That's an expensive product, just to setup a radio..... > +1 for AVG and Malwarebytes together. I run both. That virus that > kidnaps your computer until you pay $300 ransom got mine before I had > Malwarebytes. It was the only anti-virus software that could detect it > and fix it in Safe Mode.
Malwarebytes is good, remember to keep it up-to-date. AVG(free) is a bit behind the pack in the AV stakes however. About the best AV (not free) is Eset's Nod32 for Windows users. I think they even still support Win2k, if you need to keep some instrumentation running that uses that as an embedded OS for example, and it also gives you a realy flexible and powerful firewall for those older OS's. (No affiliation, just a satisfied happy user.) But... The smart money, is to NOT open ANY attachments, or click on links in emails received unexpectedly, from anyone, especially those you don't know. And in this context, that includes email lists, such as this! Even if someone you know sends you something unexpectedly, DO NOT open it, untill you've contacted them and made sure they know it, and intended to send it to you. In the case of CryptoLocker, the only real defence, is to have daily (or more frequent) viable backups of your personal and other important data, or feel realy smug, and don't use Windows as your OS! (Note for MS Office users. There is also a recently discovered problem with some versions of that, that can be compromised and your PC taken over as a result of opening some malicious .TIF files!) It is possible to run your mail client (or browser, or anything else for that matter) under "Sandboxie" (google it.) That wont prevent infection or bad things happening, or protect your privacy, but it will contain any malicuous writes to your system, such as the encrypted files, and also preventing it from removing/deleting your original files, even preventing it from messing with the live copy of the registry. Just deleting the contents of the sandbox will then remove all trace of it. Very useful for people who for whatever reason like to visit the "darker corners" of the web. Anyone who does get hit by CryptoLocker, if they realy need to (like, they don't have viable backups) get their data back. DO NOT remove the infection until after paying up and decrypting the files. It can be done after disinfection, but it's a whole lot more painful to do. As the disinfection process removes all the tools it provides to decrypt your data once payment has been processed. The other thing to note, is that this will just be the first of this sort of ransomware to appear. It's just too successful for the bad guys. Take great care people. Trust no one, not even me. 73. Dave G0WBX. ______________________________________________________________ Elecraft mailing list Home: http://mailman.qth.net/mailman/listinfo/elecraft Help: http://mailman.qth.net/mmfaq.htm Post: mailto:[email protected] This list hosted by: http://www.qsl.net Please help support this email list: http://www.qsl.net/donate.html

