
Help! Error-UNMOUNTABLE_BOOT_VOLUME?
#16
Posted 18 September 2006 - 04:56 PM
Register to Remove
#17
Posted 18 September 2006 - 06:40 PM
If you wish, you may Donate to help keep us online.
#18
Posted 18 September 2006 - 06:50 PM

#19
Posted 18 September 2006 - 07:06 PM

If you wish, you may Donate to help keep us online.
#20
Posted 18 September 2006 - 07:24 PM
Edited by Starwalker, 18 September 2006 - 07:26 PM.
#21
Posted 18 September 2006 - 07:59 PM
give us a list please.
you need:
Firewall - One - software Firewall (ZoneAlarm, or Sygate are good and free)
AntiVirus - One - I run AVG (free) on all the machines I service
AntiSpyware - a few -
---Spybot Search & Destroy - version 1.4
---Ad-Aware SE Personal version 1.06
---Ewido (free) download at www.grisoft.com
Blocking - one or more
---SpywareBlaster from www.javacoolsoftware.com
---Spyware Guardian from www.javacoolsoftware.com (can be a resource hog and I actually don't run it)
---IE Spyad from - http://www.spywarewa...m/uiuc/main.htm (some people don't like this because it actually "blocks" alot of the "pretty adds" from being displayed that they like to look at)
---Host File - (actually SpywareBlaster does a good job and Host file can be "tricky" so you should read alot before installing.
Spam Filter - MailWasher - http://www.mailwasher.net/
How about "Paid Products" like Spy Sweeper, CounterSpy, Spyware Doctor, etc.?
I have run all of them and I'm very happy with each. Those three are regularly in the "Top Product" ratings.
I don't spend the money for alot of reasons. One of which is that the above list does the job very well, thank you very much. And....... Each of the above Paid Products can hog a ton of resources, especially when run in the background.
How about MS Malicious Software Removal Tool? Yeah, OK, you'll get it via Updates anyway.
How about MS Windows Defender? It does a good job on some machines. I don't like it. I don't run it.
Other questions? Ask away.
Best Regards
If you wish, you may Donate to help keep us online.
#22
Posted 21 September 2006 - 01:30 PM

#23
Posted 22 September 2006 - 12:50 PM
Thank you again for your PM confirming that the procedures posted above and your hard work, have been successful in restoring your "problem" computer to full functioning status. Good Work!
I'll also repeat here my recommendation that you consider a regular practice of "backup" of important documents, data, and files, and my suggestion that an External Hard Drive can be useful in that endeavor.
Another strategy for "backup" that does not require purchase of hardware is also available and commonly used. That is, that the computer owner/user divides the Hard Drive into "partitions" such that they appear as independant drives and are labled with their own drive letter, for instance: D:\, E:\, F:\, etc.
The owner/user then reserves drive C:\ for their Windows Operating System, Installs "application" programs on Drive D:\, Stores important Documents and Files on Drive E:\, and may have additional '"partitioned" Drives for such items as F:\ mpg/Tunes, Drive G:\ Games and gaming archives, and on and on.
The advantage of the above "partitioning" strategy is many-fold. Foremost, is that if the machine experiences operating system failure or infection, the independantly partitioned drive C:\ can be worked on, repaired, and even formatted and reinstalled, without damaging the separately partitioned drives for applications, data, tunes, games, etc.
A partitioned hard drive also assists in routine maintenance. For instance, Defragmenting C:\ is easier and faster than defragmenting the entire physical hard drive. Other routine maintenance benefits similarly.
Some folks us Norton Ghost, or Acronis to create a complete "iso image" of their hard drive or just of their "operating system". With an "image" saved the owner/user who runs into trouble with their system can simply Format and restore with minimal time and steps. I don't personally use iso image backups (maybe I should and will in the future) but I do have my Hard Drives partitioned for easier backup to CD for my documents and for easier maintenance/repair of my OS.
_________________________
As to Anti-Malware software to install onto your computer.
I listed various recommended products in the previous post.
All of the products that I listed with recommendaiton can be obtained in a (free) version.
The (free) versions of those products contain all of the protective functions and qualities that are contained in the (paid) version of the same product. I recommend, and run on my own machines, only the (free) versions of those products. I have been doing so, with the above list for years and on dozens of computers, both my own and those belonging to clients who entrust their computer's care to me. No grief so far.
Recommending specific products, like I have above, sometimes creates a storm of controvery. Somebody will say that Kerio or Sygate Firewall is better than Zone Alarm. Or somebody else will report that their machine got infected, even though they had AVG installed. Hey, there are no guarantees! And preparedness is better than just crossing your fingers and toes.
Bottom line:
use a Firewall
use an AV product
use a couple of AntiSpyware products
use a blocking (restricted zone) product
Bottom-Bottom Line: Use your intelligience when surfing.
Bottom-Line Technical consideration:......
Amazingly little thought of, but hugely important!!!
Create "Limited User Accounts" and do ALL of your online activites from Limited User Accounts!
The full explanation is rather wordy, but think of it this way. As a limited user account, one cannot "install applications", cannot make serious changes in the Operating System, and cannot make serious changes to the Registry. So if an owner/user is "surfing the net" while logged on as a "limited user account", and runs afoul of spyware/virus, the infection only has access to the limited level of "privilege" that the limited user account possesses. Therefore, the spyware/virus cannot install/activate its malicious payload, and any "damage" is limited to the limited user account and does not, in most cases, have the ability to spread to the entire machine, registry and operating system.
You'll get some "gripes" from your children. "Why can't I install this new nifty add-on that I want?!!!"
Oh well. If a new add-on or software is wanted or legitimately needed, then the owner/user can log-off and log-into the "password-protected" Administrative Account to download and install. Makes a person think first, before "clicking".
About Ccleaner, and others like ATF Cleaner, and CleanUp!4.5.2
I use CleanUp!4.5.1 (haven't upgraded to 4.5.2, but probably will)
Here's the list of stuff that you should be mindful of cleaning off your machine on a regular basis:
Clean up your temporary and temporary internet files.
QUOTE
Here's a complete routine to manually do that:
To clean out all the temporary files and cookies on your system.
Go to
Start - Run - (type) "cleanmgr" without the quotes.
Let it scan your system for files to remove.
Check these three boxes and then press ok to remove:
Temporary Files,
Temporary Internet Files,
Recycle Bin.
Then GoTo:
Start - Find/search - Files or folders - in the named box, type: *.tmp
When the list is generated, choose
Edit - select all - File - delete.
Note: If you cannot delete them all at once because you have too many, then click and hold ctrl and highlight a batch of them at a time. Once highlighted, R-click over the highlight and select delete.
Then use
Start - Run - (type) "%temp%" (without the quotes).
Delete the entire contents of that "temp" folder
(use Edit - Select All - press "Delete", click "Yes").
Then,
Empty your Temporary Internet Cache completely.
Close all instances of Outlook and Internet Explorer,
then use "Control Panel - Internet Options - General tab and click the "Delete File" button.
When prompted place a check in: "Delete all offline content", then click OK.
Then, use Windows Explorer to clean out ALL the other temp folders on your system
(navigate to the folder, (as listed below)
use "Edit - Select All", press "Delete", click "Yes"
* C:\Documents and Settings\<Your Profile>\Local Settings\Temp\
* C:\Documents and Settings\<Any other users Profile>\Local Settings\Temporary Internet Files\
* C:\Documents and Settings\<Any other users Profile>\Local Settings\Temp\
* C:\Windows\Prefetch\
* Empty your "Recycle Bin".
Note: This is a long manual way to clear out .tmp files. It is safe and highly recommended.
Eventually you may wish to use a "tool" to do this procedure for you on a regular basis.
Download: CleanUp! 4.50 from http://www.stevengould.org
Read about all the options for using this device and use it only after you are satisfied that you understand what it will do for you. I use it regularly, and have a squeaky clean computer as a result. I recommend the default setting that are set during installation.
After doing the above routines, do this separate cleaning of your ActiveX, applets and Java routines:
GoTo:
Control Panel - JAVA - (this will open your JAVA Control Panel)
(in some cases the steps might be Control Panel - JAVA plugins)
Once your JAVA Control Panel is open, you will see a Button down toward the bottom of that panel labeled "Delete Files"
Click - Delete Files - OK, Then close your JAVA Control Panel and Reboot.
Note: The current version of JAVA Runtime Environment is Version 8. If you are running an older version, there are specific "vulnerabilities" that have corrected in Version 8. Recommended: Use Add/Remove to "completely" uninstall your Current JAVA Runtime Environment. Then go to C:\Program Files and Delete the entire Folder of JAVA. Then install the newest version of JAVA Runtime Environment. Get it here:
http://www.java.com/...load/manual.jsp
Please note that in doing the above routines, you will "lose" any auto-login settings that Window has saved for you regarding Websites that you visit that require Username and Password to access the site, and any ActiveX scripts necessary to interact with the Website.
This is not a problem, since you will merely be required to "re-enter" your Username and Password the next time you visit any such site. (for instance, Here at TomCoyote) Or you will be asked to download a fresh copy of any required ActiveX. After that, Windows will again remember the settings for you and you will be able to auto-login again.
It's a good idea to clear up these features on a fairly regular basis, for a couple of reasons. First, ActiveX and applet routines occasionally become corrupted and can be infected with some malwares. Second, temporary internet files are often the first entry point of spyware/malware.
So, the question is: "Do you want to do that Manually on all of your machines? Or would you prefer a safe, automated utility to do that for you with just a few clicks when you are finished with your machine for the night, or after a seriously intense session on the internet?"
I generally recommend that the owner/user do it Manually for a few times, just to get to know what is required. Then using an automated program "makes more sense".
Note: Clearing your JAVA Cache remains a separate operation via Control Panel - JAVA or JSRE - JAVA Control Panel - Delete Files.
Regarding Paid vs. Free utilities:
The AntiMalware community "is" a community. Research is constantly under development. One company may "discover" a threat, before other companies discover the same thing. One company may develop a "fix" before the others do. But then the research is shared, and rapidly, all the companies update their .dat files to accomodate the "fix". At any one time, XYZ Company may be more "up-to-date" than ABC Company, but both will have shared resources within a day or so and be back on a level playing field. If companies are "rated" on a day that "XYZ Company" has recently "made a discovery" then XYZ company is "better", right? No. They may be "Queen for the Day", but remember, it's a community. By and large, the same major companies remain in the top Ten and trade places in the priority of ratings, based on whose team made the most recent discovery or innovation. I suspect it will remain so for the foreseeable future.
If you want additional information or opinion, check around at the various Forums.
BleepingComputers.com
SWI.com
PCPitstop.com
Ahuma.com
PCWorld Magazine
CNET.com
etc.
And our very own Experts here at TC often provide information about their recommendations.
TomCoyote gives a full listing of the protective utilities he uses on his machine.
The various forums offer "security baseline" recommendations in their Malware pinned posts.
In general, the recomendations that you will find will not be terribly different from my suggestions above, though some alternatives and preferences will be added or prioritized differently.
I wish you well in your endeavors.
Best Regards
Edited by dough, 22 September 2006 - 01:06 PM.
If you wish, you may Donate to help keep us online.
#24
Posted 22 September 2006 - 02:28 PM


Register to Remove
#26
Posted 22 September 2006 - 02:36 PM
If you wish, you may Donate to help keep us online.
#27
Posted 22 September 2006 - 02:43 PM
http://www.pcpitstop.com
one test each for
--Your Son's machine
--You own machine.
Please label which TechExpress link goes to which machine.
If you wish, you may Donate to help keep us online.
#28
Posted 23 September 2006 - 03:20 AM


#29
Posted 23 September 2006 - 12:28 PM
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users