![]() Will this take a long time? Yes, it will. Copying folders will also copy hidden files, and we don't want any of those. And copy files one by one, only if you recognize them. Do NOT use the migration assistant or restore from a backup - it's very easy to install something in the user's library that will persist through a restore process. Next, you get to reformat the computer's drive and reinstall everything from the original media. That needs to happen immediately after turning the computer off. Email, online banking, Apple ID, Google Drive, dropbox - anywhere she has ever accessed from that machine. From a different computer, she needs to change all of her passwords. Your friend needs to stop using her computer. This is a trojan, not a virus, and like the horse the Greeks gave to the Trojans it bypasses almost all of the system security. ![]() If she said yes, and typed it in, she just allowed the download to install anything it wants. ![]() Videos will never, ever ask for your password. If the download included an installer package, program (perhaps disguised as a video) or script, and you run it, it can do many things.Īsk your friend if she was asked for her password at any point in the process. Videos are, in general, just data files and thus safe to open. So the torrent file had extras, and your friend installed them. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |