Congratulations, Aura!

Corrine

Administrator,
Microsoft MVP,
Security Analyst
Staff member
Joined
Feb 22, 2012
Posts
12,556
Location
Upstate, NY
Congratulations to Aura for completing malware removal training at Bleeping Computer!
 
WTG! I don't have the patience for these type repairs done via forum posts. I am too much of a hands-on person (who does not like to analyze logs - did it too much in the military) so I stick to malware removal with the systems that physically come across my bench. So for sure, I appreciate those who take the time to go through the training and certification process, and are so willing to help those users with compromised systems. :thumbsup2: :thumbsup2:
 
Thank you everyone! :)

I am too much of a hands-on person

It's funny because me and dave (an Instructor on BleepingComputer and GeeksToGo) always says that in our IRC, since he's a tech that mostly worked in shops, while I'm a tier 2 technical support doing internal support for a big company, and we're both used to have direct access to the machines we work on haha! I really am more of a hands-on person as well when it comes to that, and you can see it in the way I handle malware removal as well, so you're not alone! :)
 
Yeah, my roots go back to when I was an electronics technician for Air Force air traffic control radio facilities so I'm used to having a meter probe in one hand and a soldering iron in the other. I got into computers in the early 70s when I had to interface one our LF (low frequency) radio systems for the US Navy to a NORAD mainframe. Mainframes (and their keepers) are a different breed altogether but I still got the bug and stayed interested in computers. I only learned operating systems as necessary to operate the computers. I picked up malware removal out of necessity simply because clients kept brining in infected systems. :( It was then I decided I needed to teach "practicing safe computing" just so users didn't need malware removal services. I found it is a very rare case where an infection could not have been prevented had the user been "security aware" and a bit more disciplined at keeping systems updated and avoiding risky behavior. For sure, the vast majority of infections are more or less self-inflicted.

The one and only time any system I was personally responsible for got infected was via the "sneakernet". A co-worker brought in an infected floppy disk from his home. He forgot he had left it in the floppy drive overnight and the next morning, booted the system. It was a derivative of the Stoned virus. I was not happy. Bringing in floppies from home was not authorized and "boot from floppy" should have been disabled on that system already. In fact, it was that same person who was tasked to disable that feature in a bunch of new systems we got in and reported it was done. He did not work for me much longer. :shame2:

Oh well. A good lesson learned early.

Anyway, thanks again for all that you do. Sadly, with users being the weakest link in security (always have been and always will be), I think you will not have to worry about job security. ;)
 
Anyway, thanks again for all that you do. Sadly, with users being the weakest link in security (always have been and always will be), I think you will not have to worry about job security.

Thanks :) Like I say at work "If the software isn't the problem, and the device isn't, the only thing we didn't try changing yet is the user" :P

Thanks Alex! Yes it did :)
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top