Important Computer Check Malware Deadline

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Rollem
    Administrator

    • Feb 2011
    • 2823

    #1

    Important Computer Check Malware Deadline

    Sunday is the last day of the FEDeral protection. Monday thousands of computers will not connect to ISP (Internet)

    Check and fix now.

    How can you detect if your computer has been violated and infected with DNS Changer?

    An industry wide team has developed easy “are you infected” web sites. They are a quick way to determine if you are infected with DNS Changer. Each site is designed for any normal computer user to browse to a link, follow the instructions, and see if they might be infected. Each site has instructions in their local languages on the next steps to clean up possible infections.




    This is the Link. takes seconds.



    Good Luck

    James
    "Good People are Great Forums" Rollem
  • Rollem
    Administrator

    • Feb 2011
    • 2823

    #2
    The dcwg.org is overwhelmed. Be sure to use the http://www.dns-ok.us/ to test for malware
    "Good People are Great Forums" Rollem

    Comment

    • DoubleYou
      Member
      • Sep 2010
      • 3629

      #3
      Um, we already have (or at least had) a topic covering this. And this is like almost a year-old news, so why am I just seeing it now? By now, the malware could have evolved to take away the information those websites used to identify your health.
      Wendell Carper
      It's a bird! It's a plane! Aw nuts... It's merely two die scratches!

      Comment

      • Rollem
        Administrator

        • Feb 2011
        • 2823

        #4
        The fed's when they busted these guys cleaned one of the servers that the virus was directing the dns to. They have maintained it for a year and will shut it down on Monday.

        I agree it's a year old, however thousands have failed to check for this malware and hence on Monday will find out if they have been being redirected. They know this because of the activity on the server that should otherwise not have activity.

        Noticed the red:
        Update on March 12, 2012: To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time.
        Last edited by Rollem; 07-08-2012, 04:44 AM.
        "Good People are Great Forums" Rollem

        Comment

        • Maineman750
          Administrator

          • Apr 2011
          • 12079

          #5
          It was all over the news in my area..but I'd rather be warned in several ways than not at all... Wendell ...glad to see you back !
          https://www.ebay.com/sch/maineman750...75.m3561.l2562

          Comment

          • Cdiddle
            Member
            • Jul 2010
            • 974

            #6
            Originally posted by Maineman750
            It was all over the news in my area..but I'd rather be warned in several ways than not at all... Wendell ...glad to see you back !
            Same with me, thank you. It has been on local and national news for about 4 days repeatedly in my area.
            Cindy

            Comment

            • copperlover

              #7
              All is fine with me . I hope no one had a bad experience with their computer.

              Lucien

              Comment

              • BadThad
                Member
                • Jan 2009
                • 3011

                #8
                Easy to check, TOOLS>OPTIONS>CONNECTION>LAN SETTINGS

                Be sure you're not using a "proxy server", if you are, uncheck that box and run an anti-malwareware program like MalwareBytes.
                VERDI-CARE™ ALL METAL CONSERVATION FLUID

                Comment

                • pman860507
                  Member
                  • Jan 2012
                  • 1577

                  #9
                  Originally posted by BadThad
                  Easy to check, TOOLS>OPTIONS>CONNECTION>LAN SETTINGS

                  Be sure you're not using a "proxy server", if you are, uncheck that box and run an anti-malwareware program like MalwareBytes.
                  unless you are running a proxy server



                  Sorry Thad I'm crazy bored at work.
                  Casey Parman

                  Comment

                  • Rollem
                    Administrator

                    • Feb 2011
                    • 2823

                    #10
                    Originally posted by pman860507
                    unless you are running a proxy server



                    Sorry Thad I'm crazy bored at work.
                    If you are reading this then you should be ok.

                    FBI server is off. Unless you have another DNS reroute virus/malware

                    I am bored also
                    "Good People are Great Forums" Rollem

                    Comment

                    • DoubleYou
                      Member
                      • Sep 2010
                      • 3629

                      #11
                      Always good to look at the hosts file in %systemroot%\system32\drivers\etc\ for any suspicious activity as well. IPv4/6 dns settings are good to check as well.
                      Wendell Carper
                      It's a bird! It's a plane! Aw nuts... It's merely two die scratches!

                      Comment

                      • pman860507
                        Member
                        • Jan 2012
                        • 1577

                        #12
                        Yet you're still screwed if your IPS's DNS servers have the malware in them. Unless you use a different DNS.
                        Casey Parman

                        Comment

                        Working...