Sunday, 2 October 2016

HOW I RESTORED MY SYSTEM OPTIPLEX GX 620 WITH ADVANCE OPERATING SYSTEM REPAIR TECHNIQUES

It was on the 23rd of September, after booting my system to window 7 Desktop. I decided to dis engage hackers through the task manger, having noticed that there are four established intrusion in my system through “NETSTAT –ANO” Command.

But I noticed that these intruded hackers has manipulated the task manager, that I cannot disengaged them. I have to right click on the task manager and get to click on the properties of the task manager to see security setting . I noticed that they have reset the user from permitting access to “single user”  to “Administrators”  so I have to reset it myself again. When I am done with this. I tried to reboot my system, I noticed that the operating system could not boot to windows menu which was initial problem I solved which was corrupted operating system . the problem continued.

I have to fix it, this time in advanced form, but each time I am concluding the repair, the nearby hackers who are living just close to my house on the other building and under my yard are disabling it. This the people living next to me in another yard are using a magnetic  reaver plug in device mounted to their system to magnet my wi-fi as well as disabled my repairs through MS-DOS.

The advanced repair are similar to the previous one but this time the command goes like this:

(1)       I have to repair the master Boot Record (MBR)

This I achieved through MS-DOS having launched for windows repairs and after it was completed, I click advanced repair and click next. I then entered Admin password which the system requested after clicking next and it displayed options to include windows startup repair and MS DOS. The MS-DOS I selected and type:

            C:\>Bootrec.exe /Fixmbr

The above command permit the repair of the corrupted damaged Master Boot Record (MBR). It is the first sector of your drive and its purpose is to instruct the BIOS the position  to locate the operating system on your computer

(2)       The Second step is to write a New Boot Sector

            C:\>Bootrec.exe /Fixboot

The above command /Fixboot will write a new boot in the system partition. The command will select a boot sector that is compatible with your windows version. This is not limited to window 7, but include other windows. We can use this command when the boot sector is installed with windows that is not original copy. This means low standard operating system or copyright. And we also use it when the boot sector is damaged. When the original windows is installed and use another version to replace it.

(1)           The 3rd command I used was to rebuild the Boot confuguration Data (BCD)

C:\>Bootrec.exe /RebuildBCD

This command is used to fix some error in the BCD. The BCD is where a complete list of what is being load when your state your booting. Also some booting errors are as a result of damaged or missing files in BCD which we use /Rebuildbcd to fix.

(2)           The Final Command I issued before the Hackers Disabled my repair was:

            C:\>Bootrec.exe /Scanos

This command is issued when we have multiple operating system installed in our systems but not all of them are available. This command will select the current Operating System compatible for the system which are not included in the BCD (Boot Configuration Data).

Having completed this process, the Hacker disabled it. But due to my DVD ROM was already failing still being the handwork of this particular hacker with the help of Reaver magnetic device was able to manipulate my DVD ROM by deleting things in the registry Editor. Which almost rendered the             DVD ROM ineffective. The first DVD ROM I changed it because they damaged it through the same process. The new one I replaced, yet they are struggling with it, especially when I am running installation. Is that not wickedness? Somebody that says that he or she is your neighbour?

The most painful thing I experienced from this Hackers was deleting files on my new installation disc I bought through the same mean, whenever I am running installation they will cease the MS DOS Command through the magnetic gadget to my WI-FI causing havock on my system. Sometime I will want to capture the gadget to cancel it but because they are very fast in connecting, I miss the cancellation. And whenever they connect, they must disable one thing or the other. So I bought new Avira Rescue System software; one of the powerful antivirus for wiping off virus from operating system. I insert the disc into DVD Drive to run installation through MS DOS,  when i switch from x:\> Drive which is one of my hard disk because the system has dual core but one hard disk is unfunctional  to E:\> Drive which is DVD ROM and I was successful. I then type X:\>DIR/P/W to display the directories of the Avira virus on the DVD DISK, it showed complete. When I tried to run installation I noticed that the DVD ROM was failing, I tried to know what was wrong by stopping the whole process. But it was strange because that was a new DVD.

I tried to open the disc the second time through MSDOS, behold the Avira Virus CD was empty, the files I saw initially had been wiped out by the hackers, I noticed that the hackers who I knew their locations had deleted my the file on my DVD ROM through MS DOS by connect to my wi-fi, I was mad, I have to pick up my phone and alerted the police of the incident, I told them to investigate in the matter. Because things are getting out of hand. I would have go to state CID the following day to make the official report but it was a Sanitation day which was Saturday. I suspended it. So with evidence I know I can catch up with their wickedness.

I also noticed someone organise teenage boys of 14, 15, 16 and  17 years to use the same monitoring gadget like phone and laptop, under my yard, all they do is to copy my blogging message through wi-fi whenever I am ready to send it. I wonder how people that are martured enough who knows that they cannot read and write, instead of embarking on a seroius trade that will yield them profit at the long run will cease criminality to achieve success. That does not work these days. Those things they are copying are waste, because when the original person relocate to another destination their blogs will fold up. They better start from scratch to learn how to write and type as well as the techniques to blog. This is the main thing that makes a successful blogger. And google can never approve a copyright, may be you thing they don’t know the original owner of those write up. They know. And that is their duty.

Next thing I did was to get the evidence to stop the Hackers on my system with IP addresses I copied down and their port number, I have to do this with my friend in another sytem because mine is no more working. But I first tried it in my system before proceeding to another one.

Now in achieving this I have to take the following steps:

(1)             After restarting the system and pressing F1
(2)             I choose launch for repair
(3)             After the attempted repair and it showed information that it cannot repair the system
(4)             I close the report
(5)             Click on Advance option when it showed up
(6)             I have to click Next
(7)             It requested for my Administrator password which I inserted
(8)             It now displayed five options to include:
A.  Startup Repair
B.  System Restore
C.  System Image Recovery
D.  Windows Memory Diagnostic
E.   Command Prompt

(9)              I have to choose the last option which is the command prompt, it took me to MS-DOS environment.
(10)        I have to type NETSTAT –ANO again to know the active established connections. I copied their Ip addresses from the Foreign address column and their Host ID or name from the PID column. And use the same MS DOS command to trace route location and information about them.

X:\> tracert *type ip address/Hostname*
           
The above command gives you details of the hackers and his ISP Company, what the command does is to give you the information of the source of the attacker from his system which he uses to attack both time and date. But you should know that the address listed before the final one always belongs to the Hacker’s ISP Company.

(11)        Simply Print the information from MS DOS

(12)        And use it as an evidence, report it to your local police department for further tracing route. Now the duty of the police is to contact the ISP Company of the Hacker and trace them from there.


Another thing I did was to eliminate some virus they cease to operate using MS DOS Command:
TYPE:
X:\> DIR/P/W 

and hit the enter key

X:\> Attrib –r –s –H ** /S /D
Or
X:\> Attrib –r

Once  the directories displays, delete or remove  the ones that ends with extensions like: .inf, .exe, .dll and .log

Example:
X:\> Del SETUP.EXE

But if anyone refuses to delete rename it, example rename emeka.exe with emeka.bak

I also noticed that fixmbr command can damage a system partition table if a virus is present or if a hardware problem exist. And once damaged partitions might  be inaccessible, so that data cannot be used. So I have to go and get mini tool partition wizard Bootable CD to rebuild MBR to avoid bringing dmage to data and partition. But I notice mine partition is damaged already. But I cannot penetrate the DVD ROM due to the Hacker keep on deleting the file on the disc. Though the file will be there, but access denied is showing that the files have been deleted.

So I have to remove it from that environment to repair it some other place, because I don’t have the facilities to format and reinstall programs. So I went to a road side computer engineer who aid me with his tools and we formatted the system and reinstall anti virus first before installing new windows unltimate 7 as well as copying back the files. At least the system has come back to it initial state, but the hackers are still trying on to penetrate by all means.  So it is a continuos monitoring affairs.


WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b




No comments:

Post a Comment