Looking for infections in greater depth

Just to get an idea of the work flow
1. TDSS scan
2 OTL or similar scan
3 Analysis of data and removal/ replacement of offending items.
4 Offline scan with Kaspersky, Eset or similar program.
5 Patch, repair, optimize.

I know it's simplified and somethings may be in different order, but is it like this?
I have been trying to get better at manual removal and am interested in how others do it.
altrenda,

Yeah, more or less. Of course, you sort of have to play it by ear and react to what you find in some cases (signs of other problems lead to different repairs, such as TCP/IP or system file infections), but this workflow is effective.

I found that the best way to learn it is to study the threads of the experts on the forums I referenced earlier. I did this for years before finally committing to the method myself. Now it is the only method I will ever use. I am so good at reading logs now that it's become practically second nature. And I'm actually completing training at one of the major "schools" online just for the heck of it to get even better at it and give back a little bit. :)
 
Back
Top