2013-11-28

CryptoLocker Prevention for Home Users - 28 November 2013

Details of the cryptolocker virus:
Proper Care & Feeding of your CryptoLocker Infection: A rundown on what we know. : sysadmin

This document will detail the use of a program to put settings on your computer to help prevent the spread and installation of the Cryptolocker virus.

This is not a catch all, nor does it guarantee the complete protection from this virus. Up to date virus protection, correct firewall setup and safe browsing practices are also key in the prevention of this virus.

If you receive an email with a ZIP attachment (even from someone you know and trust) do not open it unless you are 100% sure it is safe and the sender did indeed send it (a quick email back to them will confirm this)

The removal of the virus is simple, however there is currently no way to decrypt the files that have been effected short of paying the fee to the virus creators.

Backups to USB drives that are stored away from the computer are the only recovery option for infected computers.

Disclaimer: The contents of this document are provided “AS IS”. This information could contain technical inaccuracies, typographical errors and out-of-date information. This document may be updated or changed without notice at any time. Use of the information is therefore at your own risk. In no event shall JustCommodores.com.au or any of the members of JustCommodores.com.au be liable for special, indirect, incidental or consequential damages resulting from or related to the use of this document.

Steps:

1. Navigate to the following address:
CryptoPrevent | Computer Technician - PC Repair Software |Foolish IT LLC

2. Scroll to the bottom of the page and click the following link:

3. Once the download completes, run the program

4. Click Run:

5. Click Yes on any User Account Protection messages

6. Click Next:

7. Select I accept the agreement and click Next

8. Click the check box to create a desktop icon and click Next

9. Click Install

10. Once install has completed click Finish to launch the program:

11. Click No on the purchase key prompt

12. Click No on the learning more screen (unless you want some reading)

13. For the most complete protection you can select all checkboxes and apply, however the following checkboxes should be selected to provide the best compromise between protection and computer functionality:

Guard Against Fake File Extension Executable and & RLO

Whitelist EXEs located in %appdata% / %Localappdata%

Clear all other options.

14. Once selected click Apply

15. Once it is applied the program will prompt for a restart. Click Yes to restart

Show more