Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Following the scan, which usually takes fourty minutes or longer if you scan the entire system, you are hit with the "access denied" error. Frustrating, for sure, but being the savvy computer user that you are you decide to boot to safe mode to take care of the issue. No spyware can load when booted to safe mode, right?
Wrong.
The newer variants of the CoolWebSearch, HuntBar, and VX2 infections all load even when safe mode is used. There are a few different ways of accomplishing this, the most common being that the spyware registers itself as a critical system process. This ensures that it is loaded regardless of what happens, and makes it much harder to shut down.
If you can't prevent it from loading then how do you kill it? The answer to that is easier than it might seem. If you're running Windows 98 or ME, then the easiest way is to boot to DOS, and use a command-line scanner to search your hard drive. These scans actually tend to run a bit faster, since they have more system resources available to them courtesy of no GUI being loaded.
"Well, that's all fine and dandy", you're likely thinking to yourself, "I run Windows XP. You can't read it from DOS." True. You can't read NTFS hard disks from DOS. However, you can use Barts PE.
Barts PE is effectively a stripped version of Windows XP. It boots completely from a CD, and loads a simple graphical user interface. Coupled with plugins, McAfee, for example, you can scan your entire computer without the fear that your nifty little infection has somehow loaded.
For more information on how to setup Barts PE and McAfee within it, visit:
http://www.tweaksforgeeks.com/Setup_Barts_PE.html
http://www.tweaksforgeeks.com/B arts_PE_McAfee_Setup.html
Kevin Souter is a full time computer repair technician. He also operates a free spyware removal site, as well as a general computer repair site.
![]() |
|
![]() |
|
![]() |
|
![]() |
Well, this is an article I never thought I would... Read More
When it comes to a secure website and passwords it... Read More
Computer security for most can be described in 2 words,... Read More
You and I are a lot alike. We are both... Read More
There is no doubt that "how-to articles" have become a... Read More
There is nothing more important that password security in world... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Have been an Internet user for more than 9 years,... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Today the internet is a mine field of malicious code... Read More
Since its birth, the Internet has grown and expanded to... Read More
As more people are logging onto the Internet everyday, Network... Read More
Working from home has its advantages, including no commute, a... Read More
Have you ever bought a product or service from the... Read More
Spyware is software that runs on a personal computer without... Read More
Long gone are the days that we could feel secure... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
As you know, this time the virus under the name... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
In 1997, I decided after 15 years as a practicing... Read More
When the Internet first came about, it was realized it... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Every single time you access a website, you leave tracks.... Read More
Over the past few years as the internet has become... Read More
In recent days, I was one of the unfortunate persons... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
File sharing on p2p is soaring despite the music and... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Over £5 billion pounds was spent on online shopping in... Read More
No longer are viruses the only threat on the internet.... Read More
Huge number of spyware software applications are available in the... Read More
The Internet is a vast International Network of people and... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
This is not some new fangled techno-speak, it is a... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
If you are a parent, as am I, I think... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Over the past few years as the internet has become... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Every now and then you can read about a new... Read More
The words Corporate Security may conjure up images of a... Read More
It's late. You've been scouring the web for that perfect... Read More
If you have used a Windows machine for a while,... Read More
You've seen it in the news - 40 million credit... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
If you know what is the 'Fishing' then it's very... Read More
A couple of days ago, I was searching for a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
By browsing a web page, you could infect your computer... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Nobody wants to pay to remove spyware. At the very... Read More
My first experience with a spyware BHO based infection was... Read More
Let us take the example of scrambling an egg. First,... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Internet Security |