virus in hardware

Posted on 2005-04-26
Last Modified: 2010-08-05
I was asked to fix someones computer that has millinium.
when I installed the boot disk and ran setup it gave me the error 'program too big to fit in memory'
I think i found the probem but I don't know how to remove it. I think it corrupts the explorer.exe file
I took out the hard drive and did a virus scan and removed the viruses but when I put the hard drive back in the old computer and tried to run the setup again I came to the same problem again.
Is there a program that I can put onto a floppy and disinfect the main memory?
Question by:genesisproject
    LVL 29

    Accepted Solution


    Why don't you FDISK and FORMAT before installing?

    LVL 12

    Expert Comment


    Do as Zee suggests above.
    It sounds like you've got a virus in the Master Boot Record or
    the Partition Tables.

    LVL 29

    Expert Comment



    Why the "C" grade?

    If that didn't help, and quoting from:

    # C: Because Experts' reliability are often judged by their grading records, many Experts would like the opportunity to clarify if you have questions about their solutions. If you have given the Expert(s) ample time to respond to your clarification posts and you have responded to each of their posts providing requested information; or if the answers, after clarification, lack finality or do not completely address the issue presented, then a "C" grade is an option. You also have the option here of just asking Community Support to delete the question.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Suggested Solutions

    Article by: btan
    The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now