The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    question about computer virus

    Discussion in 'Windows OS and Software' started by kenny1999, Oct 1, 2016.

  1. kenny1999

    kenny1999 Notebook Evangelist

    Reputations:
    26
    Messages:
    359
    Likes Received:
    28
    Trophy Points:
    41
    The first question:

    We all know that EXE files are very risky if it's not from trusted source.

    However, if I just download it, while I do not click to execute it. Is there any risk?


    Another question:

    If a file is MP3 or JPG or other formats like TXT or Video formats.

    Does it mean those files should be totally safe? Could a EXE or virus file of other formats "pretend" to be a common file like MP3 or JPG and once you play it, then my computer will contract virus?

    Could a PDF file contain virus?

    Thank you for all advice!
     
  2. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,740
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
    Upload the file to Virus Total website to have over 40 anti-virus programs scan it.

    Be aware that when a virus name has .gen on the end, the anti-virus program could have give you a false positive.

    https://www.virustotal.com/

    John.
     
  3. TreeTops Ranch

    TreeTops Ranch Notebook Deity

    Reputations:
    330
    Messages:
    904
    Likes Received:
    124
    Trophy Points:
    56
    In addition to Tinderbox's reply, .exe virus files are only dangerous when executed. Just downloading should not pose a risk. Do what Tinderbox recommends for those files. HOWEVER. some javascript code can run a file automatically when you visit a rogue website and infect your computer. And some sites hide virus files in a image so when you click on that image you get the virus. But that is another issue.
     
    kenny1999 likes this.
  4. kenny1999

    kenny1999 Notebook Evangelist

    Reputations:
    26
    Messages:
    359
    Likes Received:
    28
    Trophy Points:
    41

    For downloaded files ending with *.mp3 *.mp4, *.jpg, *.mov etc, could they possess any virus on execution?

    I know about Virustotal but I just don't want to do to each *jpg file. It will be a lot of work
     
  5. TreeTops Ranch

    TreeTops Ranch Notebook Deity

    Reputations:
    330
    Messages:
    904
    Likes Received:
    124
    Trophy Points:
    56
    I guess with today's hackers, anything is possible. Just get a anti-virus program and be done with it. Life's too short to worry about every little thing.
     
  6. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,740
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
    I run these on demand scanners in addition to my constantly running Avast anti-virus every couple of weeks, or if i have been to an especially dirty site :oops:

    1st run JRT (Junkware removal tool by Malwarebytes) it may close some of your apps this is normal

    2nd run Adwcleaner as it wants to reboot if it finds something, I would do a reboot even if it find nothing, to restart any apps JRT has terminated.

    I have been using both these apps for months and Avast has not objected to them.

    Be aware that even if you use every anti-virus and scanner available you might not find them all, nothing cleans your computer like a hdd/ssd full format (i do quick it`s up to you) and a clean install of Windows.

    https://www.malwarebytes.com/junkwareremovaltool/

    https://toolslib.net/downloads/viewdownload/1-adwcleaner/

    John.
     
    kenny1999 likes this.
  7. StormJumper

    StormJumper Notebook Virtuoso

    Reputations:
    579
    Messages:
    3,537
    Likes Received:
    488
    Trophy Points:
    151
    Put this was if you don't know what the *.exe file came from or what it is associated with then expect problems. Never click on .exe or .pdf or .doc files if you have no idea where they came from or what they are associated with. That is what malware/virus are expecting the users not asking ok what is this file and verify what is it associated with. If you can't answer that then there is a problem. A little *STOP* *Think* would go along way from the happy go click buttons to less infections.
     
    kenny1999 and Jarhead like this.
  8. bennni

    bennni Notebook Evangelist

    Reputations:
    91
    Messages:
    450
    Likes Received:
    277
    Trophy Points:
    76
    You asked a million questions about VM's recently - why not just use the helpful advice you were given and do this kinda stuff in a VM? It's not perfect but it's a better way of downloading such files than doing it on an OS that has your actual data.

    This isn't exactly what you asked but I tend to be more practically concerned - and that's my practical advice.
     
    Last edited: Oct 2, 2016
    Jarhead likes this.
  9. kenny1999

    kenny1999 Notebook Evangelist

    Reputations:
    26
    Messages:
    359
    Likes Received:
    28
    Trophy Points:
    41

    Yes. Life is very short. However, sometimes something has to be worried.
     
  10. StormJumper

    StormJumper Notebook Virtuoso

    Reputations:
    579
    Messages:
    3,537
    Likes Received:
    488
    Trophy Points:
    151
    A further protection create "Limited User" account and use that for your everyday usage and password protect the Admin/Owner account and should a .exe or similiar want to run you will know to verify if this is what your doing not what it wants to do. This is something alot of users forgets on day ONE(Your the Admin/Owner and any installs will install whether you want it to or not)when they start using the computer make "Limited User" account and use that and password protect Admin/Owner account. If people just stop and do this they will eliminate the majority of infections and stop those botnets/zombies but until people do this the infections will continue.
     
    Last edited: Oct 4, 2016
    kenny1999 likes this.
  11. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,132
    Trophy Points:
    681
    I have to agree with bennni about the VMs. Just set up a VM for your downloads if you're going to be paranoid about them. If a download nukes your VM's OS, who cares? Delete that VM, create a new one, and keep on going with life. If the download works as you like, then transfer the file to your computer's real OS and do as you please.

    Or just use AV software to scan your downloads...
     
  12. kenny1999

    kenny1999 Notebook Evangelist

    Reputations:
    26
    Messages:
    359
    Likes Received:
    28
    Trophy Points:
    41

    Have tried VM few weeks ago but Too difficult to configure. I remember I 've got error message. Which VM do you recommend ? which is the easiest for beginners to setu
     
  13. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,132
    Trophy Points:
    681
    What sort of error did you get?

    The two popular choices are VMWare and VirtualBox, both simple to set up. You'll need an OS ISO (download this), point the software to this when making a new machine, and follow the prompts of that OS when installing it.
     
  14. TANWare

    TANWare Just This Side of Senile, I think. Super Moderator

    Reputations:
    2,548
    Messages:
    9,585
    Likes Received:
    4,997
    Trophy Points:
    431
    To work in a VM aqll the time I find to be a pain. Where as just taking proper precautions with the machine usually suffices. Then again I tend to stay away from activities that are detrimental to the health of the machine. As they say if you want to play be prepared to pay.
     
  15. StormJumper

    StormJumper Notebook Virtuoso

    Reputations:
    579
    Messages:
    3,537
    Likes Received:
    488
    Trophy Points:
    151
    As anything if you use black software or go to black site expect the worst how does one going there think they will be safe? Making a simple plan password protect the Admin/Owner account and make the common used account "Limited User" and use that one for your everyday usage and should that get infected just log into as Admin/Owner and wipe clean that account and recreate it and start over. This is no fool proof but more fool proof then the fool using the Admin/Owner account to surfer and install toolbars from the net and getting infected and asking why am I getting malware. The question is obvious but they won't look at it. For Savvy users checking every bits that is fine using Admin/Owner but most people aren't they fire up the computer (not Literally) but go about the business without a clue that they are walking right into a trap when using Admin/Owner account. Limited User forces you to input the Admin/Owner password for any install that will make you think what is this program doing and do I really want it installed. In this day of happy Click'n'Go malware are looking for you to pay their funding budgets and zombies/botnet.
    All of my family computers of Desktops/Laptops are set like this and so far infections of the past are more or less "0" as a result of this cause now they will see the box pop up asking for permission to install and if you don't have password it doesn't install. Simple as that.
     
    Last edited: Oct 5, 2016
    bennni and Jarhead like this.
  16. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,132
    Trophy Points:
    681
    ^That, combined with a half-decent AV/anti-malware program would be he simplest route to take.

    Working withing a VM is a bit more inconvenient, though it's simpler to start from scratch by redoing a VM setup than a Windows user account / paritions. All pros and cons to consider.

    Though really, the best piece of advise is to simply not browse shady sites if you don't know what you're doing. Stay clear of the p0rn sites, warez sites, "You won a free iPhone!!!" Ads, etc.
     
    bennni likes this.
  17. StormJumper

    StormJumper Notebook Virtuoso

    Reputations:
    579
    Messages:
    3,537
    Likes Received:
    488
    Trophy Points:
    151
    Even that is like pulling their finger nails out... lol

    VM is good for savvy users but just wipping out the "limited user" accound and making a new isn't that hard since the Admin/Owner already has the setup to redo the account for Limited User.

    Good luck trying to stopping that.... lmao....remember us IT fix it people need to put food on the table... oops I let out the secret... lol
     
    Jarhead likes this.
  18. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,740
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
    I had a bitcoin data miner virus the other day land on my external torrent hdd, Avast spotted and killed them all, then i ran an Malwarebytes and and Superantispyware and no more infected files were found.

    John.
     
  19. iaWinken

    iaWinken Newbie

    Reputations:
    0
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    5
    There is no answer about how to execute an EXE file. What you should be aware is that when you click to install the new installer, you should select Custom Install so that you can avoid unwanted bundleware.

    Most malware like Ourluckysites.com come to your computer by attaching to unsafe installer.

    When users get right download button and start installation, but they are still tricked into choosing “Standard” setup mode and clicking “Install” button. So the browser hijacker is allowed to get installed on your computer. The lesson teaches you to read Terms of use carefully while installing and choose “Custom” setup mode. Sometimes the browser hijacker is taken as an option in Setup wizard. So you can unselect these options manually, otherwise you will be thought to allow that the browser hijacker is added to your computer by default. If it arrives on your computer, you need to follow the complete removal instructions below to remove it.