How to Remove Rootkits

A rootkit is one of the sneakiest forms of malware because it almost always goes undetected. A rootkit goes undetected because it is capable of installing itself on your PC by sneaking past your PC's operating system and antivirus scanning program. For this reason, a rootkit is extremely difficult to remove from your computer.

The most common method of removing rootkits is by completely wiping the hard drive clean and reformatting it. Since all of your files are on the hard drive, removing a rootkit also includes wiping out all of your files and starting fresh again. Depending upon how much damage the rootkit has created, it may be possible to back up the files from your PC prior to reformatting the hard drive.

Hard Drive Imaging

If you have not already done so, it is a good idea to make a regular practice of duplicating your hard drive in the event that a rootkit or other malware makes its way into your PC. This technique is known as hard drive imaging and creates an exact duplicate of your hard which enables you to restore your system to its original state.

If you have not engaged in the practice of hard drive imaging and want to avoid wiping your hard drive completely, you may want to consider a rootkit removal program.

Rootkit Removal Programs

Although a rootkit is difficult to detect, there are several free and paid programs that have a good reputation for detecting rootkits. Before choosing one of these programs make sure you do your research to make sure they come from trusted sources and are effective in detecting and removing rootkits.

  • Rootkit Revealer: This program detects rootkits by scanning your computer system at the highest level and then comparing it to the results at the lower level. It provides a way to do a manual scan and an automatic scan with an easy way to interpret the results.
  • F-Secure Blacklight: This rootkit detection program works to fight rootkits and all the types of malware that feed off of rootkits, by running a detection system that identifies files that are hidden from users and antivirus programs. It examines your computer at a very deep level so it can identify hidden objects. When it detects unauthorized files, it provides you with the option to remove them.
  • Rootkit Buster: This program acts a combination scanner and registry cleaner. It scans hidden files, drivers, registry entries, and Master Boot Record rootkits and cleans hidden registry files.

There area many other rootkit removal programs available if you do your research. If your computer is not currently infected with a rootkit, it is a good idea to take precautionary measures and employ a firewall, antivirus, and anti-malware program, and then do a rootkit scan on a periodic basis.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.