D
Default_user88525
Over 18 Windows PCS infected. As mentioned previously I paid for Windows annual support plan -as well as others. All others refunded $ per policy. Windows had same policy but unique in that they never how ored terms of policy, instead offered to send 3 new OS and then never did that either. Pointing out this 1st just to caution anyone considering that option.
Eventually went thru 18 Windows pCs in 2.5 years all now bricked. Trojan not only corrupted OS but destroyed partition, BIOS, MBR, and more so resetting useless. Windows store told me network hijacking not possible and suggested I watch less porn thereby insulting me in addition to being of no help. One tool, in all the software available from awindows, including entire Sysinternals suite marginally helpful, SuninACL. Unfortunately this worked 1 time until host adapted enough to prevent installation again.
It turns out that the infection was bot net host. This info cost ca. $11,000 considering all costs and did not fix.I have tried giving explicit settings to Defender but since infection is a host/server
The following issues: changed pC name, changed activation code, loss of permissions, ineffective anti-malware, broken shortcuts, change to built in (and any ability I have to become admin). According to 1 network analyzer sensitive enough apable of to detect actual info beyond the flutter host gives to other detection tools detected the following. Showed geo. 125 miles from me, showed actual host name , crawl.66-249-90.googlebot.com. Showed a proxy that neither Google nor windows could show with address given as 66.249.79.60 and 198.143.79.97 and more.
Information, as usual, poor substitute for either knowledge or wisdom since all infections have either sys administration or Server admin priceless and I can do nothing to remove registry keys written in both Chinese and Cyrillic (Russian). Trend-micro has network version of house Calls which must be effective given the impossibility of downloading or running, hosts caches locked and cannot take ownership. Entire Win.10 OS has been replaced by very simple similar OS that no, security program can detect. Cannot use portable devices as power bets shut down tor any port with info.
I just wanted to make sure they know all of this so when I start getting subpoenaed for clients information getting sold, I can point direction to Windows general counsel along with the multiple replies in which my suspicious were dismissed as impossible.
F someone on forum has any suggestions on how to remove proxy, corrupt programs, registry keys, entire OS which -in at least 2 cases resulted with infection to motherboard, I would truly appreciate. I'm just glad that the courts ruled that Microsoft was not a monopoly which would have forced me to buy Windows as the only OS on PCS or given them profit draining regulations such as abiding by the rules they wrote for the warranty guaranteeing money back if techs could not fix problem.
Continue reading...
Eventually went thru 18 Windows pCs in 2.5 years all now bricked. Trojan not only corrupted OS but destroyed partition, BIOS, MBR, and more so resetting useless. Windows store told me network hijacking not possible and suggested I watch less porn thereby insulting me in addition to being of no help. One tool, in all the software available from awindows, including entire Sysinternals suite marginally helpful, SuninACL. Unfortunately this worked 1 time until host adapted enough to prevent installation again.
It turns out that the infection was bot net host. This info cost ca. $11,000 considering all costs and did not fix.I have tried giving explicit settings to Defender but since infection is a host/server
The following issues: changed pC name, changed activation code, loss of permissions, ineffective anti-malware, broken shortcuts, change to built in (and any ability I have to become admin). According to 1 network analyzer sensitive enough apable of to detect actual info beyond the flutter host gives to other detection tools detected the following. Showed geo. 125 miles from me, showed actual host name , crawl.66-249-90.googlebot.com. Showed a proxy that neither Google nor windows could show with address given as 66.249.79.60 and 198.143.79.97 and more.
Information, as usual, poor substitute for either knowledge or wisdom since all infections have either sys administration or Server admin priceless and I can do nothing to remove registry keys written in both Chinese and Cyrillic (Russian). Trend-micro has network version of house Calls which must be effective given the impossibility of downloading or running, hosts caches locked and cannot take ownership. Entire Win.10 OS has been replaced by very simple similar OS that no, security program can detect. Cannot use portable devices as power bets shut down tor any port with info.
I just wanted to make sure they know all of this so when I start getting subpoenaed for clients information getting sold, I can point direction to Windows general counsel along with the multiple replies in which my suspicious were dismissed as impossible.
F someone on forum has any suggestions on how to remove proxy, corrupt programs, registry keys, entire OS which -in at least 2 cases resulted with infection to motherboard, I would truly appreciate. I'm just glad that the courts ruled that Microsoft was not a monopoly which would have forced me to buy Windows as the only OS on PCS or given them profit draining regulations such as abiding by the rules they wrote for the warranty guaranteeing money back if techs could not fix problem.
Continue reading...