Monday, June 30, 2008

Operating system reinstallation

Operating system reinstallation

Reinstalling the operating system is another approach to virus removal. It involves simply reformatting the OS partition and installing the OS from its original media, or imaging the partition with a clean backup image (Taken with Ghost or Acronis for example).

This method has the benefits of being simple to do, being faster than running multiple antivirus scans, and is guaranteed to remove any malware. Downsides include having to reinstall all other software, reconfiguring, restoring user preferences. User data can be backed up by booting off of a Live CD or putting the hard drive into another computer and booting from the other computer's operating system (though care must be taken not to transfer the virus to the new computer).

[edit] See also


[edit] References

  1. ^ http://www.bartleby.com/61/97/C0539700.html
  2. ^ http://www.actlab.utexas.edu/~aviva/compsec/virus/whatis.html
  3. ^ "Virus list". http://www.viruslist.com/en/viruses/encyclopedia?chapter=153310937. Retrieved 2008-02-07.
  4. ^ Thomas Chen, Jean-Marc Robert (2004). "The Evolution of Viruses and Worms". http://vx.netlux.org/lib/atc01.html. Retrieved 2009-02-16.
  5. ^ See page 86 of Computer Security Basics by Deborah Russell and G. T. Gangemi. O'Reilly, 1991. ISBN 0937175714
  6. ^ Anick Jesdanun. "Prank starts 25 years of security woes". http://news.yahoo.com/s/ap/20070831/ap_on_hi_te/computer_virus_anniversary;_ylt=A9G_R3Ga1NhGH0QBIwZk24cA. "The anniversary of a nuisance". http://www.cnn.com/2007/TECH/09/03/computer.virus.ap/.
  7. ^ Boot sector virus repair
  8. ^ Dr. Solomon's Virus Encyclopedia, 1995, ISBN 1897661002, Abstract at http://vx.netlux.org/lib/aas10.html
  9. ^ Vesselin Bontchev. "Macro Virus Identification Problems". FRISK Software International. http://www.people.frisk-software.com/~bontchev/papers/macidpro.html.
  10. ^ Berend-Jan Wever. "XSS bug in hotmail login page". http://seclists.org/bugtraq/2002/Oct/119.
  11. ^ Wade Alcorn. "The Cross-site Scripting Virus". http://www.bindshell.net/papers/xssv/.
  12. ^ http://www.virusbtn.com/resources/glossary/polymorphic_virus.xml
  13. ^ Perriot, Fredrick; Peter Ferrie and Peter Szor (May 2002). "Striking Similarities" (PDF). http://securityresponse.symantec.com/avcenter/reference/simile.pdf. Retrieved September 9, 2007.
  14. ^ http://www.virusbtn.com/resources/glossary/metamorphic_virus.xml
  15. ^ Need a computer virus?- download now
  16. ^ http://blog.didierstevens.com/2007/05/07/is-your-pc-virus-free-get-it-infected-here/
  17. ^ "Malware Evolution: Mac OS X Vulnerabilities 2005-2006". Kaspersky Lab. 2006-07-24. http://www.viruslist.com/en/analysis?pubid=191968025. Retrieved August 19, 2006.
  18. ^ Apple - Get a Mac
  19. ^ a b Sutter, John D. (22 April 2009). "Experts: Malicious program targets Macs". CNN.com. http://www.cnn.com/2009/TECH/04/22/first.mac.botnet/index.html. Retrieved 24 April 2009.
  20. ^ McAfee. "McAfee discovers first Linux virus". news article. http://math-www.uni-paderborn.de/~axel/bliss/mcafee_press.html.
  21. ^ Axel Boldt. "Bliss, a Linux "virus"". news article. http://math-www.uni-paderborn.de/~axel/bliss/.
  22. ^ "Symantec Security Summary — W32.Gammima.AG." http://www.symantec.com/security_response/writeup.jsp?docid=2007-082706-1742-99
  23. ^ "Yahoo Tech: Viruses! In! Space!" http://tech.yahoo.com/blogs/null/103826
  24. ^ "Symantec Security Summary — W32.Gammima.AG and removal details." http://www.symantec.com/security_response/writeup.jsp?docid=2007-082706-1742-99&tabid=3

No comments:

Post a Comment