14.11.2012, 07:49
Na bleepingcomputer.comukazał się obszerny poradnik korzystania z MBAR, a poniżej spis treści:
Introduction
How to use Malwarebytes Anti-Rootkit to remove Rootkits
How to restore files that have been quarantined
Advanced Command Line Arguments
Troubleshooting issues after running Malwarebytes Anti-Rootkit
Fragment wstępu z krótkim opisem możliwości programu
Introduction
How to use Malwarebytes Anti-Rootkit to remove Rootkits
How to restore files that have been quarantined
Advanced Command Line Arguments
Troubleshooting issues after running Malwarebytes Anti-Rootkit
Fragment wstępu z krótkim opisem możliwości programu
Cytat: Malwarebytes Anti-Rootkit, or MBAR, is a rootkit scanner that searches your computer for rootkits and then removes them. Once Malwarebytes Anti-Rootkit removes the rootkit, any files or Windows Registry entries that the rootkit was hiding will then be visible and be easier to remove.
MBAR has the ability to target rootkits that belong to the following families or that use the following rootkit technologies:
Kernel mode drivers hiding themselves, like TDL1, TDL2/TDSS, MaxSS, Srizbi, Necurs, Cutwail, etc.
Kernel mode driver patchers/infectors, embedding malicious code into core files of an Operating System, such as TDL3, ZeroAccess, Rloader, etc.
Master Boot Record infectors such as TDL4, Mebroot/Sinowal, MoastBoot, Yurn, Pihar, etc.
Volume Boot Record/OS Bootstrap infectors like Cidox
Disk Partition table infectors like SST/Elureon
User mode patchers/infectors like ZeroAccess.
This tutorial will walk you through using Malwarebytes Anti-Rootkit to remove rootkits from your computer. It will also provide guidance on how to resolve problems that result from removing these rootkits.
[Aby zobaczyć linki, zarejestruj się tutaj]
"Bezpieczeństwo jest podróżą, a nie celem samym w sobie - to nie jest problem, który można rozwiązać raz na zawsze"
"Zaufanie nie stanowi kontroli, a nadzieja nie jest strategią"
"Zaufanie nie stanowi kontroli, a nadzieja nie jest strategią"