Re: HAXDOOR & JAWS

  • From: "Vicki Wherry" <amethyst17@xxxxxxx>
  • To: <jfw@xxxxxxxxxxxxx>
  • Date: Tue, 24 Oct 2006 20:36:59 -0700

Thanks. I've been to the Somantec website and read a lot. As far as running in 
Safe mode, any suggestions how to do that? I don't seem to have a setting that 
does that automatically.

  ----- Original Message ----- 
  From: Richard Sherman 
  To: jfw@xxxxxxxxxxxxx 
  Sent: Tuesday, October 24, 2006 6:39 PM
  Subject: Re: HAXDOOR & JAWS


  Hi Vicki,
  A good computer friend of mine wrote me the following suggestion:

  Here is the Symantec website on that specific virus:
  
http://www.symantec.com/security_response/writeup.jsp?docid=2003-113016-1420-99&tabid=3


  I would also suggest running any spyware/virus software with Windows 
  booted into Safe Mode that way it only starts what Windows needs to run.

  Hope this helps.

  ----- Original Message ----- 
    From: Vicki Wherry 
    To: JFW List 
    Sent: Monday, October 23, 2006 6:50 PM
    Subject: HAXDOOR & JAWS


    I have recently been infected with HAXDOOR on both my desktop and laptop 
    computers. I use XOFT SPY
    to remove the nasty thing, but it seems to come back, even though it says 
    it's completely removed. When I reboot my computer, JAWS says it needs to 
    make changes to my system, and it won't run until I reboot. Once rebooted, 
I 
    usually have to manually begin running it. I also do a regscrub, clean all 
    the cookies, temp files and temporary internet files. I empty the recycle 
    bin, run Norton and NOD32. I can't get rid of HAXDOOR, and it seems to love 
    playing tricks with my JAWS.  Has anyone had any success in completely 
    removing this infection, and if so, what tools did you use? My next option 
    is to completely reinstall Windows on both computers. BTW, does anyone have 
    any info on how this is spread? I use an encrypted router, although it is a 
    B wireless router, and I have the Windows Firewall running most of the 
time. 
    Thanks.

    Vicki

Other related posts: