D
Dennis
Guest
Well, I guess everyone will have it if it can't be detected and cleaned...
PA Bear [MS MVP] wrote:
> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015
>
> Backdoor.Tidserv does a very good job in that sense, especially with the
> latest version (TDL3), which uses an advanced rootkit technology to hide
> its
> presence on a system by infecting one of the low-level kernel drivers
> and then
> covering its tracks. *While the rootkit is active there is no easy way to
> detect the infection*, [emphasis mine] and because it goes so deep into
> the kernel, most
> users cannot see anything wrong in the system...Even worse, because the
> infected
> driver is critical for system boot-up, Windows will not boot in Safe Mode
> either [after having installed MS10-015 on an infected machine].
>
> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015
>
> Tdss rootkit silently owns the net
>
> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that is
> quickly spreading around the world. While a number of rootkits are just
> developed as a proof of concept, this is not the case. Tdss rootkit is well
> known to antivirus companies because of its goal to get total control of
> the
> infected PCs and using them as zombies for its botnet.
>
> During these years it has always shown a team of skilled people behind
> it, who
> always applied advanced techniques often able to bypass antirootkit
> softwares.
> Actually, this last variant could be easily named as the stealthiest
> rootkit
> in the wild.
>
> This infection is bringing all together the best of MBR rootkit, the
> best of
> Rustock.C and the experience of old Tdss variants. *Result is an
> infection that
> is quickly spreading on the net and it is undetected by almost every
> security
> software and 3rd party anti rootkit software*. [emphasis mine]
>
> ...currently no antirootkit is able to bypass disk filtering
> technique used by Tdss rootkit but, even if it was possible, this rootkit
> could not be detected by file size cross check because file size of the
> original and infected files are exactly the same.
>
> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html
>
>
> Dennis wrote:
>> EVERY anti-malware and anti-virus program says the computer is
>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an
>> on line scan says it is clean. If they can't find it then every
>> computer will be infected eventually because it isn't detectable
>> by current means available. So at that point your info is no safer
>> than hers on that computer.
>>
>>
>> PA Bear [MS MVP] wrote:
>>> Meanwhile, your data (e.g., online banking usernames and passwords) may
>>> have been compromised and your computer may still be functioning as a
>>> malware-bot for the Bad Guys. Guess time will tell about all that, too,
>>> eh?
>>>
>>> Dennis wrote:
>>>> I guess time will tell.
>>>>
>>>> PA Bear [MS MVP] wrote:
>>>>> If you needed that fix, I wonder what else might still be wrong?...
>>>>>
>>>>> Dennis wrote:
>>>>>> The EXE File Association Fix from this site fixed the problem
>>>>>> of the icons not working. Everything is functioning now and
>>>>>> no viruses detected.
>>>>>>
>>>>>> http://www.dougknox.com/xp/file_assoc.htm
>>>>>>
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> Repost:
>>>>>>>
>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**
>>>>>>>
>>>>>>>
>>>>>>> Dennis wrote:
>>>>>>>> Yes.
>>>>>>>>
>>>>>>>> I ran MSRT and it found nothing.
>>>>>>>>
>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode
>>>>>>>> clicking the icon pops up the "Which program do you want to
>>>>>>>> use to open this" window. So I can't install it either way.
>>>>>>>> So, I finally tried Windows Update icon and it connected to
>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection
>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in
>>>>>>>> normal mode and still no icons open programs.
>>>>>>>>
>>>>>>>> I ran HiJack This and it found some entries in
>>>>>>>> C:\Windows\system32\drivers\etc\ that were removed. After
>>>>>>>> that Spybot did not find anything. Spybot no longer says there
>>>>>>>> were things it could not fix because it could not write to
>>>>>>>> C:\Windows\system32\drivers\etc
>>>>>>>>
>>>>>>>> So, right now in normal mode, no icons open programs. In Safe
>>>>>>>> Mode with Networking, signed in as a normal user no icons work.
>>>>>>>> But in Safe Mode with Networking signed in as Administrator,
>>>>>>>> all the icons open the programs as they should except IE and OE.
>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run
>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>
>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]
>>>>>>>>>
>>>>>>>>> Dennis wrote:
>>>>>>>>>> This is the current situation. No programs find any viruses now.
>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but
>>>>>>>>>> won't run if you click the icon. It pops a window asking what
>>>>>>>>>> program you want to use to run it as does everything else.
>>>>>>>>>> The start menu works but if you click any programs they do not
>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use
>>>>>>>>>> the "Administrator" user but not if I use the regular user name
>>>>>>>>>> to log in. Using her normal user name to log in, the desk top
>>>>>>>>>> icons don't work in regular mode or safe mode.
>>>>>>>>>>
>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>> [TYPO CORRECTED]
>>>>>>>>>>>
>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>> ...I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick.
>>>>>>>>>>>>
>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected
>>>>>>>>>>>> machine.
>>>>>>>>>>>>
>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it
>>>>>>>>>>>> [COULD] be
>>>>>>>>>>>> infected and/or the source of your infection!
>>>>>>>>>>>>
>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may
>>>>>>>>>>>> end up
>>>>>>>>>>>> infecting
>>>>>>>>>>>> the flash drive (which could then transfer the infection to
>>>>>>>>>>>> another
>>>>>>>>>>>> computer).
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Dennis wrote:
>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and
>>>>>>>>>>>>> ran
>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic updates.
>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.
>>>>>>>>>>>>> I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick. So far that works yet.
>>>>>>>>>>>>>
>>>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the
>>>>>>>>>>>>>> subscription
>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or your
>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been
>>>>>>>>>>>>>> kept
>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with
>>>>>>>>>>>>>> any of
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will NOT
>>>>>>>>>>>>>> help!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge
>>>>>>>>>>>>>> support
>>>>>>>>>>>>>> in
>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware
>>>>>>>>>>>>>> (including
>>>>>>>>>>>>>> unwanted software), and adware.
>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:
>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Otherwise...
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:
>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to
>>>>>>>>>>>>>> download
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the
>>>>>>>>>>>>>> infected
>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's
>>>>>>>>>>>>>> 'Protection'
>>>>>>>>>>>>>> scan
>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including posting
>>>>>>>>>>>>>> requested
>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS
>>>>>>>>>>>>>> STEP!!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Checking for/Help with Hijackware:
>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm
>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html
>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm
>>>>>>>>>>>>>> .
>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate
>>>>>>>>>>>>>> forums.**
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> If these procedures look too complex - and there is no
>>>>>>>>>>>>>> shame in
>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a
>>>>>>>>>>>>>> local,
>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek
>>>>>>>>>>>>>> Squad)
>>>>>>>>>>>>>> computer repair shop.
>
PA Bear [MS MVP] wrote:
> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015
>
> Backdoor.Tidserv does a very good job in that sense, especially with the
> latest version (TDL3), which uses an advanced rootkit technology to hide
> its
> presence on a system by infecting one of the low-level kernel drivers
> and then
> covering its tracks. *While the rootkit is active there is no easy way to
> detect the infection*, [emphasis mine] and because it goes so deep into
> the kernel, most
> users cannot see anything wrong in the system...Even worse, because the
> infected
> driver is critical for system boot-up, Windows will not boot in Safe Mode
> either [after having installed MS10-015 on an infected machine].
>
> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015
>
> Tdss rootkit silently owns the net
>
> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that is
> quickly spreading around the world. While a number of rootkits are just
> developed as a proof of concept, this is not the case. Tdss rootkit is well
> known to antivirus companies because of its goal to get total control of
> the
> infected PCs and using them as zombies for its botnet.
>
> During these years it has always shown a team of skilled people behind
> it, who
> always applied advanced techniques often able to bypass antirootkit
> softwares.
> Actually, this last variant could be easily named as the stealthiest
> rootkit
> in the wild.
>
> This infection is bringing all together the best of MBR rootkit, the
> best of
> Rustock.C and the experience of old Tdss variants. *Result is an
> infection that
> is quickly spreading on the net and it is undetected by almost every
> security
> software and 3rd party anti rootkit software*. [emphasis mine]
>
> ...currently no antirootkit is able to bypass disk filtering
> technique used by Tdss rootkit but, even if it was possible, this rootkit
> could not be detected by file size cross check because file size of the
> original and infected files are exactly the same.
>
> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html
>
>
> Dennis wrote:
>> EVERY anti-malware and anti-virus program says the computer is
>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an
>> on line scan says it is clean. If they can't find it then every
>> computer will be infected eventually because it isn't detectable
>> by current means available. So at that point your info is no safer
>> than hers on that computer.
>>
>>
>> PA Bear [MS MVP] wrote:
>>> Meanwhile, your data (e.g., online banking usernames and passwords) may
>>> have been compromised and your computer may still be functioning as a
>>> malware-bot for the Bad Guys. Guess time will tell about all that, too,
>>> eh?
>>>
>>> Dennis wrote:
>>>> I guess time will tell.
>>>>
>>>> PA Bear [MS MVP] wrote:
>>>>> If you needed that fix, I wonder what else might still be wrong?...
>>>>>
>>>>> Dennis wrote:
>>>>>> The EXE File Association Fix from this site fixed the problem
>>>>>> of the icons not working. Everything is functioning now and
>>>>>> no viruses detected.
>>>>>>
>>>>>> http://www.dougknox.com/xp/file_assoc.htm
>>>>>>
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> Repost:
>>>>>>>
>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**
>>>>>>>
>>>>>>>
>>>>>>> Dennis wrote:
>>>>>>>> Yes.
>>>>>>>>
>>>>>>>> I ran MSRT and it found nothing.
>>>>>>>>
>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode
>>>>>>>> clicking the icon pops up the "Which program do you want to
>>>>>>>> use to open this" window. So I can't install it either way.
>>>>>>>> So, I finally tried Windows Update icon and it connected to
>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection
>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in
>>>>>>>> normal mode and still no icons open programs.
>>>>>>>>
>>>>>>>> I ran HiJack This and it found some entries in
>>>>>>>> C:\Windows\system32\drivers\etc\ that were removed. After
>>>>>>>> that Spybot did not find anything. Spybot no longer says there
>>>>>>>> were things it could not fix because it could not write to
>>>>>>>> C:\Windows\system32\drivers\etc
>>>>>>>>
>>>>>>>> So, right now in normal mode, no icons open programs. In Safe
>>>>>>>> Mode with Networking, signed in as a normal user no icons work.
>>>>>>>> But in Safe Mode with Networking signed in as Administrator,
>>>>>>>> all the icons open the programs as they should except IE and OE.
>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run
>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>
>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]
>>>>>>>>>
>>>>>>>>> Dennis wrote:
>>>>>>>>>> This is the current situation. No programs find any viruses now.
>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but
>>>>>>>>>> won't run if you click the icon. It pops a window asking what
>>>>>>>>>> program you want to use to run it as does everything else.
>>>>>>>>>> The start menu works but if you click any programs they do not
>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use
>>>>>>>>>> the "Administrator" user but not if I use the regular user name
>>>>>>>>>> to log in. Using her normal user name to log in, the desk top
>>>>>>>>>> icons don't work in regular mode or safe mode.
>>>>>>>>>>
>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>> [TYPO CORRECTED]
>>>>>>>>>>>
>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>> ...I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick.
>>>>>>>>>>>>
>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected
>>>>>>>>>>>> machine.
>>>>>>>>>>>>
>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it
>>>>>>>>>>>> [COULD] be
>>>>>>>>>>>> infected and/or the source of your infection!
>>>>>>>>>>>>
>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may
>>>>>>>>>>>> end up
>>>>>>>>>>>> infecting
>>>>>>>>>>>> the flash drive (which could then transfer the infection to
>>>>>>>>>>>> another
>>>>>>>>>>>> computer).
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Dennis wrote:
>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and
>>>>>>>>>>>>> ran
>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic updates.
>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.
>>>>>>>>>>>>> I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick. So far that works yet.
>>>>>>>>>>>>>
>>>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the
>>>>>>>>>>>>>> subscription
>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or your
>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been
>>>>>>>>>>>>>> kept
>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with
>>>>>>>>>>>>>> any of
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will NOT
>>>>>>>>>>>>>> help!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge
>>>>>>>>>>>>>> support
>>>>>>>>>>>>>> in
>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware
>>>>>>>>>>>>>> (including
>>>>>>>>>>>>>> unwanted software), and adware.
>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:
>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Otherwise...
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:
>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to
>>>>>>>>>>>>>> download
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the
>>>>>>>>>>>>>> infected
>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's
>>>>>>>>>>>>>> 'Protection'
>>>>>>>>>>>>>> scan
>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including posting
>>>>>>>>>>>>>> requested
>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS
>>>>>>>>>>>>>> STEP!!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Checking for/Help with Hijackware:
>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm
>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html
>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm
>>>>>>>>>>>>>> .
>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate
>>>>>>>>>>>>>> forums.**
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> If these procedures look too complex - and there is no
>>>>>>>>>>>>>> shame in
>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a
>>>>>>>>>>>>>> local,
>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek
>>>>>>>>>>>>>> Squad)
>>>>>>>>>>>>>> computer repair shop.
>