[nfbcs] Accessible Windows Explorer Alternatives

Steve Jacobson steve.jacobson at visi.com
Mon May 12 16:01:38 UTC 2014


Peter,

I think you really need to look at this problem as John as described.  You also need to consider that you may have 
some backup files or data on jump drives that are infected.  The person who rebuilt your machine should be able to 
tell you what the specific infection is so that you can get some information about it and see which programs can 
defend against it.  Also, trodjans are sometimes not considered viruses but malware, and may not be detected by an 
antivirus.  Still, if you have gotten the same attack multiple times, it is not new and there is probably 
something that would defend against it, but even so, you need to figure out where the re-infection is coming from 
as John has suggested.  If I were you, I would do some research before you add any additional files back onto that 
computer after the windows install.  I would find out the name of the infection and do some research to see which 
programs can detect it and then I would scan everything before putting it on your computer including any install 
disks you plan to use or any files you are going to copy.  Did they reinstall Windows from a disk you had?  If so, 
did they scan that disk?  If the CD came from Microsoft it is likely safe, but if you bought Windows from anyone 
or you got it from a reseller, or if it is an image restore from a manufacturer, particularly if it was cheap, you 
could have the trodjan there.  If you are installing any versions of Microsoft Office, check that CD as well, 
particularly if you bought it from a third party at a discount.  

Finally, as frustrating as it is, the true source of some trodjans isn't completely known.  Sometimes undetected 
harmless programs just exist in your system doing no harm but are awakened by visiting a particular web site and 
then only after a predetermined amount of time.  It is possible, therefore, that it is being planted by something 
you don't suspect and then is activated by some event much later.

Best regards,

Steve Jacobson

On Mon, 12 May 2014 10:35:51 -0500, John G. Heim wrote:

>You know that this kind of thing is usually, not always, caused by poor 
>internet hygene, right? How sure are you that everyone who uses that 
>machine knows how to avoid viruses? No anti-birus package is going to 
>keep you safe from viruses if the users are essentially choosing to 
>install them.

>Honestly, I don't even recall the last time I saw a Windows machine get 
>a virus where I wasn't able to pin it down to a deliberate action by the 
>end-user to install the virus. Of course, they didn't think they were 
>installing a virus. We had several people get a virus a while ago 
>because it came up saying it had detected a virus on their computer, and 
>they should click this button to remove it. Of course, if they clicked 
>the button it actually installed the virus.

>Someone else on this list suggested you review your habits (or more 
>likely those of the other users of the computer). My opinion is that 
>that is the best suggestion you've gotten. Are they installing plugins 
>from unreliable sources? Running programs off a borrowed thumb drive? 
>There is no anti-virus program in the world that can protect you from 
>that kind of thing.

>I once put a link on a web page that said, "Click here to install a 
>virus on your computer." Just to make sure people were appropriately 
>scared, I put another link that said, "Click here and I'll show you the 
>files on your C: drive." That was just a file link to their C: drive. 
>But it should have scared anyone who didn't know how this stuff really 
>works. Even so, plenty of people clicked the virus link. Most 
>virusdevelopers aren't that obvious. It's possible you've just been 
>unlucky and have come across some particularly sophisticated virus 
>developers. But most likely, somebody who uses that computer isn't 
>following good internet hygene habits.

>On 05/12/14 07:34, Peter Donahue wrote:
>> Hello Brian and everyone,
>>
>>     We just reloaded windows on that machine 4 months ago. We will most
>> likely need to reload it again but are not willing to put up with that
>> machine being attacked and needing a complete system reload every time
>> we turn around. This wasn't a problem until January of this year. We'll
>> need both a system reload and whatever software or patch Microsoft will
>> have available to prevent "Computer" from being knocked out by trogens
>> in the future. We have far more important things to spend our money on
>> besides having to hire someone to reload computers attacked by viruses
>> and having to restore the data each time this happens. All the best.
>>
>> Peter Donahue
>>
>> ----- Original Message ----- From: "Bryan Schulz" <b.schulz at sbcglobal.net>
>> To: "NFB in Computer Science Mailing List" <nfbcs at nfbnet.org>
>> Sent: Friday, May 09, 2014 3:14 PM
>> Subject: Re: [nfbcs] Accessible Windows Explorer Alternatives
>>
>>
>>> hi,
>>>
>>> i have used a version of avg for years and never had an attack or virus.
>>> it would be cheaper to hire a neighbor to read the screens and install
>>> windows yourself.
>>> you should be able to recognize a tech that wants to gouge you.
>>> Bryan Schulz
>>>
>>>
>>> ----- Original Message ----- From: "Peter Donahue"
>>> <pdonahue2 at satx.rr.com>
>>> To: "NFB in Computer Science Mailing List" <nfbcs at nfbnet.org>
>>> Cc: <gui-talk at nfbnet.org>
>>> Sent: Friday, May 09, 2014 6:36 AM
>>> Subject: [nfbcs] Accessible Windows Explorer Alternatives
>>>
>>>
>>>> Good morning everyone,
>>>>
>>>>    Before I head out of town for the weekend I want to find out which
>>>> file management  alternatives to Windows Explorer/My
>>>> Computer/Computer that are accessible with screen reading systems.
>>>> Back in January Mary's computer which runs Windows 7 was infected by
>>>> a trogen that took out "Computer." The infection was so bad that the
>>>> entire machine needed to be reloaded. I find it hard to believe that
>>>> Microsoft would not be a ware of this trogen vulnerability and would
>>>> have released a patch to correct the problem. The company that
>>>> reloaded the computer installed Microsoft Security Essentials on it
>>>> I'm not sure if this package will scan and remove trogens.
>>>>
>>>>    It has been four months since the last infection and it's
>>>> happening again. It looks like we're in for another system reload to
>>>> get rid of this one and will most likely be set back another $500.00.
>>>> We can't keep going through this every so often. There are two
>>>> questions we have for you all. 1. Which antivirus package is the best
>>>> at protecting one's machine from trogen infections particularly those
>>>> that attack the OS. 2. In the event this should happen again we want
>>>> to know if there are file management alternatives to My
>>>> Computer/Windows Explorer that will run under Windows 7 we could
>>>> install as a backup program should another infection occur?
>>>>
>>>>    Your suggestions for a permanent fix will be very much
>>>> appreciated. I'll also be in touch with Microsoft next week so they
>>>> can remote on to that machine to see for themselves what's going on
>>>> in the hopes they can fix it without having to reload the entire
>>>> thing again. As if we have tons of bucks to spend on computer repairs
>>>> every time we turn around. Sorry for this tone but this is really
>>>> annoying when you have other issues to address such as a guide dog
>>>> being over-due for routine veterinary care and help isn't
>>>> fourth-coming not even from the guide dog school. Otherwise Mary's
>>>> computer is usable. We've discovered some work-arounds to deal with
>>>> file management issues until this situation can be remedied hopefully
>>>> permanently. Interestingly enough we have not had this trouble with
>>>> our Windows XP machines. Go figure Microsoft!All the best. I'm off to
>>>> Camp Tejas for the weekend.
>>>>
>>>> Peter Donahue
>>>>
>>>>
>>>>
>>>> ---
>>>> This email is free from viruses and malware because avast! Antivirus
>>>> protection is active.
>>>> http://www.avast.com
>>>> _______________________________________________
>>>> nfbcs mailing list
>>>> nfbcs at nfbnet.org
>>>> http://nfbnet.org/mailman/listinfo/nfbcs_nfbnet.org
>>>> To unsubscribe, change your list options or get your account info for
>>>> nfbcs:
>>>> http://nfbnet.org/mailman/options/nfbcs_nfbnet.org/b.schulz%40sbcglobal.net
>>>>
>>>
>>>
>>> _______________________________________________
>>> nfbcs mailing list
>>> nfbcs at nfbnet.org
>>> http://nfbnet.org/mailman/listinfo/nfbcs_nfbnet.org
>>> To unsubscribe, change your list options or get your account info for
>>> nfbcs:
>>> http://nfbnet.org/mailman/options/nfbcs_nfbnet.org/pdonahue2%40satx.rr.com
>>
>>
>>
>> ---
>> This email is free from viruses and malware because avast! Antivirus
>> protection is active.
>> http://www.avast.com
>>
>>
>> _______________________________________________
>> nfbcs mailing list
>> nfbcs at nfbnet.org
>> http://nfbnet.org/mailman/listinfo/nfbcs_nfbnet.org
>> To unsubscribe, change your list options or get your account info for
>> nfbcs:
>> http://nfbnet.org/mailman/options/nfbcs_nfbnet.org/jheim%40math.wisc.edu
>>

>-- 
>---
>John G. Heim, 608-263-4189, jheim at math.wisc.edu

>_______________________________________________
>nfbcs mailing list
>nfbcs at nfbnet.org
>http://nfbnet.org/mailman/listinfo/nfbcs_nfbnet.org
>To unsubscribe, change your list options or get your account info for nfbcs:
>http://nfbnet.org/mailman/options/nfbcs_nfbnet.org/steve.jacobson%40visi.com








More information about the NFBCS mailing list