Solved

drastic solution to undetectable virus

Posted on 2006-06-28
3
198 Views
Last Modified: 2013-12-04
Some functions in Word are extremely slow; printing, page setup in in Excel, loading of files, etc.  I've run a complete virus scan and malicious software scan an nothing was detected.  It has been suggested to me to format my hard drive and start from scratch.  I want to use MS file and settings transfer wizard but am concerned that I'll be transfering any undetected virus or mal ware.  Is this true and is it safer for me to pick and choose the files I want to keep?  

Thanks

M. Cooper
0
Comment
Question by:coopfab
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
GeneralMandible earned 125 total points
ID: 17001859
I'm partial to picking and choosing.  You actually have an idea of what you are copying.  The F&S transfer wizard grabs files from everywhere, and a lot of them are not needed.  Yes, it is possible to move a virus over.

Have you ran the disk cleanup manager, chkdsk, and defrag on the system yet?  If not, it might be worth a try before blowing it away.
0
 
LVL 3

Expert Comment

by:GeneralMandible
ID: 17001870
I forgot...make sure the system is completely updated with up to date AV and anti-spyware before restoring any data.
0
 

Author Comment

by:coopfab
ID: 17003141
Thanks for the suggestions.  

M. Cooper
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host Profile issue on Esxi 5.5 U3a 6 650
SSL certificate pack 6 427
Using icacls to block access to mstsc, cmd & PowerShell 4 176
Should One Always Sign Out Of Admin User A/C 5 90
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question