Messed up editing registry, need previous values

  • Thread starter Thread starter peg2009
  • Start date Start date
[See in line replies]
Richard, thank you so much for this very comprehensive reply.
Unfortunately,
because I needed to get this resolved quickly, I made a decision to follow
the recommendations of others on this thread and reformat/reinstall. I did
this also because even my backup registry file had been compromised by a
trojan, so I was backing up with (possibly) bad data. Starting over seemed
like the best shot at getting a cleaned-up system.

You're welcome. (There is more peace of mind with that method. :)


See my correction below about rejoining split lines.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\Zones]
@=""

Correction: Note that the "Internet Settings" part of that line SHOULD have
a space between "Internet" and "Settings" when rejoined. I tried it without
the space and it created a new "InternetSettings" key, which is incorrect. I
tried a new sample value/data merge without re-joining the lines and it
failed to add the new entry. (Nothing was added.) This is a problem for
posting such things in newsgroups which limit line length to 76 characters,
except where there are no spaces for it to automatically wrap lines. (Some
people set their newsreader line lengths to 70 or 72 characters.) A solution
for this particular path/key is to change "HKEY_LOCAL_MACHINE" to its
4-letter abbreviation and you have a 72 character line:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones]

That would still be a problem for newsreaders set to 70 characters or less,
and also, when quoting, extra ">" characters added would cause the line
length to increase, exceeding the limit. Of course, not rejoining the split
lines within square brackets caused no harm, because nothing happened with
that test. The software that controls the merge simply ignored that test
key. I would advise people that need to post such things as registry fixes,
batch files and such like, to include specific instruction on which lines
need to be rejoined, and how. Of course a link to a ready to use file on a
secure website would work too.


That is still a valid way to reset Internet Security values, as long as the
several trojan files have been eliminated so the values don't get changed
again. There is also a "Reset Web settings" button on the "Programs" tab,
and a "Restore Defaults" button on the "Advanced" tab. The "Privacy" tab
settings may need to be reset back to the default "Medium" or higher
settings. And possibly the Pop-up Blocker settings may need to be changed
back to Medium or higher.


peg2009 said:
The trojan was called Fakeavalert, the IE version is 7.

IE8 has better security, but that does not keep people from mistakenly
activating such a trojan by choice, thinking it to be a valid anti-virus
product. Too late for you, but the first search hit I got for that trojan
had this solution (note step#2 :)

Need HELP - removing virus Trojan_Fakeavalert - Yahoo! Answers
http://answers.yahoo.com/question/index?qid=20090609002202AAiS45k
| Resolved Question
| Need HELP - removing virus Trojan.Fakeavalert?
| My system got infected with the trojan.fakeavalert virus. I tried
| the instructions on symantec, ran adware and spybot but it is still on
| my PC and I have pop ups all over my system. Anyone knows how to get
| rid of this? Anything that you can send my way to delete?
| Please Help...Thank you so much.
| [3 weeks ago]
| - - -
| Best Answer - Chosen by Asker
| You can remove this virus from your computer by following
| these steps
|
| 1 Download and intall the Malwarebytes on your computer.
| 2 Update your Malwarebytes.
| 3 Scan your computer for all the malwares in your computer.
| 4 Remove all the malwares, found while scanning with the malwarebytes.
| 5 Restart your computer.
| Source(s):
| http://www.iyogi.ca
| [3 weeks ago]
| - - -
| Asker's Rating: ***** Asker's Comment:
| Great; this worked out for me. I also ran it in safe mode. Thanks !
- - -

Malwarebytes anti-malware
http://www.malwarebytes.org/mbam.php

Here is another page, that quotes the Symantec technical page, and does not
have a fix, except to format and reinstall, but does have a lot of links to
helpful security precautions to avoid future problems:
Virus trojan_fakeavalert now unvalidated
http://social.microsoft.com/Forums/...p/thread/a817d263-7d83-4e03-a50c-f07772b57221

Note this comment from the Moderator reply:
"Once an attack has commenced, if your anti-malware scanner was unable to
deal with the situation at first, it is impossible to identify the aftermath
of the matter."

Here is another caution from the HELP file on WinXP computers:
[begin quote:]
Why you should not run your computer as an administrator

Running Windows 2000 or Windows XP as an administrator makes the system
vulnerable to Trojan horses and other security risks. The simple act of
visiting an Internet site can be extremely damaging to the system. An
unfamiliar Internet site may have Trojan horse code that can be downloaded
to the system and executed. If you are logged on with administrator
privileges, a Trojan horse could do things like reformat your hard drive,
delete all your files, create a new user account with administrative access,
and so on.

You should add yourself to the Users or Power Users group. When you log on
as a member of the Users group, you can perform routine tasks, including
running programs and visiting Internet sites, without exposing your computer
to unnecessary risk. As a member of the Power Users group, you can perform
routine tasks and you can also install programs, add printers, and use most
Control Panel items. If you need to perform administrative tasks, such as
upgrading the operating system or configuring system parameters, then log
off and log back on as an administrator.
[:end quote]

And another case of someone whose problems began on or before 17Jun2009,
that was unable to get rid of the trojan by following the Symantec page, and
mentioned that Symantec offered to help her get rid of the trojan for
"$169.00". (Ouch! :)
Trojan FakeAValert - can't get rid of it
http://forums.majorgeeks.com/showthread.php?p=1346942

The Symantec writeup is here:
http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99&tabid=3

Where I made my error was this line:
"Restore the following registry entries to their previous values, if
required:"

This was followed by a long list of registry keys, and I proceeded
thinking that the values shown were the *correct* values. After I
finished checking the section relating to Internet Zones, I realized
that this wasn't the case. These were the values that might be assigned
by the trojan. I confirmed by comparing it to a list of possible
registry changes in the Technical Details part of the article. Both
lists were the same. Of course, by this time I didn't know what the
original values had been, so I went to my backup.

Wow. Now that I see how discombobulated that page is, I'm sorry I suggested
following their (quote/unquote) "guidance". The error was not on your part,
but is the fault of Symantec, since they did not provide correct "previous"
values for a lot of those registry items. Also, on the removal page, they
failed to make distinction between registry values that were "created" and
those "modified", but lumped them together in sub-part 5. The previous
"technical" page (&tabid=2) did make the distinction. The "created" entries,
(clearly indicated on the technical page,) do not need to be changed back to
a previous value, but simple should be deleted. Their "removal" page is
virtually useless, as it stands. They need to make a ".reg" file with the
correct values and deletions, that people can download and merge, to set
things back to default conditions. (But that might make them legally liable
if the registry got messed up.) I clicked on the "Contact Us" link at the
bottom of the page and got sent on a wild goose chase to various self-help
pages that neither had an email link or form reply to send comments.

Since the backup was created using a tool on Symantec's site, IE was open
during the backup. And it was open during the import as well. Common sense
should have told me to close programs during the import, but better to
know late than never.

Yes. And thanks for the reminder. (While I was monkeying around with my
registry, test merging split and joined lines in IE Zones, I had IE open.
Oops. I did have a backup copy of the registry though. :)
Thanks, again, for all the helpful suggestions in this post. I'm keeping a
copy of it, although it will be a long time (if ever) before I use regedit
again. However, it's good to know a better way to perform a registry
backup, or to backup certain sections.

Now if only I knew where the trojan came from.

Peggy


You're welcome. (If only we didn't walk so close to the edge! :)
--Richard
 
WARNING: POSTED IN HTML SINCE PLAIN TEXT WOULD RENDER
IT MOSTLY USELESS in format:

First:
How to recover from a borked registry:
http://support.microsoft.com/default.aspx?scid=kb;en-us;307545

Download Guided Help

----------------

Manual steps to recover a corrupted registry that
prevents Windows XP from starting
The procedure that this article describes uses Recovery
Console and System Restore. This article also lists all
the required steps in specific order to make sure that
the process is fully completed. When you finish this
procedure, the system returns to a state very close to
the state before the problem occurred. If you have ever
run NTBackup and completed a system state backup, you
do not have to follow the procedures in parts two and
three. You can go to part four.
Part one
In part one, you start the Recovery Console, create a
temporary folder, back up the existing registry files
to a new location, delete the registry files at their
existing location, and then copy the registry files
from the repair folder to the System32\Config folder.
When you have finished this procedure, a registry is
created that you can use to start Windows XP. This
registry was created and saved during the initial setup
of Windows XP. Therefore any changes and settings that
occurred after the Setup program was finished are lost.

To complete part one, follow these steps:
1.Insert the Windows XP startup disk into the floppy
disk drive, or insert the Windows XP CD-ROM into the
CD-ROM drive, and then restart the computer.
Click to select any options that are required to start
the computer from the CD-ROM drive if you are prompted
to do so.
2.When the "Welcome to Setup" screen appears, press R
to start the Recovery Console.
3.If you have a dual-boot or multiple-boot computer,
select the installation that you want to access from
the Recovery Console.
4.When you are prompted to do so, type the
Administrator password. If the administrator password
is blank, just press ENTER.
5.At the Recovery Console command prompt, type the
following lines, pressing ENTER after you type each
line:
md tmp
copy c:\windows\system32\config\system
c:\windows\tmp\system.bak
copy c:\windows\system32\config\software
c:\windows\tmp\software.bak
copy c:\windows\system32\config\sam
c:\windows\tmp\sam.bak
copy c:\windows\system32\config\security
c:\windows\tmp\security.bak
copy c:\windows\system32\config\default
c:\windows\tmp\default.bak

delete c:\windows\system32\config\system
delete c:\windows\system32\config\software
delete c:\windows\system32\config\sam
delete c:\windows\system32\config\security
delete c:\windows\system32\config\default

copy c:\windows\repair\system
c:\windows\system32\config\system
copy c:\windows\repair\software
c:\windows\system32\config\software
copy c:\windows\repair\sam
c:\windows\system32\config\sam
copy c:\windows\repair\security
c:\windows\system32\config\security
copy c:\windows\repair\default
c:\windows\system32\config\default
6.Type exit to quit Recovery Console. Your computer
will restart.

Note This procedure assumes that Windows XP is
installed to the C:\Windows folder. Make sure to change
C:\Windows to the appropriate windows_folder if it is a
different location.

If you have access to another computer, to save time,
you can copy the text in step five, and then create a
text file called "Regcopy1.txt" (for example). To use
this file, run the following command when you start in
Recovery Console:
batch regcopy1.txt
With the batch command in Recovery Console, you can
process all the commands in a text file sequentially.
When you use the batch command, you do not have to
manually type as many commands.
Part two
To complete the procedure described in this section,
you must be logged on as an administrator, or an
administrative user (a user who has an account in the
Administrators group). If you are using Windows XP Home
Edition, you can log on as an administrative user. If
you log on as an administrator, you must first start
Windows XP Home Edition in Safe mode. To start the
Windows XP Home Edition computer in Safe mode, follow
these steps.

Note Print these instructions before you continue. You
cannot view these instructions after you restart the
computer in Safe Mode. If you use the NTFS file system,
also print the instructions from Knowledge Base article
KB309531. Step 7 contains a reference to the article.
1.Click Start, click Shut Down (or click Turn Off
Computer), click Restart, and then click OK (or click
Restart).
2.Press the F8 key.

On a computer that is configured to start to multiple
operating systems, you can press F8 when you see the
Startup menu.
3.Use the arrow keys to select the appropriate Safe
mode option, and then press ENTER.
4.If you have a dual-boot or multiple-boot system, use
the arrow keys to select the installation that you want
to access, and then press ENTER.

In part two, you copy the registry files from their
backed up location by using System Restore. This folder
is not available in Recovery Console and is generally
not visible during typical usage. Before you start this
procedure, you must change several settings to make the
folder visible:
1.Start Windows Explorer.
2.On the Tools menu, click Folder options.
3.Click the View tab.
4.Under Hidden files and folders, click to select Show
hidden files and folders, and then click to clear the
Hide protected operating system files (Recommended)
check box.
5.Click Yes when the dialog box that confirms that you
want to display these files appears.
6.Double-click the drive where you installed Windows XP
to display a list of the folders. If is important to
click the correct drive.
7.Open the System Volume Information folder. This
folder is unavailable and appears dimmed because it is
set as a super-hidden folder.

Note This folder contains one or more _restore {GUID}
folders such as
"_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}".

Note You may receive the following error message:
C:\System Volume Information is not accessible. Access
is denied.
If you receive this message, see the following
Microsoft Knowledge Base article to gain access to this
folder and continue with the procedure:
309531 (http://support.microsoft.com/kb/309531/) How to
gain access to the System Volume Information folder
8.Open a folder that was not created at the current
time. You may have to click Details on the View menu to
see when these folders were created. There may be one
or more folders starting with "RPx under this folder.
These are restore points.
9.Open one of these folders to locate a Snapshot
subfolder. The following path is an example of a folder
path to the Snapshot folder:
C:\System Volume
Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}\RP1\Snapshot
10.From the Snapshot folder, copy the following files
to the C:\Windows\Tmp folder:
•_REGISTRY_USER_.DEFAULT
•_REGISTRY_MACHINE_SECURITY
•_REGISTRY_MACHINE_SOFTWARE
•_REGISTRY_MACHINE_SYSTEM
•_REGISTRY_MACHINE_SAM

11.Rename the files in the C:\Windows\Tmp folder as
follows:
•Rename _REGISTRY_USER_.DEFAULT to DEFAULT
•Rename _REGISTRY_MACHINE_SECURITY to SECURITY
•Rename _REGISTRY_MACHINE_SOFTWARE to SOFTWARE
•Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM
•Rename _REGISTRY_MACHINE_SAM to SAM


These files are the backed up registry files from
System Restore. Because you used the registry file that
the Setup program created, this registry does not know
that these restore points exist and are available. A
new folder is created with a new GUID under System
Volume Information and a restore point is created that
includes a copy of the registry files that were copied
during part one. Therefore, it is important not to use
the most current folder, especially if the time stamp
on the folder is the same as the current time.

The current system configuration is not aware of the
previous restore points. You must have a previous copy
of the registry from a previous restore point to make
the previous restore points available again.

The registry files that were copied to the Tmp folder
in the C:\Windows folder are moved to make sure that
the files are available under Recovery Console. You
must use these files to replace the registry files
currently in the C:\Windows\System32\Config folder. By
default, Recovery Console has limited folder access and
cannot copy files from the System Volume folder.

Note The procedure described in this section assumes
that you are running your computer with the FAT32 file
system. For more information about how to access the
System Volume Information Folder with the NTFS file
system, click the following article number to view the
article in the Microsoft Knowledge Base:
309531 (http://support.microsoft.com/kb/309531/) How to
gain access to the System Volume Information folder
Part Three
In part three, you delete the existing registry files,
and then copy the System Restore Registry files to the
C:\Windows\System32\Config folder:
1.Start Recovery Console.
2.At the command prompt, type the following lines,
pressing ENTER after you type each line:
del c:\windows\system32\config\sam

del c:\windows\system32\config\security

del c:\windows\system32\config\software

del c:\windows\system32\config\default

del c:\windows\system32\config\system

copy c:\windows\tmp\software
c:\windows\system32\config\software

copy c:\windows\tmp\system
c:\windows\system32\config\system

copy c:\windows\tmp\sam c:\windows\system32\config\sam

copy c:\windows\tmp\security
c:\windows\system32\config\security

copy c:\windows\tmp\default
c:\windows\system32\config\default
Note Some of these command lines may be wrapped for
readability.
3.Type exit to quit Recovery Console. Your computer
restarts.

Note This procedure assumes that Windows XP is
installed to the C:\Windows folder. Make sure to change
C:\Windows to the appropriate windows_folder if it is a
different location.

If you have access to another computer, to save time,
you can copy the text in step two, and then create a
text file called "Regcopy2.txt" (for example). To use
this file, run the following command when you start in
Recovery Console:
batch regcopy2.txt
Part Four
1.Click Start, and then click All Programs.
2.Click Accessories, and then click System Tools.
3.Click System Restore, and then click Restore to a
previous RestorePoint.


Back to the top

REFERENCES
For more information about using Recovery Console,
click the following article numbers to view the
articles in the Microsoft Knowledge Base:
307654 (http://support.microsoft.com/kb/307654/) How to
install and use the Recovery Console in Windows XP
216417 (http://support.microsoft.com/kb/216417/) How to
install the Windows Recovery Console
240831 (http://support.microsoft.com/kb/240831/) How to
copy files from Recovery Console to removable media
314058 (http://support.microsoft.com/kb/314058/)
Description of the Windows XP Recovery Console
For more information about System Restore, click the
following article numbers to view the articles in the
Microsoft Knowledge Base:
306084 (http://support.microsoft.com/kb/306084/) How to
restore the operating system to a previous state in
Windows XP
261716 (http://support.microsoft.com/kb/261716/) System
Restore removes files during a restore procedure



Twayne
 
Thanks for the additional input. I appreciate all the suggestions and will
look into Malwarebytes for sure the next time I have a problem. The Symantec
instructions were confusing, which is disappointing, because I've usually had
success following their articles. They also used to put removal tools in
their articles that possibly acted the way you suggest, but maybe caused some
problems.

If nothing else, this was a good learning experience, as I've often made a
registry backup when prompted by a program or troubleshooting article and
always blithely assumed I could just import the file if something went wrong.
Now I know it's not that simple.

Thanks again, Richard and all who responded.

Peggy


Richard said:
[See in line replies]
Richard, thank you so much for this very comprehensive reply.
Unfortunately,
because I needed to get this resolved quickly, I made a decision to follow
the recommendations of others on this thread and reformat/reinstall. I did
this also because even my backup registry file had been compromised by a
trojan, so I was backing up with (possibly) bad data. Starting over seemed
like the best shot at getting a cleaned-up system.

You're welcome. (There is more peace of mind with that method. :)


See my correction below about rejoining split lines.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\Zones]
@=""

Correction: Note that the "Internet Settings" part of that line SHOULD have
a space between "Internet" and "Settings" when rejoined. I tried it without
the space and it created a new "InternetSettings" key, which is incorrect. I
tried a new sample value/data merge without re-joining the lines and it
failed to add the new entry. (Nothing was added.) This is a problem for
posting such things in newsgroups which limit line length to 76 characters,
except where there are no spaces for it to automatically wrap lines. (Some
people set their newsreader line lengths to 70 or 72 characters.) A solution
for this particular path/key is to change "HKEY_LOCAL_MACHINE" to its
4-letter abbreviation and you have a 72 character line:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones]

That would still be a problem for newsreaders set to 70 characters or less,
and also, when quoting, extra ">" characters added would cause the line
length to increase, exceeding the limit. Of course, not rejoining the split
lines within square brackets caused no harm, because nothing happened with
that test. The software that controls the merge simply ignored that test
key. I would advise people that need to post such things as registry fixes,
batch files and such like, to include specific instruction on which lines
need to be rejoined, and how. Of course a link to a ready to use file on a
secure website would work too.


That is still a valid way to reset Internet Security values, as long as the
several trojan files have been eliminated so the values don't get changed
again. There is also a "Reset Web settings" button on the "Programs" tab,
and a "Restore Defaults" button on the "Advanced" tab. The "Privacy" tab
settings may need to be reset back to the default "Medium" or higher
settings. And possibly the Pop-up Blocker settings may need to be changed
back to Medium or higher.


peg2009 said:
The trojan was called Fakeavalert, the IE version is 7.

IE8 has better security, but that does not keep people from mistakenly
activating such a trojan by choice, thinking it to be a valid anti-virus
product. Too late for you, but the first search hit I got for that trojan
had this solution (note step#2 :)

Need HELP - removing virus Trojan_Fakeavalert - Yahoo! Answers
http://answers.yahoo.com/question/index?qid=20090609002202AAiS45k
| Resolved Question
| Need HELP - removing virus Trojan.Fakeavalert?
| My system got infected with the trojan.fakeavalert virus. I tried
| the instructions on symantec, ran adware and spybot but it is still on
| my PC and I have pop ups all over my system. Anyone knows how to get
| rid of this? Anything that you can send my way to delete?
| Please Help...Thank you so much.
| [3 weeks ago]
| - - -
| Best Answer - Chosen by Asker
| You can remove this virus from your computer by following
| these steps
|
| 1 Download and intall the Malwarebytes on your computer.
| 2 Update your Malwarebytes.
| 3 Scan your computer for all the malwares in your computer.
| 4 Remove all the malwares, found while scanning with the malwarebytes.
| 5 Restart your computer.
| Source(s):
| http://www.iyogi.ca
| [3 weeks ago]
| - - -
| Asker's Rating: ***** Asker's Comment:
| Great; this worked out for me. I also ran it in safe mode. Thanks !
- - -

Malwarebytes anti-malware
http://www.malwarebytes.org/mbam.php

Here is another page, that quotes the Symantec technical page, and does not
have a fix, except to format and reinstall, but does have a lot of links to
helpful security precautions to avoid future problems:
Virus trojan_fakeavalert now unvalidated
http://social.microsoft.com/Forums/...p/thread/a817d263-7d83-4e03-a50c-f07772b57221

Note this comment from the Moderator reply:
"Once an attack has commenced, if your anti-malware scanner was unable to
deal with the situation at first, it is impossible to identify the aftermath
of the matter."

Here is another caution from the HELP file on WinXP computers:
[begin quote:]
Why you should not run your computer as an administrator

Running Windows 2000 or Windows XP as an administrator makes the system
vulnerable to Trojan horses and other security risks. The simple act of
visiting an Internet site can be extremely damaging to the system. An
unfamiliar Internet site may have Trojan horse code that can be downloaded
to the system and executed. If you are logged on with administrator
privileges, a Trojan horse could do things like reformat your hard drive,
delete all your files, create a new user account with administrative access,
and so on.

You should add yourself to the Users or Power Users group. When you log on
as a member of the Users group, you can perform routine tasks, including
running programs and visiting Internet sites, without exposing your computer
to unnecessary risk. As a member of the Power Users group, you can perform
routine tasks and you can also install programs, add printers, and use most
Control Panel items. If you need to perform administrative tasks, such as
upgrading the operating system or configuring system parameters, then log
off and log back on as an administrator.
[:end quote]

And another case of someone whose problems began on or before 17Jun2009,
that was unable to get rid of the trojan by following the Symantec page, and
mentioned that Symantec offered to help her get rid of the trojan for
"$169.00". (Ouch! :)
Trojan FakeAValert - can't get rid of it
http://forums.majorgeeks.com/showthread.php?p=1346942

The Symantec writeup is here:
http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99&tabid=3

Where I made my error was this line:
"Restore the following registry entries to their previous values, if
required:"

This was followed by a long list of registry keys, and I proceeded
thinking that the values shown were the *correct* values. After I
finished checking the section relating to Internet Zones, I realized
that this wasn't the case. These were the values that might be assigned
by the trojan. I confirmed by comparing it to a list of possible
registry changes in the Technical Details part of the article. Both
lists were the same. Of course, by this time I didn't know what the
original values had been, so I went to my backup.

Wow. Now that I see how discombobulated that page is, I'm sorry I suggested
following their (quote/unquote) "guidance". The error was not on your part,
but is the fault of Symantec, since they did not provide correct "previous"
values for a lot of those registry items. Also, on the removal page, they
failed to make distinction between registry values that were "created" and
those "modified", but lumped them together in sub-part 5. The previous
"technical" page (&tabid=2) did make the distinction. The "created" entries,
(clearly indicated on the technical page,) do not need to be changed back to
a previous value, but simple should be deleted. Their "removal" page is
virtually useless, as it stands. They need to make a ".reg" file with the
correct values and deletions, that people can download and merge, to set
things back to default conditions. (But that might make them legally liable
if the registry got messed up.) I clicked on the "Contact Us" link at the
bottom of the page and got sent on a wild goose chase to various self-help
pages that neither had an email link or form reply to send comments.

Since the backup was created using a tool on Symantec's site, IE was open
during the backup. And it was open during the import as well. Common sense
should have told me to close programs during the import, but better to
know late than never.

Yes. And thanks for the reminder. (While I was monkeying around with my
registry, test merging split and joined lines in IE Zones, I had IE open.
Oops. I did have a backup copy of the registry though. :)
Thanks, again, for all the helpful suggestions in this post. I'm keeping a
copy of it, although it will be a long time (if ever) before I use regedit
again. However, it's good to know a better way to perform a registry
backup, or to backup certain sections.

Now if only I knew where the trojan came from.

Peggy


You're welcome. (If only we didn't walk so close to the edge! :)
--Richard
 
Back
Top