Hello Pete
Thank you for your email message, short and sweet though it was! I had hoped
that you would have responded to my reply but ............... ah, well!
A long time ago someone said to me " Just because you are paranoid, it
doesn't mean that someone is *not* following you!" - Think on that!
No - I am not paranoid. I am seeking only the truth and a better
understanding of what bad guys do and why they do it. Oh yes ...... and
*how*!
Almost a bit like Conficker, huh? Reads like good, safe computing and
realtime antimalware applications are needed Dave.
I have tried many anti-virus and anti-spyware programmes - free ones, trial
ones and some I have purchased from a retail store on disk. I have also been
to many dark and nasty places on the 'net and have no doubt at all that my
PC has been attacked. I've experimented with 'cleaning' with the help of
helpers on forums (some say fora!). I have experimented with Hijackthis
without help. I have played with Combofix, ATF Cleaner, SmitfraudFix etc.
I have also looked inside every file in System 32 using Notepad ('cause I
could and had the time!)
I have flattened both this and a previous machine many, many times and have
also used Norton Ghost from time to time too.
Reputation leads to trust. If David Lipman suggested an MBAM scan for a
particular infection you described in /your/ computer, what would you do?
In essence, do I trust David H Lipman?
In spite of all the bad things said about pcbutts1 - the *only* person ever
to send me pornographic filth by email was Mr Lipman himself.
Intrusion Detection Systems (IDS), realtime antimalware scans, or
flatten, rebuild, restore from backups.
My point is, Pete, that if all appears to operate normally, a user will not
seek out rogue programmes which may be running on their machine. A machine
could be compromised without their knowledge.
You already know that answer.
I *do* know - it can and does happen. The question remains, though
............. are some of those purporting to be good guys actually bad guys
in cognito?
Trust must start somewhere and some paranoia is useful.
MBAM has our trust through its reputation Dave. A bogus MBAM /could/ be
downloaded from a disreputable source of course. But by only
downloading from MalwareBytes.com, it comes as close to 100% trust as is
possible.
Some software authors will provide md5/sha1 hashes or PGP/GPG signed
files that accompany the download and this is welcomed by some, but some
reluctance on the part of authors and users is making that level of
verification difficult. How then do we implement: trust but verify?
If one is paralyzed by so much suspicion and doubt, then it's probably
best to leave your computer turned off or only surf the net and do email
through LiveCDs.
What will you do now Dave?
I really appreciate your help and advice, Pete. I read posts which you make
to others experiencing difficulty and I have no concerns about anything
*you* say. Although I still know little about computing matters I have a
sixth sense when it comes to noticing how some who post react and/or do not
tell the truth or who are inconsistent in their answers.
My strong inclination is to use Linux on this PC (when I can master things
better) ....... and buy myself an iMac after this years boating season!