Jump to content

kingpinzs

Active Members
  • Posts

    5
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

kingpinzs's Achievements

Newbie

Newbie (1/14)

  1. I am creating an automated way to remove rootkits, viruses and other malicious programs from windows xp to windows 7 then runs win updates on all the systems. It’s for a fun raiser for my collage club. I was just wondering what you hackers think is the best way to remove all the crap of a windows system? so far I have SuperAntiSpyware Malware bytes AntiMalware Lava soft Ad-aware SpyBot S&D CCleaner Hitman Pro 3.5 combofix MSE Rootkit buster Anything else I should include to make sure the system is not compromised in any way and will run as fast as possible Yes I know many will suggest switching to Linux/Unix But from personal experience Its not dummy proof user friendly Remember these people just like clicking on buttons Any suggestions
  2. I am creating an automated way to remove rootkits, viruses and other malicious programs from windows xp to windows 7 then runs win updates on all the systems. It’s for a fun raiser for my collage club. I was just wondering what you hackers think is the best way to remove all the crap of a windows system? so far I have SuperAntiSpyware Malware bytes AntiMalware Lava soft Ad-aware SpyBot S&D CCleaner Hitman Pro 3.5 combofix MSE Rootkit buster Anything else I should include to make sure the system is not compromised in any way and will run as fast as possible Yes I know many will suggest switching to Linux/Unix But from personal experience Its not dummy proof user friendly Remember these people just like clicking on buttons Any suggestions
  3. The computer is in a house with no wirless.
  4. So this is the first time I know someone that had there email actuely stolen. They said that they only been on 4 legit websites today and an hour later their addressbook was mass emailed about being in england and needing money so we called him and now he cant get into his rmail. How in the world could this happen if nobody had physical acsses to the box. I am not asking how to do it myself I am just trying to figure out if the people who got emailed if theres are going to be stolen also since I dont know how it happne in the first place and also when I go to his computer what should I look for to see how they did it.
  5. I was wondering if a server can be ran localy on a system from a usb key under user mode?
×
×
  • Create New...