"db" <email@example.com> wrote in message
> Can trojans attack with adsl disconnected; and can they be carried on the
> power supply: ie in through phone, to power supply which is common to
> through the transformer and computer, and so on to hard disc? db
If malware has compromised the computer, then 9 times out of 10 or 10 times
out of 10 IMHO , the user behind the mouse and keyboard doing the typing and
clicking contributed to it in someway. It just doesn't happen by itself.
Here are some things to use or consider when a computer has been
You can use Process Explorer, which will allow you to look at all running
processes and any hidden processes they may be hosting.
With PE, you go to Menu/View/Show lower pane/show all dlls and PE will show
you everything that a process is hosting in the upper pane, when you click
on a process in the upper pane. You can also right-click a line in the upper
pane to go to Properties where you can get more information. You can do the
same in the lower pane, right-click.
Maybe you should find an AV forum or newsgroup with people that can help
practice safe hex
You may not like this one, but sometimes it's the right thing to do with a
machine that has numerous compromises.