Steps 4 & 5 look nearly the same to me. Could you be more explicit about which differences you mean?
I’d like to see some changes to the security tango regarding rootkits. All the recommended anti-malware apps are to be installed on potentially infected operating systems. The problem is that rootkits operate at such a low-level that they can hide themselves from the operating system and therefore also any installed programs. The guys are obviously aware of this since whenever the phrase rootkit comes up they recommend taking the drive out and checking it using another known good operating system. Instead of going through all that trouble, many producers of anti-malware include a bootable CD or USB disk. Using those will bypass the potentially infected operating system, as long as they are downloaded and burned on a non-infected computer.
Saturday 12-2 PM Eastern585-966-5299 or 1-800-790-0415Or text us at 585-209-9010And listen live on Jazz 90.1!or watch us on our very own YouTube channel!
Or, of course:
Hey, Google! Play Jazz 90.1
Alexa: Play Jazz 90.1
Enjoy Sound Bytes? Please help keep this site alive!