obxjerry wrote:If instead of saying "but then I have to use a NTFS computer to burn a floppy. That will work, right?" I had said; The only computer I have that will burn a floppy is a NTFS computer, would that make a difference? Even if I boot the CD to burn the floppy in the sick computer, it is NTFS. I really think what you're saying is it doesn't matter because the hard drive isn't brought into play in this process.
Not exactly, we are talking about the file system used on the hard drive by the operating system that burns the floppy. Floppies don't support NTFS so that file system is irrelevant for them, except for running your good system off the hard drive which is not suspect.
We have to cross this bridge, we might as well do it now. I know the answer to this one but I've been wrong before. I have the 2 Puppy CDs but they've been in the sick computer. They didn't boot, but that's probably moot, (note rhyme) because nothing more (not even a virus) can be written to a CD-R that has files on it. I'm pretty sure the CD drive is read only if that matters.
You are essentially correct, although it is possible to burn Puppy "multisession" to allow adding to a CD. If you didn't deliberately do that, your CDs are read-only, and present no danger of contamination. Even if they were somehow contaminated, it is doubtful the malware would work under Puppy. As long as you don't use those disks while you are running Windows, you should be completely safe, even if they were burned "multi-session".
Since you have these already made, you can use the super multi-boot floppy you made previously (just for example) to boot them even if the machine will not boot directly from the CD.
So, if my Puppy CD is good to use, I could install Puppy to the NTFS laptop (it's going to be there in the end anyway). That stone would kill 2 birds. I could use Puppy to burn the EBCD floppy and it would give us a safer OS on that computer. My wife uses that computer to access Facebook (a known treasure trove of viruses). I can't say much. She knows where I sleep.
Installing Puppy to that machine should not present challenges. If you have a working Windows system, I do
not recommend wiping the hard drive, -- particularly on notebooks. OEMs have the habit of sticking secret bits of code in places you might not know about. Sometimes these are diagnostics, or recovery software, in other cases they are treated as part of the BIOS, like the award flash utility. The swap file used by hibernate functions on Windows machines is inside the Windows partition, as is code to resume. You don't want to completely eliminate this if you have any choice. (All these things help to tie you to the supplier, so they aren't always forthcoming about what they have done.)
You can resize the NTFS partition, using Gparted, and create a modest (a few GB) ext2 partition in the space made available. If you have enough space, it might also be nice to create a 512 MB Linux swap partition while you are using Gparted (from within Puppy.) It is a good idea to run whatever filesystem checks your Windows system has on that NTFS partition, and defragment, before resizing, and run it again immediately afterward, so it can correct any errors Gparted makes which might confuse it.
When you come to installing Puppy on that new partition, choose a frugal install. You can use this while booting from a CD, or you can install GRUB to the MBR to get a boot menu for dual-booting. We'll help you to edit the menu.lst file for your particular configuration, (assuming we can still talk to you.)
OK, I'm am gradually coming to the realization I'm really not sure where we are going. I keep trying to get a Puppy CD to boot. I'm thinking one of the features of Puppy is you can do something with files on a W*****s partition. I tried booting DSL several times and then slipping in a Puppy CD hoping I could trick it.
It finally occured to me maybe DSL isn't completely useless. I googled d*** small linux fix windows and came to this
http://www.tech-recipes.com/rx/1624/how ... tfs_files/
Is this somehow useful?
That is certainly one route to go, and might help to recover irreplaceable pictures, for example, though I believe you are not as far from using Puppy as you think. (By irreplaceable, I do not mean pictures downloaded from a free site in Ukraine. Those are widely available.)
Neither of the Puppy CDs I have will boot. If I burned another one is there a chance it would boot?
Yes. But, rather than continuing to do the same thing, put the CD in first and then try to use the boot floppy to boot off the Puppy CD. On a fair number of old machines this works even when you can't boot directly off the CD from the BIOS.
While I was looking for the BIOS information on the post screen I may have found something. The first screen that comes up says
SIS
Sis 6326 AGP true color graphics and video accelerator
8m byte video memory BIOS version 1.23f
Support Vesa BIOS extension ver. 2.0
the second screen says
Award Modular BIOS V6. OOPG
Copyright (C) 1984-2000 Award Software Inc.
It does have a number in the lower left corner I haven't caught yet.
Is this too many references to BIOS, like the virus has added some of them?...
No, the separate video BIOS is perfectly normal. To get the boot screen to hold still so you can copy the number, all you need to do is hit "pause" on the keyboard. Here's what the number looks like on an old machine of mine.
BTW: I have a machine with SiS 6326 video, and Puppy works on it.
At this point, I'm thinking that malware which got you was very unsophisticated. The reason is that it doesn't appear to have any money-making potential, and it gives itself away quickly.
If this is true, you have only two hurdles: get back to booting your Windows system, clean up the infection. That free trial of bootITng would be enough to find out if it can repair the boot block. I didn't have to pay anything to download it. (But don't install it to the hard disk.)
Sophisticated exploits will prevent you from downloading and using malware removal tools under Windows. I'm guessing this one is dumb. Get to the point of booting Windows, and we can go after the malware with any number of tools even if they have to be downloaded on that other machine. Just remember the system you are running is still suspect.
If you can't get back to booting Windows, we will continue along the route of using separate bootable recovery tools.