is there a samsung galaxy s5 , the new samsung galaxy , is there going to be a samsung galaxy s5 , samsung galaxy s5 , samsung galaxy s 5 release , samsung galaxy s 5 release date , when will samsung galaxy s5 be released ,
Comments Off

How to recover a files made invisible by malware using Fedora and Command

After a few close encounters with viruses that make files on your thumb drive invisible, I’ve become a veritable expert in recovering such Thumb drives. So after doing my latest “Defence against the Dark Arts” article for the Apple-philic peeps in How to protect your Mac for Viruses, as apparently Macs can get viruses too an article to help out the PC folks seemed to be in order.

Fedora logo How to recover a files made invisible by malware using Fedora and Command

Viruses or a worm that make your files on your Thumb Drive disappear is a common trick used to create mayhem for hapless PC users. It’s especially bothersome as not only does the malware leave behind shortcut links on your Thumb Drive that really only re-infect any machine it’s connected to once clicked, but you can’t get access to your real files.

Rest assured, the virus did not eat your homework. The files are still on your Thumb Drive……there just invisible. If you had read my article How to boot or install Fedora Linux on your laptop or computer from a Thumb Drive and created once such or even burned the Fedora *.iso file as a bootable CD, then you’re good-to-go for this next DIY (Do it Yourself) to recover your files.

At this point all you need are the following tools:

  • PC or Laptop set to boot from your USB Port or CD/DVD Drive
  • Infected Thumb Drive
  • Thumb Drive or CD with a bootable version of Fedora Linux Distribution
  • A Helpful Tech-oriented friend, just in case

If you got this far, then following the White Rabbit should be fairly easy for you:

  1. Shut down the PC or Laptop
  2. Restart and press F8
  3. Select F8 for Safe Mode
  4. Once on the desktop select Start
  5. In the Search Bar at the bottom type msconfig
  6. When the System Configuration menu comes up, select Services Tab and then the Startup Tab
  7. Click on the Date Disabled Tab and search for any entry that bears the same date as the day your computer was infected
  8. Once you’ve located it, uncheck the entry
  9. Recheck for any suspicious listings and uncheck them also
  10. Then select Apply and OK to save the settings
  11. Select Restart to let the computer restart with the new settings
  12. Reboot using your Bootable Fedora Distro Thumb Drive or Bootable Fedora CD
  13. Mount your infected Thumb Drive once Fedora Linux is fully booted
  14. Use Fedora Linux features and look around on the Computer Harddrive as well as on your Infected Thumb Drive for any suspicious looking executable files i.e. files ending with *.exe
  15. Those are the malware or virus. Delete them on sight as well as the shortcut files
  16. Shut down Fedora and Reboot your PC
  17. Click on the Start Menu
  18. Select All Programs then Accessories and then Run to load the Command Line Window
  19. Type cd\ to get to Root C:\>.
  20. Check the drive letter the thumb drive is mounted as
  21. Type the command attrib -s –h –r f:/*.* /s /d
  22. Wait. This may take a while depending on the size of the Thumb Drive or the External Harddrive
  23. All your files will reappear and malware will plague you no more

That’s it. With all your files recovered, now would be a good time to consider installing Fedora or Ubuntu permanently as your Operating system, at least for Web surfing or online purchases as described in How to use Scotia VISA Debit Card Online.

Like the post above? Check out the following related posts:

The following two tabs change content below.
 How to recover a files made invisible by malware using Fedora and Command
Lindsworth is a Radio Frequency and Generator Maintenance Technician who has a knack for writing about his work, which is in the Telecoms Engineering Field. An inspired writer on themes as diverse as Autonomous Ants simulations, Power from Lightning and the current Tablet Wars.
Filed in: All, Tech Tips Tags: , , , , ,
© 2014 Geezam. All rights reserved. XHTML / CSS Valid.
SEO and Customization by Heatray Media.
Real Time Web Analytics