.com/en-us/windows/forum/windows_7-windows_programs/equivalent-of-fdisk-for-windows-7/33849dc7-52ff-4ee5-ad44-923b9127b2f7
  3. Just now a random "Custom Definitions" folder popped up in a folder of documents. This has never happened before. None of the dates in Date Modified field are prior to machine being in the shop. Each file in this folder is a series of letters followed by .customdefinitions. What is it and what should be done about it? Thanks!
  4. Recently discovered that Windows 99 was installed while laptop was in the shop. Have read that Windows 99 is a hacked or non-legit version of Window 98. Is Windows 99 safe to be running and where did they obtain it? Is this what they used SoldierX for? Advice?
  5. 1. Found attached files NPE in C:....app/data. It was not picked up on any of the scans we ran. This site says the .etl can be used for stealing bank info. Please advise Remove NPETRACESESSION.ETL | - PC Care & Solutions www.mypccaresolutions.com/2016/06/17/remove-npetracesession-etl/ Jun 17, 2016 - NPETRACESESSION.ETL is recognised as High Risk Trojan. It can used for stealing bank information and users passwords so as to make ... 2. How to avoid uploads to these posts from displaying in main body? thanks
  6. If you check my posts you know a new hard drive was installed. 1. Can you tell me why I was advised that Microsoft actually "needs" the attached trojans and Hack Tools discovered in MSC scan after computer came back from the shop? Scan clearly shows the files are sourced from SoldierX not MS. Date of scan, and more importantly the date of SoldierX folder found in recycle bin, equals date in the shop. No one has explained why the computer needed a Soldier X folder. Can you? Further, no one has yet to explain what the Hacker files or Trojans actually do or why he would say they are "needed" by Microsoft. But according to this company that I was referred to, MS "needed" 4 files that were picked up by Microsoft's own AV and rated Severe. The recommended action on the scan?...."remove immediately." MS requires files that it's own AV says to remove immediately? Scan clearly states, This program is dangerous and executes commands from an attacker but I was told MS needs these files. You call this paranoia? Any reasonable person would find such advice highly suspect without a strong explanation to the contrary. As mentioned, the shop did not bring these files to my attention at pickup. The company was hired to replace the drive and clean the computer of malware, not install hacker tools and trojans. These are more than reasonable questions and concerns. Would you trust a company that installed SoldierX Hack Tools and Trojans on your machine without your knowledge or consent and gave you such explanation for their existence? 2. Will contact customer support for router about changing firmware if possible. With all due respect the kinds of invasion of privacy and data spying going on now really doesn't correlate to the state of things 20 years ago as many recent whistle blowers have pointed out. .
  7. After reading an article describing the area as a "data convergence center" and that as a result, 3/4s of world-class hackers live here, it suggests that what is going on is bigger than some malware on a computer. Can you recommend or point in the right direction to: 1. a very secure router? Consumer Reports recently came out with security breaches in various Netgear models. Someone recommended an old Linksys WRT54G (very old) and the reviews are not good since Cisco took over. 2. Linux/Ubuntu companies? Thanks!
  8. Speakers have been muted dozens of times in recent months, Also sound has been disabled in device manager and disabled in BIOS. The noise though faint always returns. This computer is not used for gaming.
  9. 1. No Threats Found after running TDSSKiller - (had checked all options in Advanced Parameters boxes) 2. I noticed in the TDSS Killer text file it says I'm running 6.1.7601 ServicePack: 1.0 for Windows 7 updates. From the list of update downloads previously sent me from this forum, which one should be downloaded first since no updates have downloaded for several months.
  10. Re: Trojan siredef C See my two most recent posts ID 30 and ID 26 Wondering if this is the virus causing the flicker or shudder sound (for lack of better description) whenever sensitive sites or content are opened? It certainly has seemed that everything is being monitored and tracked. This has been going on at least six months.
  11. From your site here is the link to dealing with the Trojan.SiredefC (see last post). Should all of the instructions in this sequence be followed?
  12. MBAM found trojan.siredefc in Recycle Bin: "Folders: 1 Trojan.Siredef.C, C:\$RECYCLE.BIN\S-1-5-21-2436028494-3175407098-3088813171-1000\$R17RZKK\l, Quarantined, [3ea6f5f1c6d4ba7ce077649d09f755ab]," Before the scan that found it, I was sending to recycle bin remnants of old programs from C: users appdata roaming folder. MBAM found the same virus in August. 1. Virustotal.com has no comments about trojan.siredef.c but a google search suggests it's a key capture virus. Is this correct? 2. Re: ISPs. One technician advised cable service is inferior because all users in the neighborhood run off the same line while DSL is dedicated. Is this your understanding? Do you find cable, DSL or other ISP a better choice for securing networks (plus router)?
  13. Question 2 refers to a folder on C: users owners appdata roaming called Tracker Software. Is it needed? Not sure how customizing a computer to user preferences could be considered illegal?
  14. 1. so are you saying that if remaining Soldier X files were still on machine, they would have been removed from the detection programs run to date? If not, is there anything more to confirm computer is free from those files? 2. what is Tracker Software that showed up in in Roaming folder? Can it be deleted or is it needed for any pdf program? 3. How to "curtail the use of Cortana" and what aspects of the use is actually curtailed? This will be a deciding factor to go with Windows 10 or not? Thanks!
  15. Could those trojans and hacktools have been stored elsewhere on computer such that replacing hardware did not remove them? I would think that after installing MSE if he found that level of malware, he would have brought that to my attention since cleaning the system was part of the reason for hiring him. Leaving that malware on the computer for customer to find accidentally was quite shocking let alone claiming the files should be kept as they are needed by MS. I have no doubt any reasonable person would have these same questions. I want to proceed with the questions as submitted yesterday to ensure computer is clean and safe. Thanks!
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.