That does sound like the fastest and easiest solution. It's probably the most effective for prevention. In terms of removing it, I would imagine it would be easier to do that with a startup program on a disc or thumb drive.shadebreeze said:Furthermore, there isn't much you can actually do from the code in the MBR, because to do anything useful these days you need functionality that requires a running OS. Say the botnet is used to send spam - it must use the network drivers and the TCP/IP stack, so it has to go through Windows and its drivers. It might be hard to remove it, but the symptoms could be detectable. I am confident antivirus companies will find a way to detect it and deal with it sooner or later (maybe by just silently blocking it).
I'm not sure. Sledge hammers, fire, shotguns, etc. are the only way to perminantly deleate date, so the virus may be capably of replicating it's self after a zero wipe, which would also get rid of all of you're data on you're computerInterAirplay said:Wouldn't a zero wipe of the Hard Drive also do the trick?let said:You do know that there are ways to modify you're boot record, right? If you are really good at softwarwe, you can go into you're boot with a master boot boot cd, highlight it, and click delete. Nothing is indestructable, look at the titanic and death star. As long as it doesn't start singing "Daisy Bell" I have no concern. Also, try being careful on the internet so it can't install in the first place
You are right, that's probably the solution. Antivirus companies often release "removal kits", little programs whose only purpose is to remove one specific malware. You run them and they do their job.vxicepickxv said:That does sound like the fastest and easiest solution. It's probably the most effective for prevention. In terms of removing it, I would imagine it would be easier to do that with a startup program on a disc or thumb drive.shadebreeze said:Furthermore, there isn't much you can actually do from the code in the MBR, because to do anything useful these days you need functionality that requires a running OS. Say the botnet is used to send spam - it must use the network drivers and the TCP/IP stack, so it has to go through Windows and its drivers. It might be hard to remove it, but the symptoms could be detectable. I am confident antivirus companies will find a way to detect it and deal with it sooner or later (maybe by just silently blocking it).
You'd better prepare yourself to start being surprised, at a time less than too long a time away, and arrange to stay that way for a very long time. Basically, I disagree with your last sentence... But then, odds are, you and certainly I do not have much experience of the genetic algorithm field so we're not the best people to have a researchless argument about this.Sylocat said:And we take another step closer to the world of the Rifters Trilogy.
Seriously, how long before someone decides to program some "gene" codes into these bugs (which they're already doing in labs), and sets them loose? I'd be surprised if the entire system doesn't evolve into mass sentience before too long.
True enough. While there are anarchic bedroom programmers indulging a tech-amplified mean streak, most of the people writing such complicated malware are looking for a financial return on their investment of time. Computer crime is just one more way of life in areas of the world where corruption is institutionalized.ACman said:I don't think these are hobbyists. This seem more professional criminal than that.bjj hero said:Do people really have nothing better to do with their time than come up with this kind of shit?
Look outside... There is daylight, there are girls too, nice things to eat and drink, fun things to explore and do. Much better than sitting in your cave and coming up with better ways to spoil someone elses computer.
Well, look at the average user.DarkTenka said:Am I missing something here?
Master Boot Record Viruses have existed since Windows 98, thats nothing new. While a standard reformat wouldnt "kill it" .. you can reformat the Master Boot Record seperately (and independently) from the rest of the data .. its pretty easy to do with your Windows Install CD.
So what part of this so called "BotNet" makes it so "practically indestructible"?.
Uber Waddles said:Well, color me purple and slap me in the face with a feather duster.
... and by that I mean wow, that is total dicks right there. I have to wonder whats the point of it? I mean, more than likely, one of the major anti-virus companys is gonna find a way to get rid of it. And its not really doing anything nefarious, other than spamming people about a Prince in Zimbabwe, and dicking with other people who are just dicks.
This kinda sounds like something a 13 year old would do for fun, just troll and annoy as many people as humanly possible without causing any real, substantial damage.
While the article doesn't seem to touch on it much, I think it instead means that it installs itself to the motherboard, which then runs its own diagnostics away from Windows altogether. That means that attempting to use the Windows Install CD would be useless, because the program would just reestablish itself when the computer first starts up, before windows even has a say in what is going on.DarkTenka said:Am I missing something here?
Master Boot Record Viruses have existed since Windows 98, thats nothing new. While a standard reformat wouldnt "kill it" .. you can reformat the Master Boot Record seperately (and independently) from the rest of the data .. its pretty easy to do with your Windows Install CD.
So what part of this so called "BotNet" makes it so "practically indestructible"?.
Yeah. This isn't quite true.Earnest Cavalli said:This also means that formatting your computer, a process that restores every Windows component to its most basic state, has no effect on Top Bot.
These aren't your usual anon guys.bjj hero said:Do people really have nothing better to do with their time than come up with this kind of shit?
Look outside... There is daylight, there are girls too, nice things to eat and drink, fun things to explore and do. Much better than sitting in your cave and coming up with better ways to spoil someone elses computer.
Researchless, huh?strobe said:But then, odds are, you and certainly I do not have much experience of the genetic algorithm field so we're not the best people to have a researchless argument about this.