I am pretty sure it is the malware, I already have two hard drives that are blacklisted from the system
and are now inaccessible, because it is locked out by the malware. Also this malware shut off the
cooling fans for the CPU and video card, I had to find work around solutions for that too.
Try starting the MOBO without the hard drives and post results here. If it’s not a MBR malware than your BIOS got infected. I wonder WHAT THE HELL DID YOU DO to get this kind of malware, I’ve never seen anything like this before. Might be hardware failure.
It is not the DVD roms of Linux at fault, they worked before, and now they don’t.
Unless I use text only mode, the reason for this is that this malware is only designed to intercept
and interpret input from a GUI based operating system, unless you try to wipe or repartition the
hard drive which the memory resident part of the malware actively prevents. However the malware
does not prevent viewing of the contents of the hard drive unless you try to view the boot sector.
Why would a malware prevent you from using GUI but not text-base? And what type of malware can infect the memory (RAM) when booted from a LiveCD? it does simply doesn’t exist this type of HD malware. Order an Ubuntu CD and test with that. I also recomend you to do
sudo dd if=/dev/zero of=/dev/sda bs=16M count=10000
to wipe your partition table and a little more.
The whole point is that you can’t zero out the hard drive unless you use ‘Secure Delete’ first
because the running memory resident portion prevents writing to the hard drive outside of Windows 7.
The Malware uses upper memory not used by Windows 7 or Linux and also the video card.
You can only zero the drive after doing secure delete first? That’s also BS, zeroing the entire drive will make ANY VIRUS, NO MATTER HOW STRONG IT IS, to be inaccessible/prevent it from operating.
Because Linux initializes the video card for GUI differently than Windows, the malware kicks in
and deactivates the video card the instant you try to use Linux in GUI mode.
I don’t think you’re trying to use a LiveCD.
I need a 64 bit version of ‘Secure Delete’ to kick the malware out of the top 4 gigabytes of memory
and the x86 versions that are commonly available on ‘Back Track 4’ can only reach the
lower 4 gigabytes of memory which is not good enough to remove the active running portion of the malware.
Again, you’re trying to remove a pretty good malware while it’s operating. Download a Linux LiveCD from a friend’s house and then wipe the entire drive. No surprise you can’t do nothing, you’re inside hell trying to drink cold water.
And since I don’t know how to incorporate a tgz or bz2 file into the build system it would be much more
easy if ‘Secure Delete’ were one of the selectable packages in the build system.
Why do that? Just boot from a LiveCD and wipe the disk.
It is very hard to locate any Linux packages using only Windows 7, and even tougher to compile
anything for Linux using Windows 7. I wouldn’t trust anything compiled on my system while
there is an active malware infection anyway. Although I think burning an ISO would be reasonably safe.
AGAIN, you’re using W7. Get out of there. Download an openSUSE LiveCD, and then type the ‘dd’ command I just told you above.
There isn’t any official name for the malware that is preventing me from installing Linux
because it remains unknown to all the Antivirus companies with the exception of Kaspersky.
Which Kaspersky classifies it as an undocumented type of Stuxnet, Flame or Gauss worm.
Is this a HD malware? Because if it is, it’s not loaded before the LiveCD is. Download Kaspersky Rescue DIsk and do a full scan.
BTW, can you post the source of your information above?