Posted on 10/27/2013 10:48:13 AM PDT by Windflier
But this only reveals the extensions to you - One must be be willing to learn what the extensions mean - Really not a long study - At least knowing the common ones safe for use (.doc, .txt, .xls, .pdf, .jpg, .jpeg... etc), being careful with any executable file (.exe, .bat, .cmd, .vbs, .wsf... etc), and VERY careful with anything having a double extension (filename.txt.exe) - Standard convention seldom uses a double extension (though it can always be done), so it is very out of the ordinary.
Pretty much, just start paying attention to the file types you regularly use, and be careful of things that are different...
Happy motoring! ; )
THANK YOU!
Your list of infection vectors pretty much covers the way any infection/malware arrives on a computer these days.
Thus far, I haven’t seen this in any of my business client’s computers nor among my friends who seem to rely on me for free computer support. At least with my business customers I view the lack of infection as an indicator that their current protection status is effective.
The following links cover most of Symantec’s information on the current class of randsomware: http://www.symantec.com/connect/blogs/ransomcrypt-thriving-menace and http://www.symantec.com/business/support/index?page=content&id=TECH211589.
If the infected user hasn't paid up by the time the clock elapses, the key is thrown away and the files are essentially lost forever.
If the user doesn't have backups, then his files are eventually going to be lost forever, for any one of a number of reasons, most of which are far more likely than being bit by a ransom virus.
Thanks, roamer_1, that’s it.
Other personal preferences - like ‘Use Windows Classic Folders’ - can also be set in the ‘Folder Options’ (in this case the ‘General’ tab) menue.
Freep-mail me to get on or off my pro-life and Catholic List:
Please ping me to note-worthy Pro-Life or Catholic threads, or other threads of general interest.
I wonder if this isn’t being promulgated by the NSA/DHS.
Get every body afraid of the virus so they all install something
like Cryptoblocker that prevents files from being encrypted.
Now that you have conned you into setting your PC to prevent
any file encryption they can peruse and steal your data without
having to worry about people who encrypt their data.....it’s a
win win for the government spies.
Good tip for windows users. I've always thought the idea of a file being executable simply by virtue of it's file name to be the height of insanity, and the cause of much of Microsoft user's woes.
Thank you from me too!
Bookmark!!!
You don’t understand. I was hit with this and it may sink my company. I have backups galore, all attached to the network, NAS, this stupid thing got them all. I will have thousands of man hours of labor just to have information to do my taxes.
These people need to be shot.
This malware seems so Windows-specific that I expect that Linux is immune. Does anyone have evidence to refute that? Unless WINE is running at the time, the chances of infecting Linux seems remote.
You'd have to run the malware itself under wine.That's fairly unlikely I think.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.