×

Notice: this is a preview of the original feed. Please, read our copyright notice. If you are the copyright holder of this feed click here.

feed

Tags: blogspot remove somoto.com instruction malici malware comput uninstall toolbar software mountain view

Malware Removal Instructions
From network security to phishing and malicious software. Whatever problem you have, we're here to help you solve it!...

by Admin, Mountain View (geolocate), published: Thu 25 Jun 2015 07:34:00 PM CEST.

Favicon Remove "Ads by AdsAlert" Adware (Uninstall Guide)
18 Jun 2015, 9:13 pm
I'm glad you want to learn more about this adware which displays "Ads by AdsAlert" advertisements on your screen as it really does affect all of us on a daily basis (at least while we're connected to the internet – which is on a daily basis, am I right?!) However, I'm willing to bet that while you know what AdsAlert adware looks like, did you know that, aside from being a marketing device, it can actually cause you some very real operating issues. Especially if you've ever been infected by one of the more serious varieties.

Just how malicious are AdsAlert advertisements?

Okay, it is fair to say that advertising supported software – adware - is not as dangerous as some of its malware cousins but that definitely doesn't mean that you should ignore it if you have been attacked by AdsAlert adware in one of its more unpleasant guises.

For while some adware is simply online marketing and adverts that have been designed to woo us into handing over our credit card or PayPal details for that last minute cheap flight or pair of bargain sneakers, there is another type of adware, AdsAlert is one of them, that will drive you insane with pointless pop-up ads by AdsAlert and pop-under windows that are for products, games or services that you don't have the slightest interest in. What's more, once you have adware of this nature on your computer, you'll find it frustratingly difficult to get rid of it.

Who creates adware, and why?

As mentioned, there are two sides to the advertising supported software story. When it is not harmful, it is just trying its best to get you to part with a little (or a lot of!) cash. Just in the same way that traditional print advertising does. Having said that however, this 'innocent' form of adware has a hidden dark side. And that is to really up the pressure and try and get you to spend by mainly showing you adverts for products that you will be interested in. How does it know that? Because when adware like AdsAlert was installed on your PC it also downloaded a component which watches and records which websites you visit. It goes even more in depth than this by then monitoring which goods or services you look at. It sends this data back to the adware's owner or programmer and they will subsequently customize the adverts you see to ones that reflect the products you have recently been looking at.

But regardless of whether adware is showing you "Ads by AdsAlert" for products you have a genuine interest in, or for something you really don't care about (X rated manga, anyone?) all programs have one thing in common: to drive traffic to a website and to potentially generate sales once you're there.

What other issues does AdsAlert adware create?

As if a relentless bombardment of pop-up windows wasn't annoying enough, and is if having an unknown third party track your every move wasn't invasive enough, it also slows your computer and internet connection right down. Still not enough to get upset about? How about the fact that it can destabilize your system and leave you wide open to attack by even more malware? I think you will agree with me that it's time to get rid of it. To remove adware from your computer and stop AdsAlert ads, please follow the steps in the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!

Written by Michael Kaur, http://deletemalware.blogspot.com



"Ads by AdsAlert" Removal Guide:


1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.





2. Remove AdsAlert related programs from your computer using the Add/Remove Programs control panel (Windows XP) or Uninstall a program control panel (Windows 7 and Windows 8).

Go to the Start Menu. Select Control PanelAdd/Remove Programs.
If you are using Windows Vista or Windows 7, select Control PanelUninstall a Program.



If you are using Windows 8, simply drag your mouse pointer to the right edge of the screen, select Search from the list and search for "control panel".



Or you can right-click on a bottom left hot corner (formerly known as the Start button) and select Control panel from there.



3. When the Add/Remove Programs or the Uninstall a Program screen is displayed, scroll through the list of currently installed programs and remove the following:
  • AdsAlert
  • GoSave
  • Active Discount
  • SaveNewaAppz
  • and any other recently installed application


Simply select each application and click Remove. If you are using Windows Vista, Windows 7 or Windows 8, click Uninstall up near the top of that window. When you're done, please close the Control Panel screen.

Remove AdsAlert related extensions from Google Chrome:

1. Click on Chrome menu button. Go to ToolsExtensions.



2. Click on the trashcan icon to remove AdsAlert, Active Discount, MediaPlayerV1, Gosave, HD-Plus 3.5 and other extensions that you do not recognize.

If the removal option is grayed out then read how to remove extensions installed by enterprise policy.




Remove AdsAlert related extensions from Mozilla Firefox:

1. Open Mozilla Firefox. Go to ToolsAdd-ons.



2. Select Extensions. Click Remove button to remove AdsAlert, Active Discount, Gosave, MediaPlayerV1, HD-Plus 3.5 and other extensions that you do not recognize.

Remove AdsAlert related add-ons from Internet Explorer:

1. Open Internet Explorer. Go to ToolsManage Add-ons. If you have the latest version, simply click on the Settings button.



2. Select Toolbars and Extensions. Click Remove/Disable button to remove the browser add-ons listed above.

Share this post


Favicon Remove WordAnchor Ads Malware (Uninstall Guide)
17 Jun 2015, 9:12 pm
WordAnchor or Word Anchor is a type of software program which is downloaded on to your PC and displays "Ads by WordAnchor" or "Powered by WordAnchor" adverts on your screen. At their most annoying, these WordAnchor adverts will be distracting pop-up windows, but they are often ads that simply sit upon your screen. You might be adept at ignoring them but plenty of people are suckered into clicking through, as adware adverts increasingly litter our screens with their messages.

Advertising and marketing are an inescapable part of modern life, but love it, hate it or simply ignore it there's no getting away from the fact that every company and brand out there is battling for our hard earned dollars, and that includes businesses who have a web presence – which let's face it is pretty much all of them!


Online marketing is a huge industry and our computers are no longer just devices that we use for work or leisure, they are equally used as a means of targeting us and trying to convince us to click that advert, visit that website and hit that button to 'add to cart'.

What is the point of WordAnchor adware?

WordAnchor is not really any different to its traditional counterpart, except it has even greater chances of generating a sale, thanks to the product or service it is selling being just a couple of clicks away. Like print or billboard advertising, its purpose is to drive traffic to a store and increase sales for its owner.

Is WordAnchor dangerous?

It IS a type of malware, however it should not be confused with something like rogue ware or a Trojan Horse, but having said that, if you have been infected with the WordAnchor that is spamming you with relentless pop-up windows for decidedly dodgy services, you should take steps to get rid of it. This type of malicious adware is sometimes used to install spyware on your computer or other device.

WordAnchor or Word Anchor uses spyware to a certain extent as it monitors the websites you visit so that it can tailor the adverts you see to match your interests. However, at its worst, spyware can contain a keylogging component which records the keys you are typing, and then uses this information to access your private accounts and steal your personal data. It will either use this for its own ends or sell the intel to a third party. The solution? Protect yourself by installing anti-malware software today.

If it's already too late and your computer is infected by WordAnchor and its relentless advertisements, please follow the steps on the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!

Written by Michael Kaur, http://deletemalware.blogspot.com



WordAnchor Ads Removal Guide:


1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.





2. Remove WordAnchor related programs from your computer using the Add/Remove Programs control panel (Windows XP) or Uninstall a program control panel (Windows 7 and Windows 8).

Go to the Start Menu. Select Control PanelAdd/Remove Programs.
If you are using Windows Vista or Windows 7, select Control PanelUninstall a Program.



If you are using Windows 8, simply drag your mouse pointer to the right edge of the screen, select Search from the list and search for "control panel".



Or you can right-click on a bottom left hot corner (formerly known as the Start button) and select Control panel from there.



3. When the Add/Remove Programs or the Uninstall a Program screen is displayed, scroll through the list of currently installed programs and remove the following:
  • WordAnchor
  • GoSave
  • Active Discount
  • SaveNewaAppz
  • and any other recently installed application


Simply select each application and click Remove. If you are using Windows Vista, Windows 7 or Windows 8, click Uninstall up near the top of that window. When you're done, please close the Control Panel screen.

Remove WordAnchor related extensions from Google Chrome:

1. Click on Chrome menu button. Go to ToolsExtensions.



2. Click on the trashcan icon to remove WordAnchor, Active Discount, MediaPlayerV1, Gosave, HD-Plus 3.5 and other extensions that you do not recognize.

If the removal option is grayed out then read how to remove extensions installed by enterprise policy.




Remove WordAnchor related extensions from Mozilla Firefox:

1. Open Mozilla Firefox. Go to ToolsAdd-ons.



2. Select Extensions. Click Remove button to remove WordAnchor, Active Discount, Gosave, MediaPlayerV1, HD-Plus 3.5 and other extensions that you do not recognize.

Remove WordAnchor related add-ons from Internet Explorer:

1. Open Internet Explorer. Go to ToolsManage Add-ons. If you have the latest version, simply click on the Settings button.



2. Select Toolbars and Extensions. Click Remove/Disable button to remove the browser add-ons listed above.

Share this post


Favicon Remove ABOUT FILES! Ransom Virus and Restore Encrypted Files
17 Jun 2015, 8:29 pm
If you find "ABOUT FILES!" text ransom note in every single directory on your computer and the "error_" prepended to all your files, for example error_jun-2541584.xls, then your computer is infected with ransomware. It's a fairly obvious statement when we say that the more time we spend surfing the web or working online, the greater the chances are of us falling victim to ransomware infestation. And in exactly the same way that antivirus programs and security tools are becoming more and more sophisticated, so too is malicious software. Cyber criminals have realized that it's a lucrative business and are constantly dreaming up new ways to attack us and exploit our cyber security loop holes and our emotional vulnerabilities to fill their bank accounts. Therefore, if we are to protect ourselves from becoming yet another faceless victim and a malware statistic we need to take proactive steps.


The thing is that if you're not a nerd, geek or tech whiz kid, it is a bewildering world and it is difficult to know what issues we face and what the latest method of attack is. And that's precisely why it is important to stay up to date and know as much as you can about the different types of ransomware and their operating methods. And it goes without saying that you also need to make sure you have a reputable malware program running on your computer.

What is "ABOUT FILES!" ransomware?

Without going into the nitty gritty, ABOUT FILES! ransomware is a type of software program that is designed to hold the files or programs on your computer hostage. Yes, you really will become a victim of a kidnapping as you will only stand a chance of retrieving your files if you pay a ransom for their release. It encrypts your files using AES and RSA encryption algorithms, drops ABOUT FILES!.txt file in every directory where at least one files was encrypted and adds error_ in front of each encrypted file name. The ransom note reads:

Hi guys! We have bad news for you.
Your files have been crypted by 2 popular alghoritms - AES and RSA. Only we have private RSA key
All crypted files now starting with "error_":

You can buy our decryptor that will recover all your files. You need:
1) Send us 3 bitcoins on our bitcoin address [edited] (Now 1 bitcoin approximately = 230 usd)
Only we and you know about this address, so we will understand that its your payment.
2) Send us your unique identificator on our mail dogdog@ruggedinbox.com
3) Wait 1,2... or 24 hours and we will send you decryptor (it is very easy to use it - you
need only run decryptor executable file and wait 5-10 hours and all files will be decrypted)

If we dont anwser on your letter more than 1 day then make your own mail account on www.ruggedinbox.com
(This action is very simple and takes 1-2 minutes) and send us your letter again
(some mail servers (for example hotmail.com and outlook.com) blocking letters to www.ruggedinbox.com)

Your unique identificator: [edited]

You can use one of those sites to change your money to bitcoins:
www.btc.my
www.cryptomarket.my
https://bitx.my/market
www.bitcoinmalaysia.com
www.goldux.com
www.kraken.com
www.bitquick.co
www.howtobuybitcoins.info
www.bestchange.com

You dont need install any bitcoin software - you need only find bitcoin exchange service (also you can try find it here for your country - www.google.com)

Additional information: before payment you can send us one small file (not bigger than 300Kb).
and we will decrypt it before payment (also you need send us your unique identificator).
After that, we think that it will be evedent that we have the program that can decrypt your files.

We dont want to destroy your files! We only need some money!

Cyber criminals claim that they don't want your files. All they need is money. They are even willing to decrypt one file for free. You just need to send it to dogdog@ruggedinbox.com with your unique identification key. I guess that they may actually decrypt one file for your but there's no guarantee that they will decrypt all your files. So, think very well before paying the ransom ~230USD because it could be that not only your files will remain encrypted but you will also lose your money. Besides, by doing this you will simply encourage them to keep infecting more and more computers.

Sounds scary - but surely I just pay and I get my files back?

Unfortunately it's not quite that simple. Paying the sum of money that has been demanded is no fail safe passage to getting your information back. Let's not forget that these are unscrupulous people we are dealing with here and chances of them sending you the promised code to unlock your files are slim at best.

How does ABOUT FILES! ransomware infect me?

Like most types of malware, ABOUT FILES! ransom virus will infect you if it has been packaged with an app or program. It may also attack if you've visited an infected website or if you open an attachment or click on a link in an email or an instant chat application.

What should I do if I've been infected?

It’s easy to say, but try not to panic. And whatever you do, don't pay the ransom unless the encrypted files are very important and you can't afford to lose them. If the encrypted files are not very important or you don't have money to pay the ransom, you can remove try to restore your files (at least some of them) using Shadow Explorer, Recuva and some other specialized tools listed below. Please note that even of you decide to pay the ransom there's really no guarantee that cyber crooks will recover your files.

If you have any questions, please leave a comment below. It might be a pain but the issue needs to be dealt with – and the way to do it is by not giving in, not paying up and not letting the attackers win.

Written by Michael Kaur, http://deletemalware.blogspot.com

IMPORTANT! Before running anti-malware software and trying to restore your files COPY the encrypted files, Bitcoin wallet address (1), email address dogdog@ruggedinbox.com and unique identification number found in ABOUT FILES!.txt fule to external hard drive, CD/DVD or a USB flash key. You should have these in case you decide to pay the ransom or someone creates a decryption tool.



Step 1: Removing "ABOUT FILES!" ransom virus and related malware:


Before restoring your files from shadow copies, make sure ABOUT FILES! virus is not running. You have to remove this malware permanently. Thankfully, there are a couple of anti-malware programs that will effectively detect and remove this malware from your computer.

1. First of all, download and install recommended anti-malware scanner. Run a full system scan and remove detected malware.





2. Then, download ESET Online Scanner and run a second scan to make sure there are no other malware running on your computer.

That's it! Your computer should be clean now and you can safely restore your files. Proceed to Step 2.


Step 2: Restoring files encrypted by "ABOUT FILES!" virus:


Method 1: The first and best method is to restore your files from a recent backup. If you have been regularly performing backups, then you should use your backups to restore your files.

Method 2: Try to restore previous versions of files using Windows folder tools. To learn more, please read Previous versions of files.

Method 3: Using Recuva free file recovery software.

Method 4: Using the Shadow Volume Copies:

1. Download and install Shadow Explorer. Note, this tool is available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8.

2. Open Shadow Explorer. From the drop down list you can select from one of the available point-in-time Shadow Copies. Select drive and the latest date that you wish to restore from.



3. Righ-click any encrypted file or entire folder and Export it. You will then be prompted as to where you would like to restore the contents of the folder to.



Hopefully, this will help you to restore all encrypted files or at least some of them.

Share this post


Favicon Offers.bycontext.com Adware Removal Guide
15 Jun 2015, 8:56 pm
If you've ever had offers.bycontext.com adware that you didn't install suddenly appear on your computer, you know as well as we do what a panic inducing experience it can be. Most of us use our computers, tablets and smartphones all day, every day (or so it can feel, at the end of a busy week) and likewise, most of us take good care to ensure we have adequate security software installed to protect us from online attackers. However, none of us are immune from spam, infection, data theft, viruses or malware. You only have to take a look at high profile cases, such as the Sony hacking, to see that all the money in the world can't protect you if someone is truly determined to hijack your network or computer.

But while all this may seem like doom and gloom, the good news is that there are ways you can reduce the risk of falling victim to an offers.bycontext.com adware attack. The first thing that springs to most people's minds is having a reputable anti-malware program installed on your computer or other device.


But today we are taking a look at adware that displays offers.bycontext.com pop-ups or new tabs filled with ads, and these inhabit a bit of a gray area. And that is because, no matter how on top of your security updates you are, the problem is that offers.bycontext.com and similar adware can in fact slip through the net, often rendering security software useless in this scenario. Therefore you do need to take other security measures into consideration.

But wait a moment, although we said that offers.bycontext.com adware can slip through most antivirus programs, that doesn't mean that you shouldn't bother with one at all. After all, if you want to protect yourself from all the other types of malware that are out there, it is crucial to have an up to date security program running on your PC.

So what actually is offers.bycontext.com? It's a programs which installs itself on your machine at the same time as you download another program, usually free software. It can be packaged with anything and everything from TV series and movies to PDF readers, instant messaging apps and games. But as the majority of us download software with willful abandon, whether for fun, lifestyle purposes, or for work, how do we download the things we need, without putting ourselves in harm's way? If you keep getting offers.bycontext.com pop-ups with ads than your computer is infected with adware. And there are many adware variants that display these ads. You won't find the culprit by just search your computer for offers.bycontext.com. First of all, it's not installed by this name and secondly you need to remove the adware program itself rather than try to stop annoying pop-up ads.

Adware programmers argue that their product is potentially unwanted, as opposed to definitely unwanted because they do actually have a use. Adware programs are normally installed as web browser extensions, home pages or even browsers. It's true that they haven't been created to cause you harm, but they will replace your existing functions with their own lesser ones, and make it very hard for you to delete them. Their main purpose is to redirect your internet searches to websites the programmer wants you to visit and in this particular case offers.bycontext.com.

So how do you carry on downloading, while minimizing your risks? Pay more attention to the License Agreement when installing something. Adware will be mentioned in the text so make sure you know what's included before you hit OK. To remove adware from your computer and stop intrusive offers.bycontext.com ads, please follow the steps on the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!

Written by Michael Kaur, http://deletemalware.blogspot.com



Offers.bycontext.com Adware Removal Guide:


1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.





2. Remove offers.bycontext.com related programs from your computer using the Add/Remove Programs control panel (Windows XP) or Uninstall a program control panel (Windows 7 and Windows 8).

Go to the Start Menu. Select Control PanelAdd/Remove Programs.
If you are using Windows Vista or Windows 7, select Control PanelUninstall a Program.



If you are using Windows 8, simply drag your mouse pointer to the right edge of the screen, select Search from the list and search for "control panel".



Or you can right-click on a bottom left hot corner (formerly known as the Start button) and select Control panel from there.



3. When the Add/Remove Programs or the Uninstall a Program screen is displayed, scroll through the list of currently installed programs and remove the following:
  • PrintOnKey
  • GoSave
  • Stats
  • SaveNewaAppz
  • and any other recently installed application


Simply select each application and click Remove. If you are using Windows Vista, Windows 7 or Windows 8, click Uninstall up near the top of that window. When you're done, please close the Control Panel screen.

Remove offers.bycontext.com related extensions from Google Chrome:

1. Click on Chrome menu button. Go to ToolsExtensions.



2. Click on the trashcan icon to remove PrintOnKey, Stats, MediaPlayerV1, Gosave, HD-Plus 3.5 and other extensions that you do not recognize.

If the removal option is grayed out then read how to remove extensions installed by enterprise policy.




Remove offers.bycontext.com related extensions from Mozilla Firefox:

1. Open Mozilla Firefox. Go to ToolsAdd-ons.



2. Select Extensions. Click Remove button to remove PrintOnKey, Stats, Gosave, MediaPlayerV1, HD-Plus 3.5 and other extensions that you do not recognize.

Remove offers.bycontext.com related add-ons from Internet Explorer:

1. Open Internet Explorer. Go to ToolsManage Add-ons. If you have the latest version, simply click on the Settings button.



2. Select Toolbars and Extensions. Click Remove/Disable button to remove the browser add-ons listed above.

Share this post


Favicon Remove RSA-2048 Encryption Virus and Restore Encrypted Files
14 Jun 2015, 8:50 pm
Today we're going to take a closer look at RSA-2048 encryption ransomware which is a particularly worrying internet danger, albeit it one that doesn't seem to attack with as much regularity as some of the other types. But that as may be, that's no reason to be blasé about it for if you don't take ransomware seriously and know a little bit more about how it operates, it could end up costing you a good deal of money.

Okay, I hear you. So what IS RSA-2048 encryption ransomware?

As with most malware, the clue is in the name. Ransomware that uses RSA-2048 encryption will infect you and then kidnap your documents, or hold your PC's operating abilities to hostage, and demand that you pay a ransom in order for it to release them or return your computer to its former working state. RSA-2048 is a very strong encryption algorithm used by cyber criminals. CryptoWall 3.0, Threat Finder, KEYHolder, CryptoLocker and a few other ransom viruses use this encryption algorithm. So, if you got a ransom note saying that your files are encrypted with a strong RSA-2048 key then you probably got one of these on your computer. Here are a few examples of ransom notes you may see on your computer:



RSA-2048 encryption virus or ransomware is disseminated just like most other malware programs: it might be spread by spam email that carries an attachment infected by ransomware, or a link in the body that goes to a malware infected website. Or it might be bundled with another program, file or application and will install itself on your PC at the same time as you download the program or app that you do want.

How do I know if I've been infected by ransomware which uses RSA-2048 encryption?

Firstly, trust us when we say that you WILL know if you have been infected by ransomware! The first thing you will notice is that you can't open a document or program or that your computer is simply refusing to work. You will then receive a ransom note in the shape of an email or a pop-up window telling you that you've been held to ransom. Sometimes this message will state that it comes from an organization such as the FBI or other law enforcement agency. And by this point you are probably sweating just a little bit.

Why would the FBI be interested in me? In order to convince you to pay their demands, ransomware programmers will tell you that you have been caught downloading pirated software or visiting a website that contains material of an illicit nature and that you are now subject to a fine. The one thing to remember is the FBI, or similar agency, does not employ such methods so DON’T pay anything. Instead take your computer to a local tech store and they should be able to help.

So what should you do your files have been encrypted using RSA-2048?

Easy to say, but try not to panic and most definitely do not pay any money unless the encrypted files are very important and you can't afford to lose them. If the encrypted files are not very important or you don't have money to pay the ransom, you can remove try to restore your files (at least some of them) using Shadow Explorer, Recuva and some other specialized tools listed below. Please note that even of you decide to pay the ransom there's really no guarantee that cyber crooks will recover your files.

These days you don't have to have a particular interest in computers to know that there are a multitude of dangers on the internet waiting to do us harm. Computer programmers with bad intentions are constantly dreaming up new ways in which they can wreak havoc on our PCs, scam us out of our money, steal our identities and simply cause us untold levels of stress and upset. The problem is that with so many different types of malware out there, how do we know what to do to protect ourselves from getting caught out? Well, it might not be fun but the best form of protection is to learn as much as you can about these various forms of malicious software so you know how to best avoid being taken in by something. If you have any questions, please leave a comment below. It might be a pain but the issue needs to be dealt with – and the way to do it is by not giving in, not paying up and not letting the attackers win.

Written by Michael Kaur, http://deletemalware.blogspot.com



Step 1: Removing RSA-2048 encryption virus and related malware:


Before restoring your files from shadow copies, make sure RSA-2048 Encryption Virus is not running. You have to remove this malware permanently. Thankfully, there are a couple of anti-malware programs that will effectively detect and remove this malware from your computer.

1. First of all, download and install recommended anti-malware scanner. Run a full system scan and remove detected malware.





2. Then, download ESET Online Scanner and run a second scan to make sure there are no other malware running on your computer.

That's it! Your computer should be clean now and you can safely restore your files. Proceed to Step 2.


Step 2: Restoring files encrypted by RSA-2048 virus:


Method 1: The first and best method is to restore your files from a recent backup. If you have been regularly performing backups, then you should use your backups to restore your files.

Method 2: Try to restore previous versions of files using Windows folder tools. To learn more, please read Previous versions of files.

Method 3: Using the Shadow Volume Copies:

1. Download and install Shadow Explorer. Note, this tool is available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8.

2. Open Shadow Explorer. From the drop down list you can select from one of the available point-in-time Shadow Copies. Select drive and the latest date that you wish to restore from.



3. Righ-click any encrypted file or entire folder and Export it. You will then be prompted as to where you would like to restore the contents of the folder to.



Hopefully, this will help you to restore all encrypted files or at least some of them.

Share this post

© 2015 Frêney, S.r.l. - V.A.T. ID IT03001860166