F-Secure Rescue CD

A handy utility that can scan your computer before booting, so as to detect and remove malicious files that prevent it from starting.

  • F-Secure Rescue CD
  • Version :3.16 Build 73600
  • License :Freeware
  • OS :Windows All
  • Publisher :F-Secure Corporation

Download Now

F-Secure Rescue CD Description

Malware infections are a nasty business to deal with and sometimes they can render the system unbootable, locking you away from your files. Nevertheless, antivirus makers developed rescue files that can be placed on removable storage device and booted from.

F-Secure Rescue CD is such a tool and properly placed on a storage device (USB or CD) it can help restore access to the operating system and files as well as kick out the threats affecting the computer.

Preparing the USB drive to boot from

If you have the F-Secure Rescue ISO file using a USB device to boot is not too difficult a task, but it requires a tool such as UNetbootin or LiLi USB Creator.

Both programs are built with the average Joe in mind so they are intuitive and do not leave room for errors.

The utility is based on Knoppix (a Linux distribution) and it integrates a malware scanner that updates automatically with the latest threat definitions.

It includes disinfection routines but in some cases these may not work and for this reason the utility can also be used to save important, clean data to a safe location.

Easy to use

Working in a Linux environment can be pretty intimidating for a Windows user, but F-Secure’s solution makes available clear instructions on how to achieve one job or another.

Scanning can include any of the volumes currently connected to the system and the Master Boot Records (MBR) of all the drives. The status of the procedure is recorded and the progress details available include number of files scanned and the amount of malware identified.

Conclusion

Even if it relies on Linux to carry out scanning and disinfection routines F-Secure Rescue CD is quite easy to use. It may not be 100% efficient against the infections it encounters but it provides the means to retrieve the data that has remained untouched by malware.

Leave a Reply

Your email address will not be published.