Question:
My Computer starts to load and then goes to blue screen with words then starts to load again. NEED HELP?
vg_reese
2008-09-13 06:58:41 UTC
It just continues this cycle... I try to start in safe mode same thing... I was fighting a virus that happened when someone used the computer and on usenext and it disabled the task manager. I loaded my anti-virus software from verizon and thought I caught the culprit. But the problem never resolved..my home screen turned blue with a statement that my computer had been compromised as my background. I then shut it down for the night and came back in and started geetting this problem... PLEASE HELP!!!
Seven answers:
2008-09-13 07:08:55 UTC
the best thing you can do is reboot your pc http://www.ehow.com/how_4450456_reboot-hard-drive.html
2014-09-02 14:54:54 UTC
Don't listen to these guys, they clearly have no clue on what they're talking about. I am a developer at Microsoft so I know a thing or two about computers. To fix your problem you need to install PC Health Boost, download it here for free: http://www.pcboostcleaner.com



It's very light and it's the only antivirus/cleaner with a 99.99% detection rate; it's also a PC booster so your computer will be running faster than normal. Install it, hit run and problem solved. It shouldn't take you more than 5 minutes.
Odindmar
2008-09-13 07:07:55 UTC
Viruses can hide in many parts of you drive and mother board. Just because the virus is destroyed, doesn't mean the damage if fixed. I would take your computer to a shop and tell them. They have a function called "Zeroing " you hard drive. Basically, total deletion of everything. Of course, everything will have to be reinstalled, even your bios.
?
2008-09-13 07:10:20 UTC
Sounds like you just need to refomat the whole pc and start over. Mine did that and thats how i fixed it, or you could call the company that made it and try to get some answers.
2008-09-15 18:01:12 UTC
Could be a problem with device drivers, hardware or software. This problem can be solved by uninstalling new software, updating device drivers and making minor configuration changes . From http://fixit.in/bluescreenofdeath.html . You can also run a free registry scan using utilities from http://re7.info
2008-09-13 07:04:16 UTC
I think someone hacked into your system and created a back entry into your system.It's better you reinstall the whole OS.The person might have entry in the current system and installed a trojan proxy server.I recommend you to format the complete hard disk and Reinstall the os.



While reinstalling a computer after it has been compromised can be a painstaking process, it is difficult to manually remove all damage done by an attacker and be certain that everything the attacker left behind has been found. Reinstalling a computer from scratch is the simplest way to be sure that your computer is clear of any back-doors left by the attacker in an attempt to maintain access to the computer. The following is a general guide on how to perform a clean reinstall of your computer.



A. Checklist before performing a reinstall



1. Change passwords - You should consider changing passwords to all systems you have connected to from your computer during the period the computer could have been compromised, including, but not limited to online bank and credit card sites, CalNet ID, email, and online stores. The attacker may have installed a keylogger on your computer to collect all of your passwords. DO NOT change the password from the compromised computer. Preferably use a computer that you know is secure. If you do not have access to any other computers, change your password after the reinstall process (section B) has been completed. Be sure to choose good passwords. See: Protecting Your Passwords

2. Make sure your data files are backed up - You should make sure you have a working backup of all of the files you want to keep. Make sure to back it up to places other than your computer's hard drive, such as an USB hard drive or CD/DVD. DO NOT backup applications such as Microsoft Office, iTunes, etc. with the intention of copying back these applications after the reinstall. The attacker may have modified the program files. Do backup files such as term papers, spreadsheets, your music, and emails. Instructions on how to back up the data or settings of your applications such as email clients and media players is beyond the scope of this document.

3. Gather your installation CDs and procedures - Make sure you have your operating system install media as well as media for all other required applications and installation guides. Some computers come without operating system installation media, but with a "recovery" method, either as a disc or as a special partition on the computer's hard drive designed to recover your computer to a "factory default" installation. Make sure to read through the installation to make sure you understand the process. You may also want to download and burn installation files for operating system updates as well as an anti-virus software using a different computer. Downloading operating system update packages is not covered in this document. You can download Symantec Anti-Virus or Symantec Client Security from http://software.berkeley.edu or obtain a C@B CD.

4. Optional readings - These documents provide excellent information on how to keep your operating systems secure. They also describe how to turn on the firewall in the operating system (Step 3 in section B.) It may be useful to print these out for reference during the reinstall process.

* Windows XP: Surviving the First Day

* Securing Mac OS X 10.3 Panther

* Securing Mac OS X 10.4 Tiger



B. Performing the reinstall



1. Isolate the computer - make sure all external drives have been disconnected and the computer is not connected to any network.

2. Reinstall the operating system - Use the appropriate method to reinstall the operating system. During the install/recovery process, be sure to have the installer format your computer's internal hard drive, thus deleting all data on the hard drive.

3. Turn on the operating system's firewall - If you are installing an operating system with a built-in firewall, enable it. See the "Optional Readings" portion in section A for more information. If your operating system does not have a built-in firewall features, or if you plan on using Symantec Client Security's firewall feature, install it now.



OPTIONAL: Another option is to place the computer behind a hardware firewall device. The typical "broadband router" sold at most computer supplies stores will provide a basic firewall capability. If this method is chosen, here are few warnings during the reinstall process.

* Change the password on the firewall! - Default passwords for these consumer grade routers are widely known and should be changed immediately.

* If the router is also a wireless access point, disable the wireless radio. This will prevent rogue computers from connecting to the firewall and attack your computer during the reinstall. You may re-enable the wireless feature once the reinstall is completed. Be sure to consult the manufacturer's manual to enable the wireless security features available on the firewall.

* Make sure no other computers are connected to the firewall during the reinstall, for similar reason as disabling the wireless radio.

4. Install operating system updates - The safer method is to install from the CD burned in step 3 of section A. But if you were unable to do so, you can connect the computer to a network and run "Windows Update" on Windows or "Software Update" on Mac OS X. DO NOT use the computer for any other online activity such as browsing the web or checking email.

5. Install anti-virus software - Symantec Client Security includes an anti-virus software, so if you installed it during the firewall stage, it is already installed. After anti-virus software is installed, run an update check on the anti-virus software to make sure all parts of the software are up to date. Make sure you do not turn off any scanning function of your anti-virus.

6. Reinstall applications - This may be a good time to decide what applications you truely need. Also refrain from installing applications from a source you do not trust. Many free applications provided on the web can contain malwares that may have contributed to your compromise in the first place. Do not blindly trust any applications provided to you through an unexpected popup from a webpage. Some applications will not install correctly with anti-virus enabled. Make sure it is not a suspicious application trying to bypass the anti-virus protection.



C. Recovering from your backup



1. Make sure the anti-virus software is still enabled - If you had to disable the anti-virus software temporarily while installing an application, re-enable it now.

2. Run an anti-virus scan on each of the backup media - This step will catch any viruses that may have infected your email or documents.

3. Copy over the documents to your hard drive - Only copy over files that have not been detected by the anti-virus scan as infected.



D. Keeping your computer safe



1. Keep your operating system and applications updated - Turn on automatic update features where available and run update checks regularly.

2. Keep firewall and anti-virus software enabled - It only takes a foot in the doorway for an attacker to fully compromise a system.

3. Learn and practice good security behaviors - http://security.berkeley.edu/bestpractices.html has many good links.
2008-09-13 07:03:40 UTC
it is know as BSOD error.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Continue reading on narkive:
Loading...