Give them a double washing. More great advice from Fred Langa on his website.
[See the full post at: Fred Langa: How do I safely transfer files from an old, possibly infected laptop to an external HDD?]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Fred Langa: How do I safely transfer files from an old, possibly infected laptop to an external HDD?
Home » Forums » Newsletter and Homepage topics » Fred Langa: How do I safely transfer files from an old, possibly infected laptop to an external HDD?
- This topic has 9 replies, 8 voices, and was last updated 6 years, 3 months ago.
Tags: Transfer files
AuthorTopicViewing 3 reply threadsAuthorReplies-
anonymous
Guest -
rc primak
AskWoody_MVPFebruary 5, 2019 at 9:40 am #321582Actually, Linux is perfectly capable of becoming infected with Windows executables. They won’t damage the Linux OS, so they don’t interfere with Linux operations. But when exposed to an infected Linux computer, a Windows PC can pick up the Windows-targeted executables very easily, and the Windows PC then becomes infected.
This is why there used to be a cottage industry in “Linux Antivirus”, which was really scanning almost exclusively for these transferable Windows-targeted malicious executables. But over time, folks didn’t take up these products in sufficient numbers, and they have fallen by the wayside.
Moral is: when transferring files or data from a Linux installation into a Windows installation, scan every incoming file with Windows antivirus scanners before allowing anything onto the Windows PC.
-- rc primak
3 users thanked author for this post.
-
AlexEiffel
AskWoody_MVPFebruary 5, 2019 at 12:15 pm #321684I think we need to distinguish between being infected with and containing an infected file.
The idea to use a write-protected Linux to retrieve the files might protect you from some type of malware that hide below the file level when reading the NTFS drive from Linux.
Also, if Linux isn’t infected, it insn’t infected. Transferring tainted files doesn’t even mean Windows will be infected either if the file isn’t run in some cases, although yes, in specific contexts if the file was read and triggered a buffer overflow on a vulnerable app in Windows, then you could have the Windows PC infected. The vulnerable app could be an antivirus scanner, an image viewer, a pdf reader, Word, etc.
So using Linux to retrieve data, using an antivirus Linux product, then copying the data back to a clean patched Windows drive and then mounting that up as a data drive only in a clean Windows with an up to date antivirus might be a good idea since you will have more chances to only copy files and avoid rootkit type issues or other Windows antivirus vulnerabilities at the first stage.
Then, you make sure to not run those files or have them read by programs with vulnerabilities for a while. Your risk will still not be 0, but waiting a bit for antiviruses to catch up with the 0 days threats is not a bad idea and will lower your risk at well. That sounds like a lot, but being infected might not be always a minor issue that is easy to fix. And we always need to remember that antiviruses are not a panacea. They might not detect a lot of new or less common malware for a very long time.
1 user thanked author for this post.
-
-
-
Cybertooth
AskWoody PlusFebruary 5, 2019 at 9:25 am #321573No single antivirus software catches everything: I would run two different AV scanners from Live CD/USB media on the old laptop prior to the scan that Fred proposes after copying the files to the external HDD and plugging it into the new computer.
Some may consider this overkill, but to my mind the extra step is well worth it if I have any reason to believe the old laptop might be infected.
3 users thanked author for this post.
-
GoneToPlaid
AskWoody LoungerFebruary 5, 2019 at 10:20 am #321599I agree. I would also suggest running a rootkit scanner and removal tool.
1 user thanked author for this post.
-
-
rc primak
AskWoody_MVPFebruary 5, 2019 at 9:54 am #321589I would like to point out that many if not most of these stand-alone, bootable scanners have been abandoned by the major AV vendors, and are no longer supported.
Some which are still supported include the ones from BitDefender, Kaspersky and Trend Micro.
If you pretend you’re running Windows 8.1, you can follow those instructions to download and create a CD or USB Flash Drive version of Windows Defender Offline. This may be necessary if your system won’t boot fully into Windows, a common side-effect of an infection. On my Intel NUC with a dual-boot, I cannot get the built-in Windows 10 version of Windows Defender Offline to complete a scan and file its report. Whatever the cause of this abort and restart behavior, I would have to run WDO from bootable USB media. The last update of the bootable form of WDO used WinPE3, which is pretty far out of date.
I concur with Cybertooth that running more than one offline scan is good insurance. Belt and suspenders, you know!
To be honest, since I use system image backups and full data backups, as well as drivers and some configuration files, I’d rather just do a low-level disk reformat and reinstall Windows 10 from my backup image. Making sure of course that the image selected was from before the infection was suspected. That’s the only way to make sure nothing survives the cleanup, unless hardware microcode or firmware got infected, which can happen these days.
-- rc primak
2 users thanked author for this post.
-
OscarCP
MemberFebruary 5, 2019 at 1:03 pm #321713According to Alex Eiffel: ” …yes, in specific contexts if the file was read and triggered a buffer overflow on a vulnerable app in Windows, then you could have the Windows PC infected. The vulnerable app could be an antivirus scanner, an image viewer, a pdf reader, Word, etc. ”
To me, as written, and correct me if I am wrong, as I might well be, this suggests that scanning the copied files for viruses and other malware can trigger an infection, which would run contrary to the advice of scanning with antivirus also offered here and, to me again, seems like a logical precaution. Perhaps someone could explain this, as this is a topic of considerable interest, so others non-experts might not be left, on reading these entries, equally puzzled as I am.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
-
woody
Manager -
AlexEiffel
AskWoody_MVPFebruary 6, 2019 at 12:53 am #322001https://borncity.com/win/2017/06/30/stack-buffer-overflow-vulnerability-in-avast-antivirus/
https://landave.io/2017/06/avast-antivirus-remote-stack-buffer-overflow-with-magic-numbers/
Although you might not have seen it, antivirus are a great asset to compromise due to their low level access to the OS…
So, Oscar, to respond to you and other users, yes, in theory, it would be safer although not very useful to just copy your files on Windows and let them sit there forever without ever opening them with an antivirus or anything else until you end up switching to Linux.
And it would be safer to never use the Internet, or your computer.
Jokes aside, this is a good question. One maybe reasonable compromise would be to let them sit a few days if possible so if any vulnerability that is not kept very secret by some dark organization or nation got out and was patched, your antivirus would not be vulnerable anymore. But, yes, this might not be a very high risk anyway since vulnerabilities known only to secret organizations might be used mostly to do targeted attacks, it’s just for the sake of being rigorous that I mentioned antiviruses among many other apps. Those things exists. Antivirus are complex products that read files so of course they are not immune to these type of vulnerabilities.
But my suggestion to let files sit a bit was not just for antivirus vulnerabilities, but to give a bit of time for antivirus to catch up with the latest malware signatures so that a virus that had infected you on the other computer might now be recognized before you open it again with a vulnerable app, antivirus or another.
1 user thanked author for this post.
-
-
Viewing 3 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Office gets current release
by
Susan Bradley
25 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
2 hours, 2 minutes ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
58 minutes ago -
Stop the OneDrive defaults
by
CWBillow
2 hours, 51 minutes ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
12 hours, 47 minutes ago -
X Suspends Encrypted DMs
by
Alex5723
14 hours, 59 minutes ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
15 hours, 17 minutes ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
15 hours, 54 minutes ago -
OpenAI model sabotages shutdown code
by
Cybertooth
16 hours, 31 minutes ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
4 hours, 41 minutes ago -
Enabling Secureboot
by
ITguy
11 hours, 41 minutes ago -
Windows hosting exposes additional bugs
by
Susan Bradley
1 day ago -
No more rounded corners??
by
CWBillow
20 hours, 14 minutes ago -
Android 15 and IPV6
by
Win7and10
9 hours, 59 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
1 day, 12 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
1 day, 15 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
1 day, 10 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
1 day, 22 hours ago -
May preview updates
by
Susan Bradley
1 day, 10 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
1 day, 1 hour ago -
Just got this pop-up page while browsing
by
Alex5723
1 day, 14 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
1 day, 12 hours ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
14 hours, 14 minutes ago -
At last – installation of 24H2
by
Botswana12
2 days, 14 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
11 hours, 1 minute ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
3 days, 2 hours ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
1 day ago -
Limited account permission error related to Windows Update
by
gtd12345
3 days, 15 hours ago -
Another test post
by
gtd12345
3 days, 16 hours ago -
Connect to someone else computer
by
wadeer
3 days, 10 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.