Click here for important information about

Unauthorized use of owner's CPU for sharing DSL & Programs

June 11, 2012 at 13:50:17
Specs: Windows 7, 712
Newly purchased CPU was configured by a 3RD party. An accessory was added for backup but analysis of its contents revealed multiple users, inter net addresses, sub controllers, floppy drives,local disks (non-partitioned), profiles & data of multiple users simultaneously accessing owners dsl connection, CPU programs, modems, ports, operating systems (including security); event & security logs revealed detailed time frames for logons and identified users by number. These multi-pronged breaches of owner's personal data were fraudulently navigated by unknown entities, all to the detriment and frustration of owner. Copyright and trademark statutes were likewise compromised by 3RD party utilization of owner's programs/software made possible by owner's license agreements with CPU providers. Even percentages were called out, such as 23 per cent, 10 per cent. When new security provider ESET was installed, Host invasion Prevention detected the aforementioned scheme. The CPU is so thoroughly infected with malaware, systems on systems removed ESET, zipped its files and disabled supporting systems and substituted its own security provider. Finally, the system is in lockdown with no way to exit dos and run a factory restart. passwords have been changed. Owner has lost control of its CPU.

See More: Unauthorized use of owners CPU for sharing DSL & Programs

June 11, 2012 at 14:01:27
A CPU is a chip that fits in the socket on the motherboard, it can't be "configured by a 3RD party". I think what you're referring to as a "CPU" is the computer itself. See your other thread for more info.

Unplug the power cord & open the case. Find the clear CMOS jumper & move it to the "clear" position. Wait a few seconds, then move it back. Plug in the power cord & reboot. The BIOS password will be cleared & all BIOS settings (including date & time) will be reset. If you can't find the jumper, simply remove the CMOS battery for a few seconds instead.

Once you've cleared the password & reconfigured the BIOS settings, boot off a Windows disc, remove ALL partitions, create at least 2 new partitions (one for Windows, one for storage), format using NTFS, then reinstall Windows from scratch.

Of course, this means ALL data & programs will be lost, but sometimes, you've gotta do what you've gotta do. And get some decent security. Obviously whatever was installed wasn't doing it's job. Consider AVAST, AVG or Microsoft Security Essentials (all are free), along with Malwarebyte's Antimalware.

Report •

June 11, 2012 at 14:18:41
The inexperienced owner got the computer infected. It certainly didn't arrive that way.

Educate the owner on safe computing.

Answers are only as good as the information you provide.
How to properly post a question:
Sorry no tech support via PM's

Report •

June 11, 2012 at 17:38:57
I guess it is possible that somewhere in the build process a used drive was installed. Very unprofessional but we don't know what you have or who this third party is.

Reload the OS from OEM media. Get a good security suite on it. Learn and use as many best practices as you can to avoid this in the future.

Hang up and live.

Report •

Related Solutions

June 13, 2012 at 18:48:24
Hello: thank you for a courtesy reply. The issues are complex and inclusion of all of them would have generated an undue amount of text for this forum. The computer was purchased "used" as must be obvious from its age. The 3rd party ran security scans and alleged to have found no infection. However, modifications to the registry were documented while in his/her possession and correlated with the appended backup from another used drive containing the "sharing" means supported by recent registry modifications to the computer as well as dimunition / enhancment of pre-existing software programs. These facts are focused within a specific time frame, correlate and define the inception of infection.

Report •

June 13, 2012 at 18:58:12
Thank you for the well taken advice. I have learned so much in the last four months, it's obvious I've just scratched the surface. The incident in question has laid the foundation for an even more concentrated effort.

Report •

June 19, 2012 at 18:21:54
Hello: Choosing a best answer is difficult because all of them were responsive; however, the suggestion to remove the battery or adjust the jumper cable and reboot allowed me to deal with the password block. I was also able to edit Bios and change the sequence of drives. Windows appeared and factory installation was successful. As I was reinstalling my preferred programs the same problems occurred and it became apparent that the "sharing workgroup" software was still in the system, apparently on the hard drive. It was not that way when I purchased the computer. Built-in security principles kicked in to enforce the rights of other "users". Once again, I lost control of the computer and eventually had to shut it down. I have sent it out of town to a large facility as I live in a rural area. Enforcement agencies will be alerted and interstate commerce violations may be an issue, especially as to the venue of the server. I will report in next week when I have the computer back. Thanks again, for all the input. Respectfully submitted, Alesie

Report •

June 19, 2012 at 19:37:07
If you manually deleted ALL partitions and created NEW partition(s) and used the Full Format (not the quick format) you would have a completely clean drive on which to install your operating system. Investing in a NEW Retail version of Windows 7 will ensure that you have a completely clean install and that no left over nasties would be lurking in the closets. As soon as the Windows install is complete, install your hardware drivers, run Windows update until there are no more urgent updates, and then install Avast of other quality antivirus program (not Norton or McAfee). After this, you are ready to install all of your programs. If you are not absolutely certain of where the program install originated DO NOT install it. Install only programs you purchased new from reputable sources or downloaded from truly known, reputable sites. Anything that has a questionable origin, needs to be discarded and replaced. Your antivirus program needs to be wet to automatically run and update itself. Periodically scanning also with Malwarebytes is also a good idea. Finally, do a periodic clean out of the system (Disk Clean Up, browser cleaning of history, cookies, and temp files, st the least). This is the only way to get and keep a clean machine.

You have to be a little bit crazy to keep you from going insane.

Report •

Ask Question