?
Solved

How to check for encryption viruses

Posted on 2016-08-23
3
Medium Priority
?
29 Views
Last Modified: 2016-11-15
Customer thinks he may have clicked on something (novice user)

How do I test to see if all is ok or not?
What Ap is particularly good?

I'm testing with trend micro house call now

Also is it a good idea to revert backward a day beofre if there is an all clear just to be sure to be sure ?

Thanks
0
Comment
Question by:feck1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
gilnov earned 2000 total points
ID: 41767922
I like Emsisoft's emergency kit: https://www.emsisoft.com/en/software/eek/

I think you'll find the command line scanner particularly useful in your situation because you can run it from a USB stick without having to install anything. Put it on a bootable USB stick, boot from the stick and run the tool for best results.

Reverting to a restore point probably won't help because many viruses delete all restore points. However, if you see available restore points, it's a good indicator that you don't have that kind of virus (but it doesn't mean you don't have another kind).
0
 

Author Comment

by:feck1
ID: 41768375
What do you think of Kapersky rescue disk ?
0
 
LVL 7

Expert Comment

by:gilnov
ID: 41768606
I haven't ever used it so I can't give an opinion.
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Change your password...do it now!. Probably the easiest point of access to your account is through guessing your password. If your password is guessable, do change it now. If not for your sake but for everyone else in your friends list. Remember …
PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question