Friday, March 25, 2011

Welcome, what's this, who are you - Scooby Doo?

Over the past 20+ years threats to computer software have multiplied like cockroaches in a slum - it's not a pretty sight. There's lots of advice about protecting systems from threats, but much of it is ignored, or doesn't work because new threats are more sophisticated and better disguised.

This log exists because PC threats are increasingly more sophisticated. It's my way of not only documenting the threats and methods used to remove them, but to voice the frustration IT people feel when faced with the daunting task of trying to maintain data on systems that are severely infected.

I'm not Scooby Doo. I don't always have the answer, which is the second reason I started this log, to give voice to others who may have run into some of the same malicious software (aka malware). However because of the nature of my work (rebuilding and repairing PCs) I get the opportunity to see a very large amount of infected computers.

This is their story... 

No comments:

Post a Comment