Jump to content

Removal preparations

Recommended Posts

Yesterday I had to print files from a public PC, and just as expected got a keylogger. Suspected so, and confirmed, by running "dir /w /o /a /p", and noticing "uhoxajc.cmd" and "autorun.inf" on the pen drive's folder ; those didn't show up in the file explorer, even with 'Hide system files disabled'. I did this on computer at my home, which is not currently connected to my network, nor the internet.

I'd like to know what steps I can take without having to move files from there, because doing so would involve either connecting a USB drive to one of the other computers, or connecting it to the network, more then likely infecting those, a problem I don't want to have now. Another option would be a fail-safe way to not allow files to be written from said infected drive, but I don't think said option exists.

I was told I could use a small Linux installation to clean the drive, but was given no further details on how to do that. I thought about this for a while, and would like to know if it would be possible to transfer files (logs and such) safely through that possible Linux install.

Kaspersky Rescue Disk was also suggested, but I'd like to have as many options as possible.

I am open to other suggestions too.

Thanks for your time.

Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.