Replacing Hard drive

Discussion in 'other software & services' started by kurokage, Feb 6, 2007.

Thread Status:
Not open for further replies.
  1. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    I've been having some computer issues, and I just wanted to know, if I replace my hard drive, something that I was planning on doing anyways, is it possible that something malicious could carry over? I'm not going to master-slave anything, or whatever, just a pure and simple hard drive replacement. I've heard of some scary rootkits that can, but most of those from what I understand are proof of concept and not actually real. Can anyone help me?
     
  2. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    Hello,
    What will be the purpose of the new drive?
    Will it run OS or store data? Or both? Do you intend to image your existing system over or install from scratch?
    Mrk
     
  3. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    It will house the OS, and like I said, its a fresh install of the OS, I'm not going to image over my existing system or anything like that.
     
  4. DVD+R

    DVD+R Registered Member

    Joined:
    Aug 2, 2006
    Posts:
    1,979
    Location:
    The Antipodes
    Nothing Nasty will get transfered over If you do:

    Anti Virus Scan (Clean and Delete Option)
    Anti Spyware Scan (Quarentine and Delete)
    Clean Hard Drive for Junk & Stuff (CCleaner is Good)
    Thouroughly Defragment your existing Drive, and Defrag the New Drive Immediately After the Fresh Install

    YOu should be good to go after these proceedures :cool:
     
  5. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    What does the defrag do?

    I am curious/kinda freaked out by things like VM rootkits and stuff which are supposed to stay over, theoretically.
     
    Last edited: Feb 7, 2007
  6. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    Hello,
    If you install from scratch, nothing can or will passively transfer itself.
    But if you install something infected, it will reoccur. Up to you.
    Mrk
     
  7. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    Nothing can transfer? Are you sure? I don't know anything about computers, but I keep hearing all these stories about VM rootkits and stuff. Now, I don't know anything about them, or even if they are just theoretical, but they're pretty scary and hard to detect.
     
  8. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,224
    Hello,
    If you delete the partition table and format the hard drive - there will be no trace left.
    If you install clean OS + clean programs - there will be nothing wrong.
    If you copy your old data that contains no malware - there will be no malware on your new machine.
    Even if it contains malware - until you execute it - it will only be files, like any other file.
    You can forget about sci-fi stories. Relax.
    Mrk
     
  9. ThunderZ

    ThunderZ Registered Member

    Joined:
    May 1, 2006
    Posts:
    2,459
    Location:
    North central Ohio, U.S.A.

    Windows is kind of like an unorganized Secretary. When ever you open a file or run a program it is like going to a filing cabinet and pulling out a folder then shuffling the files within it. When you close that folder\program Windows, the unorganized Secretary, does`t always put all the files back into the folders and then back into the filing cabinet in the proper place. Defragging your hard drive does.
     
  10. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    So rootkits can't hide in BIOS or on the sound card or something? Thanks for everyone's help so far, by the way.
     
  11. Ice_Czar

    Ice_Czar Registered Member

    Joined:
    May 21, 2002
    Posts:
    696
    Location:
    Boulder Colorado
    there are only proof of concept malware of those so far and they require physical access, not remote execution or employing your OS as a platform (they need to be loaded just like any other firmware flash)

    the probability is effectively zero
     
  12. kurokage

    kurokage Registered Member

    Joined:
    Feb 6, 2007
    Posts:
    6
    OH WOW. You don't know how much you have relieved me. You are amazingly awesome. Thanks so much! all these things I've read are so scary, but they always seemed so vague. No wonder, its because they're not exactly real, they're proof of concept. Great. Thanks so much.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.