Nuke it from orbit - surely can only mean bin and buy replacement?Search for military installed backdoors on laptopWhat useful security reports can be extracted from a Windows-based machine and its related logs?How do you explain the necessity of “nuke it from orbit” to management and users?How can I restore my Windows certificate cache so I only have those from trusted CAs?What is the risk of copy and pasting Linux commands from a website? How can some commands be invisible?question about clean reinstallation of infected windows 7 (nuke from orbit approach)How can I make sure if my computer is infected and know if I have to nuke it from orbit?
How to deal with a colleague who is being aggressive?
Are there any German nonsense poems (Jabberwocky)?
Why is the Eisenstein ideal paper so great?
Count all vowels in string
Is there a simple example that empirical evidence is misleading?
What Armor Optimization applies to a Mithral full plate?
Why are Stein manifolds/spaces the analog of affine varieties/schemes in algebraic geometry?
Is the Unsullied name meant to be ironic? How did it come to be?
Function argument returning void or non-void type
Expected maximum number of unpaired socks
Nuke it from orbit - surely can only mean bin and buy replacement?
How can I tell if I'm being too picky as a referee?
Mercedes C180 (W204) dash symbol
How to melt snow without fire or body heat?
Do photons bend spacetime or not?
Is there any relationship between frequency of signal and distance it travels?
How can I make an argument that my time is valuable?
Gravitational Force Between Numbers
Is it possible to remotely hack the GPS system and disable GPS service worldwide?
What weight should be given to writers groups critiques?
Parallel fifths in the orchestra
Take elements from a list based on two criteria
Of strange atmospheres - the survivable but unbreathable
The art of clickbait captions
Nuke it from orbit - surely can only mean bin and buy replacement?
Search for military installed backdoors on laptopWhat useful security reports can be extracted from a Windows-based machine and its related logs?How do you explain the necessity of “nuke it from orbit” to management and users?How can I restore my Windows certificate cache so I only have those from trusted CAs?What is the risk of copy and pasting Linux commands from a website? How can some commands be invisible?question about clean reinstallation of infected windows 7 (nuke from orbit approach)How can I make sure if my computer is infected and know if I have to nuke it from orbit?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
If there are places on a laptop malicious programs can leave elements, hooks, back doors etc, in locations such as BIOS, device controllers, firmware etc - what confidence can one have in wiping the disk and installing a fresh os image.
If I were to first use data destruction software to overwrite every individually addressable location on the hard disk, before secondly installing a freshly downloaded Windows image, this presumably isn’t much of a solution.
Surely, binning and buying a replacement is the only option? (Which would be dire, since the machine is new)
malware windows
New contributor
add a comment |
If there are places on a laptop malicious programs can leave elements, hooks, back doors etc, in locations such as BIOS, device controllers, firmware etc - what confidence can one have in wiping the disk and installing a fresh os image.
If I were to first use data destruction software to overwrite every individually addressable location on the hard disk, before secondly installing a freshly downloaded Windows image, this presumably isn’t much of a solution.
Surely, binning and buying a replacement is the only option? (Which would be dire, since the machine is new)
malware windows
New contributor
Related: Search for military installed backdoors on laptop
– forest
8 hours ago
add a comment |
If there are places on a laptop malicious programs can leave elements, hooks, back doors etc, in locations such as BIOS, device controllers, firmware etc - what confidence can one have in wiping the disk and installing a fresh os image.
If I were to first use data destruction software to overwrite every individually addressable location on the hard disk, before secondly installing a freshly downloaded Windows image, this presumably isn’t much of a solution.
Surely, binning and buying a replacement is the only option? (Which would be dire, since the machine is new)
malware windows
New contributor
If there are places on a laptop malicious programs can leave elements, hooks, back doors etc, in locations such as BIOS, device controllers, firmware etc - what confidence can one have in wiping the disk and installing a fresh os image.
If I were to first use data destruction software to overwrite every individually addressable location on the hard disk, before secondly installing a freshly downloaded Windows image, this presumably isn’t much of a solution.
Surely, binning and buying a replacement is the only option? (Which would be dire, since the machine is new)
malware windows
malware windows
New contributor
New contributor
edited 8 hours ago
CompCat
New contributor
asked 8 hours ago
CompCatCompCat
322
322
New contributor
New contributor
Related: Search for military installed backdoors on laptop
– forest
8 hours ago
add a comment |
Related: Search for military installed backdoors on laptop
– forest
8 hours ago
Related: Search for military installed backdoors on laptop
– forest
8 hours ago
Related: Search for military installed backdoors on laptop
– forest
8 hours ago
add a comment |
1 Answer
1
active
oldest
votes
You must do risk management. How likely it is that you and your laptop have been personally targeted? The vast majority of persistent malware operates entirely in software, and formatting the disk is more than enough to remove all traces of it. Sophisticated, firmware-resident malware is extremely rare and unlikely to be a threat unless you have particular reason to think that you are at risk. It is possible to check for firmware-level malware, but it requires a good understanding of common x86 architecture, and access to hardware to read from the flash chips. At a minimum, you'd need SPI readers for the BIOS/UEFI, and JTAG probes for the hard drive firmware and related.
If you don't have any reason to think you're being targeted, just format and re-install.
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "162"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
CompCat is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f210629%2fnuke-it-from-orbit-surely-can-only-mean-bin-and-buy-replacement%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
You must do risk management. How likely it is that you and your laptop have been personally targeted? The vast majority of persistent malware operates entirely in software, and formatting the disk is more than enough to remove all traces of it. Sophisticated, firmware-resident malware is extremely rare and unlikely to be a threat unless you have particular reason to think that you are at risk. It is possible to check for firmware-level malware, but it requires a good understanding of common x86 architecture, and access to hardware to read from the flash chips. At a minimum, you'd need SPI readers for the BIOS/UEFI, and JTAG probes for the hard drive firmware and related.
If you don't have any reason to think you're being targeted, just format and re-install.
add a comment |
You must do risk management. How likely it is that you and your laptop have been personally targeted? The vast majority of persistent malware operates entirely in software, and formatting the disk is more than enough to remove all traces of it. Sophisticated, firmware-resident malware is extremely rare and unlikely to be a threat unless you have particular reason to think that you are at risk. It is possible to check for firmware-level malware, but it requires a good understanding of common x86 architecture, and access to hardware to read from the flash chips. At a minimum, you'd need SPI readers for the BIOS/UEFI, and JTAG probes for the hard drive firmware and related.
If you don't have any reason to think you're being targeted, just format and re-install.
add a comment |
You must do risk management. How likely it is that you and your laptop have been personally targeted? The vast majority of persistent malware operates entirely in software, and formatting the disk is more than enough to remove all traces of it. Sophisticated, firmware-resident malware is extremely rare and unlikely to be a threat unless you have particular reason to think that you are at risk. It is possible to check for firmware-level malware, but it requires a good understanding of common x86 architecture, and access to hardware to read from the flash chips. At a minimum, you'd need SPI readers for the BIOS/UEFI, and JTAG probes for the hard drive firmware and related.
If you don't have any reason to think you're being targeted, just format and re-install.
You must do risk management. How likely it is that you and your laptop have been personally targeted? The vast majority of persistent malware operates entirely in software, and formatting the disk is more than enough to remove all traces of it. Sophisticated, firmware-resident malware is extremely rare and unlikely to be a threat unless you have particular reason to think that you are at risk. It is possible to check for firmware-level malware, but it requires a good understanding of common x86 architecture, and access to hardware to read from the flash chips. At a minimum, you'd need SPI readers for the BIOS/UEFI, and JTAG probes for the hard drive firmware and related.
If you don't have any reason to think you're being targeted, just format and re-install.
answered 8 hours ago
forestforest
42.7k18138155
42.7k18138155
add a comment |
add a comment |
CompCat is a new contributor. Be nice, and check out our Code of Conduct.
CompCat is a new contributor. Be nice, and check out our Code of Conduct.
CompCat is a new contributor. Be nice, and check out our Code of Conduct.
CompCat is a new contributor. Be nice, and check out our Code of Conduct.
Thanks for contributing an answer to Information Security Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f210629%2fnuke-it-from-orbit-surely-can-only-mean-bin-and-buy-replacement%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Related: Search for military installed backdoors on laptop
– forest
8 hours ago