On the upside, my laptop battery doesn't drain, in ten minutes flat, running really hot in computational processing while in a generally idle state (laptop closed even) as if it were still running a more intensive PC game.
How might system compromise occur?! Generally the following are most common in my experience: Installing a bad program, going to certain bad websites. Also for those that might engage in torrent sharing (I don't), this also can be problematic...there maybe, for instance, a high probability that a file sharing site has either bad files and programs alike that lead to your system being compromised.
For this firstly in terms of your system usage: I always recommend using official software from a vendor purchased direct, or in box purchased from a legitimate vendor. Likewise, for game resources, I always recommend avoiding using third party sites that offer add-ons to a given program that aren't formally approved of by the vendor direct. This also includes access to information, for instance, from the game vendor direct. I've read at least of several horror stories where people had used illegally downloaded software, only to find their system hijacked because the program weren't a legitimately purchased and installed game. Also you might read through your software vendor official sites for warnings of any non legitimate sites that may be problematic to compromising your systems security. Also I highly recommend, carefully paying attention to the emails received regarding social networking site message...for instance, a phony facebook email message may say something about needed update information, and provide a link redirect to a non legitimate site which attempts then have you re log into their site, only phishing your email username and password and more resource attempting something else. Solutions to these range from typing in Facebook's url on your url bar direct, using a legitimate book mark to the given social networking site, or google searching and selecting the legitimate link in Google search direct, as opposed to using email links provided to a given site.
What to do in these instances?! Generally I don't anything sophisticated and likely if dealing with more sophisticated hacking, I've resorted to the old method of obtaining a hopefully clean .iso of a given operating system. One should dealing in this case, with some low level, in the manner of using a nuclear approach to the system which is format the hard drive from a presumably safe disk, then start over. Given the nature of cloud storage, in general, its potentially easier in a way, and then one is left making due, simply parting with any existing and generally less used data that one should care little about (if you hadn't used a lame program in months, are you really going to care about that)...anyways, supposedly flickr offers a terabyte of free data storage (or something like that).
First if you felt that the clean up through any number of vendor software weren't entirely adequate at handling the process of fixing issues on your system:
1. I always recommend that you have access to a standby clean computer that you can rely upon, you should follow steps 2-3 on this clean system (not your old presently compromised system).
2. Changing passwords, especially on root email accounts. Have all passwords handy, such as Windows/Microsoft Live for logging into Windows Live for say an upgrade or re installation process (like windows 8 if you hadn't had a windows 8 clean .iso for installation).
3. Backing up data, you can use free services from Google, for instance, Google drive installing the Google drive application to your desktop and then drag and dropping files to be saved here. I don't usually save programs but instead back up files like documents, photos, videos, and the like.
4. Ensuring that you have a clean and legitimate copy of your operating system which can be installed from boot (either in usb or dvd form). Generally I don't even mess with migrating any additional bloat data or old programs that I could care less about, or any program that couldn't be readily re downloaded and installed for free.
5. Going to your computing systems hardware manufacturer's site for drivers support. You'd need everything from Chipset support drivers, Lan drivers, Video card drivers, audio card drivers, and wi fi drivers. Unlike Linux installations, Windows installations (with a formatted drive) will likely lead to some basic hardware functioning being down (LAN, and wi fi being most common here), video support is very basic here so you'll need to install your system's hardware graphics processing driver to get full video/graphics processing benefits. Copy these drivers to a usb or some device which can be in turn loaded onto your system. Generally speaking basic usb support and/or dvd support is at least provided at a minimum upon a new window's installation.
6. You'll need to upon a cold restart of your system, ensure that you prioritize or select you dvd/usb for boot loading, and have this ready to go in your system prior to such cold boot. You'll need to make sure how to navigate your system's bios (usually for laptops, hitting the 'ESC' key when prompted for system settings when your reboot should provide either a menu for selecting your bios configuration, or you can select directly from some menu a boot priority option). You'd need to set your dvd/usb drive as a priority above (sequentially) your hard drive. That is, reading the boot disk for booting up the operating system before reading the hard drive.
7. Window's will likely detect your given operating system previously, and may give upgrade or recovery options here, likely you'd choose an advance option instead, and then here you'll need to format and/or delete any previous partitions. You might want to check in advance to make sure that partitions are generally recoverable by way of your hardware vendor's driver programs (these may create these as necessary for memory management purposes).
8. Generally follow all prompts otherwise for installation.
9. Once windows 7 finishes installation and boots successfully, run each driver program, following prompting as necessary.
10. If you had purchased windows 8 as an upgrade (as I did), obviously you'd need to re install windows 7 and then follow the upgrade process over again. Here you'd need to make sure that you choose the installation with activation key process through Microsoft direct, this isn't exactly choosing the upgrade process once logging into Microsoft's site (which may generally read your upgrade choice alone as an new upgrade purchase not a re install upgrade). Here a Google search for 're installation of windows 8', provided a link. Make sure this is formally Microsoft's site providing instructions to this site. And then follow the prompts give for upgrade installer. This should initially by default jump past the upgrade pay options to an 'Enter activation key' prompt.
11. Once window's 8 re installation is complete, you may want to check with your system's hardware vendor again, for windows 8 drivers and complete installations of these to gain full benefit of these under the new operating system. Here while migration of windows 7 to windows 8 generally means functionality of most hardware devices (in my experience), migrations may not provide the most up to date drivers.
Obviously, booting from a clean disk (in many cases) should generally for go the problems of most hacks which are included on boot loading. Which is why I've at times liked the full re installation method for cleaning a system, I wouldn't claim fully this were a complete sure fire way of removing everything (for really high level hacks) that have hidden boots and partitions alike setup on your system, but at least for the more noxious low level crap, it maybe a better bet at eliminating a myriad of problems and/or bloat/malware problems on your system without adding yet more bloat into the system to supposedly clean it up in the first place. If you get good at systems installations with windows, yeah it takes several hours in some cases, but if you have everything lined up and prepared, just sit back and watch some movies, read a book, and relax. Its not as bad as it might seem.
I mention aside from relying on Windows 8 system security (such as Windows defender) this doesn't mean you have to put up with having your system slaved in terms of security compromise. In other other words, for kid hacks you should be able to give em a hardy boot and final farewell pretty easily with a little bit of preparation.
Some signs that I've found commonly for bloat/malware/other system compromises:
1. Hard drive light is persistently operating all the time.
2. System is poor and sluggish, poor resolution in graphics, graphics aren't loading properly going to any number of commonly popular web sites.
3. Your battery drains fast and is quite poor in terms of power management (my system at best were lasting at full charge for ten minutes, running no game application and generally resident idle on googles search bar tab, with no other tabs/web pages loaded).
4. Applications appear to load without your instruction. Audible system messages appear to randomly fire off.
5. Loss of control in key control functions in a given application (seems like a ghost is in your machine...nope).
6. You notice that you are automatically user logging out of web sites even though you didn't initiate this (clearer symptoms of possible key log intrusion). Usually when sites detect alternate IP addresses within a certain time frequency are indicating multiple log ins from remote locations (where inferred that a user couldn't direct travel from one location to the other in such time frame) may provide you a warning that your account may be compromised in terms of security. Here its always recommended you get on a secure system that you can trust and change your user account passwords as soon as possible. Avoid logging back into your user account on your compromised system, and if you have difficulty with the steps that I've indicated above you can always take your system to a tech center that you can trust, just make sure your windows os product keys lined up for re installations if necessary.
How might system compromise occur?! Generally the following are most common in my experience: Installing a bad program, going to certain bad websites. Also for those that might engage in torrent sharing (I don't), this also can be problematic...there maybe, for instance, a high probability that a file sharing site has either bad files and programs alike that lead to your system being compromised.
For this firstly in terms of your system usage: I always recommend using official software from a vendor purchased direct, or in box purchased from a legitimate vendor. Likewise, for game resources, I always recommend avoiding using third party sites that offer add-ons to a given program that aren't formally approved of by the vendor direct. This also includes access to information, for instance, from the game vendor direct. I've read at least of several horror stories where people had used illegally downloaded software, only to find their system hijacked because the program weren't a legitimately purchased and installed game. Also you might read through your software vendor official sites for warnings of any non legitimate sites that may be problematic to compromising your systems security. Also I highly recommend, carefully paying attention to the emails received regarding social networking site message...for instance, a phony facebook email message may say something about needed update information, and provide a link redirect to a non legitimate site which attempts then have you re log into their site, only phishing your email username and password and more resource attempting something else. Solutions to these range from typing in Facebook's url on your url bar direct, using a legitimate book mark to the given social networking site, or google searching and selecting the legitimate link in Google search direct, as opposed to using email links provided to a given site.
What to do in these instances?! Generally I don't anything sophisticated and likely if dealing with more sophisticated hacking, I've resorted to the old method of obtaining a hopefully clean .iso of a given operating system. One should dealing in this case, with some low level, in the manner of using a nuclear approach to the system which is format the hard drive from a presumably safe disk, then start over. Given the nature of cloud storage, in general, its potentially easier in a way, and then one is left making due, simply parting with any existing and generally less used data that one should care little about (if you hadn't used a lame program in months, are you really going to care about that)...anyways, supposedly flickr offers a terabyte of free data storage (or something like that).
First if you felt that the clean up through any number of vendor software weren't entirely adequate at handling the process of fixing issues on your system:
1. I always recommend that you have access to a standby clean computer that you can rely upon, you should follow steps 2-3 on this clean system (not your old presently compromised system).
2. Changing passwords, especially on root email accounts. Have all passwords handy, such as Windows/Microsoft Live for logging into Windows Live for say an upgrade or re installation process (like windows 8 if you hadn't had a windows 8 clean .iso for installation).
3. Backing up data, you can use free services from Google, for instance, Google drive installing the Google drive application to your desktop and then drag and dropping files to be saved here. I don't usually save programs but instead back up files like documents, photos, videos, and the like.
4. Ensuring that you have a clean and legitimate copy of your operating system which can be installed from boot (either in usb or dvd form). Generally I don't even mess with migrating any additional bloat data or old programs that I could care less about, or any program that couldn't be readily re downloaded and installed for free.
5. Going to your computing systems hardware manufacturer's site for drivers support. You'd need everything from Chipset support drivers, Lan drivers, Video card drivers, audio card drivers, and wi fi drivers. Unlike Linux installations, Windows installations (with a formatted drive) will likely lead to some basic hardware functioning being down (LAN, and wi fi being most common here), video support is very basic here so you'll need to install your system's hardware graphics processing driver to get full video/graphics processing benefits. Copy these drivers to a usb or some device which can be in turn loaded onto your system. Generally speaking basic usb support and/or dvd support is at least provided at a minimum upon a new window's installation.
6. You'll need to upon a cold restart of your system, ensure that you prioritize or select you dvd/usb for boot loading, and have this ready to go in your system prior to such cold boot. You'll need to make sure how to navigate your system's bios (usually for laptops, hitting the 'ESC' key when prompted for system settings when your reboot should provide either a menu for selecting your bios configuration, or you can select directly from some menu a boot priority option). You'd need to set your dvd/usb drive as a priority above (sequentially) your hard drive. That is, reading the boot disk for booting up the operating system before reading the hard drive.
7. Window's will likely detect your given operating system previously, and may give upgrade or recovery options here, likely you'd choose an advance option instead, and then here you'll need to format and/or delete any previous partitions. You might want to check in advance to make sure that partitions are generally recoverable by way of your hardware vendor's driver programs (these may create these as necessary for memory management purposes).
8. Generally follow all prompts otherwise for installation.
9. Once windows 7 finishes installation and boots successfully, run each driver program, following prompting as necessary.
10. If you had purchased windows 8 as an upgrade (as I did), obviously you'd need to re install windows 7 and then follow the upgrade process over again. Here you'd need to make sure that you choose the installation with activation key process through Microsoft direct, this isn't exactly choosing the upgrade process once logging into Microsoft's site (which may generally read your upgrade choice alone as an new upgrade purchase not a re install upgrade). Here a Google search for 're installation of windows 8', provided a link. Make sure this is formally Microsoft's site providing instructions to this site. And then follow the prompts give for upgrade installer. This should initially by default jump past the upgrade pay options to an 'Enter activation key' prompt.
11. Once window's 8 re installation is complete, you may want to check with your system's hardware vendor again, for windows 8 drivers and complete installations of these to gain full benefit of these under the new operating system. Here while migration of windows 7 to windows 8 generally means functionality of most hardware devices (in my experience), migrations may not provide the most up to date drivers.
Obviously, booting from a clean disk (in many cases) should generally for go the problems of most hacks which are included on boot loading. Which is why I've at times liked the full re installation method for cleaning a system, I wouldn't claim fully this were a complete sure fire way of removing everything (for really high level hacks) that have hidden boots and partitions alike setup on your system, but at least for the more noxious low level crap, it maybe a better bet at eliminating a myriad of problems and/or bloat/malware problems on your system without adding yet more bloat into the system to supposedly clean it up in the first place. If you get good at systems installations with windows, yeah it takes several hours in some cases, but if you have everything lined up and prepared, just sit back and watch some movies, read a book, and relax. Its not as bad as it might seem.
I mention aside from relying on Windows 8 system security (such as Windows defender) this doesn't mean you have to put up with having your system slaved in terms of security compromise. In other other words, for kid hacks you should be able to give em a hardy boot and final farewell pretty easily with a little bit of preparation.
Some signs that I've found commonly for bloat/malware/other system compromises:
1. Hard drive light is persistently operating all the time.
2. System is poor and sluggish, poor resolution in graphics, graphics aren't loading properly going to any number of commonly popular web sites.
3. Your battery drains fast and is quite poor in terms of power management (my system at best were lasting at full charge for ten minutes, running no game application and generally resident idle on googles search bar tab, with no other tabs/web pages loaded).
4. Applications appear to load without your instruction. Audible system messages appear to randomly fire off.
5. Loss of control in key control functions in a given application (seems like a ghost is in your machine...nope).
6. You notice that you are automatically user logging out of web sites even though you didn't initiate this (clearer symptoms of possible key log intrusion). Usually when sites detect alternate IP addresses within a certain time frequency are indicating multiple log ins from remote locations (where inferred that a user couldn't direct travel from one location to the other in such time frame) may provide you a warning that your account may be compromised in terms of security. Here its always recommended you get on a secure system that you can trust and change your user account passwords as soon as possible. Avoid logging back into your user account on your compromised system, and if you have difficulty with the steps that I've indicated above you can always take your system to a tech center that you can trust, just make sure your windows os product keys lined up for re installations if necessary.
No comments:
Post a Comment