On Sun, 11 Apr 2004 00:46:19 -1000, "NoNoBadDog!"
A bit harsh, don't you think?
Someone tries to install a new OS onto a system that's not working, in
order to fix it? Yes, that's terminally stupid, but a depressing
number of *advice-givers* here don't know that.
If the dude was sitting a PC tech examn, you could call him a fool
etc. but he isn't - so there's no reason to expect compitence
(especially as he's here asking for help, not shouting the odds as
someone claiming to have clue).
The scenario is a common one,
That's depressing, and I blame advisers who glibly say "Just
re-install Windows, you won't lose your settings!" Now THOSE are who
I'd throw against the wall when the revolution comes
What error messages?
Bummer #1
and he uninstalled windows XP. He tried to reinstall it
Bummer #2
No, they should not be - but can be lost if:
- you used NTFS features to keep your data "secure"
- the re-installation barfed the HD contents
- you formatted the HD
- hardware defects ate your data
You are quite right to prioritize data survival above "getting Windows
running again". Your objectives should be:
1) Make sure your data is SAFE
2) Check the PC's hardware
3) Formally exclude active malware ("virus", "worm" etc.)
4) Get the system running again
You should ideally stay OUT of Windows until (4). Windows cannot run
without writing to the HD (hard drive) and is likely to run malware
embedded in it. If hardware is bad (sick HD, RAM errors) then writes
to the HD may go to the wrong place and overwrite data. If there is
malware active, it may perform malicious actions, especially if it
detects attempts to kill it while it is running.
So, best practice is to NOT run Windows again until your data is safe.
Then, now that the stakes are lower, you can test the hardware.
Once you can trust the hardware not to mess up the HD contents,
formally clean the OS.
Once you can trust the OS not to perform malicious actions against
you, you can run it to try and fix it up.
This requires a maintenance OS to access data (so you can save it off
the risky PC), to run diagnotics, and to run the antivirus scanner and
cleaner. If you are on FATxx, you can use DOS mode to host these
processes, but there's no maintenance OS for NTFS.
Take the PC to someone with clue worth paying for - unless the data's
overwritten or the file system is corrupted (or you've used NTFS
security to deliberately block access to data) it shouldn't be too
costly to copy off the data.
If you want to DIY, or a buddy needs pointers:
http://users.iafrica.com/c/cq/cquirke/bthink.htm - before you think;
the things to do *first* before faffing around!
www.memtest86.com and
www.simmtester.com - two sites from which you
can download effective RAM diagnostics that run from boot diskettes
http://users.iafrica.com/c/cq/cquirke/virtest.htm - conceptually, how
to do a formal virus check so that the active malware you seek is not
alerady running when you try to detect or remove it
www.f-prot.com,
www.nod32.com and
www.sophos.com - three sites you can
download free or free-evaluation DOS-based antivirus apps that can be
run from a DOS mode boot diskette, if your file system is NOT NTFS
Your hard drive vendor's website, for free diagnostics to test the
hard drive for defects without "fixing" anything
Until you are certain that the hardware is OK, attempts to "just
re-install Windows" are likely to make things considerably worse, as
well as destroy your data. Do NOT EVER do that as a "first step" !!
-------------------- ----- ---- --- -- - - - -
Running Windows-based av to kill active malware is like striking
a match to see if what you are standing in is water or petrol.