Solved

drastic solution to undetectable virus

Posted on 2006-06-28
3
199 Views
Last Modified: 2013-12-04
Some functions in Word are extremely slow; printing, page setup in in Excel, loading of files, etc.  I've run a complete virus scan and malicious software scan an nothing was detected.  It has been suggested to me to format my hard drive and start from scratch.  I want to use MS file and settings transfer wizard but am concerned that I'll be transfering any undetected virus or mal ware.  Is this true and is it safer for me to pick and choose the files I want to keep?  

Thanks

M. Cooper
0
Comment
Question by:coopfab
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
GeneralMandible earned 125 total points
ID: 17001859
I'm partial to picking and choosing.  You actually have an idea of what you are copying.  The F&S transfer wizard grabs files from everywhere, and a lot of them are not needed.  Yes, it is possible to move a virus over.

Have you ran the disk cleanup manager, chkdsk, and defrag on the system yet?  If not, it might be worth a try before blowing it away.
0
 
LVL 3

Expert Comment

by:GeneralMandible
ID: 17001870
I forgot...make sure the system is completely updated with up to date AV and anti-spyware before restoring any data.
0
 

Author Comment

by:coopfab
ID: 17003141
Thanks for the suggestions.  

M. Cooper
0

Featured Post

The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question