Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

 
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents
Chapter 7.  Instant Messaging Attacks

Typically, IM programs are used to install normal (non-IM) Trojans or viruses, and if so, they follow the removal instructions of those chapters. If, however, your IM software has been maliciously modified, follow these instructions:

  1. Use an antivirus scanner.

    If the antivirus scanner recognizes the IM malicious code, let the scanner attempt to remove it.

  2. Delete IM software.

    If you believe that IM client software has been compromised, delete the entire program. There is no easy way, without checking everything to know what has been compromised and how. Search for and clean up any other system manipulations by following the steps recommended in the chapters on viruses and worms. Restore the IM program or the entire system from backup, if needed. Only reinstall the IM software if you absolutely need to.


Team-Fly    
Top

Категории