{"id":6643,"date":"2011-06-29T11:21:19","date_gmt":"2011-06-29T04:21:19","guid":{"rendered":"http:\/\/tom.ji42.com\/?p=6643"},"modified":"2011-06-29T11:21:19","modified_gmt":"2011-06-29T04:21:19","slug":"the-page-does-not-support-your-version-of-browser","status":"publish","type":"post","link":"https:\/\/tom.tomwork.net\/?p=6643","title":{"rendered":"The page does not support your version of browser"},"content":{"rendered":"<div>\n<div id=\"attachment_59\"><a href=\"http:\/\/www.seanrattigan.com\/wp-content\/uploads\/2010\/08\/The_page_does_not_support_your_version_of_browser1.jpg1.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"The_page_does_not_support_your_version_of_browser.jpg\" src=\"http:\/\/www.seanrattigan.com\/wp-content\/uploads\/2010\/08\/The_page_does_not_support_your_version_of_browser1.jpg1.jpg\" alt=\"The_page_does_not_support_your_version_of_browser_msg\" width=\"500\" height=\"306\" \/><\/a>Fake message- The page does not support your version of browser<\/p>\n<\/div>\n<p>I acquired the above message on my laptop while fixing a very ill PC  for a friend.\u00a0 I was almost impressed with the amount of work that had  gone in to developing a virus that fools many into thinking that is is a  legitimate programme, and which cleverly makes all the files on the C:  drive have the \u201chidden\u201d attribute- which really means that it looks like  all your files are gone unless you know how to set folder options to  view hidden files\u2026 anyway, that\u2019s where my problems began.\u00a0 I used <a title=\"Malwarebytes\" href=\"http:\/\/www.malwarebytes.org\/products\" target=\"_blank\">Malwarebytes <\/a>as the primary tool to cure the patient, as well as <a title=\"Free antivirus\" href=\"http:\/\/www.avira.com\/en\/avira-free-antivirus\" target=\"_blank\">Avira Antivir Personal<\/a> as my (free) antivirus.<\/p>\n<p><!--more-->No, I was not fooled.\u00a0 My mother swatted all the flies off when I was  a mere infant, but yet I got this confounded message and only many  hours later have I cured it- thus this post as a cure is difficult to  find.<\/p>\n<p><strong>PART 1<\/strong><\/p>\n<p>Firstly, install malwarebytes and perform an update.\u00a0 It may be  neessary to boot into safe mode.\u00a0 Pressing F8 between from boot up  before Windows starts, the computer will loads a menu with several  choices.\u00a0 Select \u201cSafe Mode with Networking\u201d.\u00a0\u00a0 If you cannot get into  the F8 menu with a USB keyboard, one solution is to go into the BIOS and  enable USB Keyboard Support, or use an old PS2 keyboard.\u00a0 Now, after  running the updated Malwarebytes, perform a full system scan and boot  into Windows normally to fully remove the virus.<\/p>\n<p>Now is the clever bit on the part of the virus creators- no matter  what I did I was still getting the same message.\u00a0 The virus had very  cleverly changed Network settings and it seems that if an infected  computer is on your network, it can spread!<\/p>\n<p><strong>PART 2<\/strong><\/p>\n<p>Lets see if resetting the router makes any difference.\u00a0 If you cannot  get this information or are not comfortable fiddling with your router,  you might skip on to the next part (which worked for me btw).<\/p>\n<p>Router Reset- Please read <a title=\"Router infection\" href=\"http:\/\/blog.washingtonpost.com\/securityfix\/2008\/06\/malware_silently_alters_wirele_1.html\" target=\"_blank\">this <\/a>if  you want more information on this relatively new type of infection.\u00a0  Make a note of the default username and password for your router- there  is a recessed reset button on many routers.<\/p>\n<p><em>\u201cIf your machine has been infected by one of these  Zlob\/DNSchanger  Trojans, and your router settings have been altered, I  would strongly  recommend that you reset the router to its default  configuration.  Usually, this can be done by inserting something tiny  like a paper clip  end or pencil tip into a small hole labeled \u201creset\u201d  located on the back  of the router. Press and hold down the small button  inside until the  lights on the front of the router blink off and then  on again (usually  about 30 seconds)\u201d<\/em><\/p>\n<p>This is a slightly more difficult part.<br \/>\nFirst get to the routers server. To do that type http:\\192.168.1.1 in  the address bar and click Enter.<br \/>\nYou get the log in window: Fill in the password you have already found and you will get the configuration page.<br \/>\nConfigure the router to allow you to connect to your ISP server. In some  routers it is done by a setup wizard.<br \/>\nYou have to fill in the log  in password your ISP has initially given to you.<br \/>\nYou can also call your ISP if you don\u2019t have your initial password.<br \/>\nDon\u2019t forget to change the routers default password and set a strong  password.<br \/>\nTake a note of the password and keep it somewhere safe for future  reference.<\/p>\n<p><strong>PART 3<\/strong><br \/>\nPlease make sure of the following settings:<br \/>\nGo to Start -&gt; Control Panel -&gt; Double click on Network Connections.<br \/>\nRight click on your default connection (usually Local Area Connection or Wireless Network Connection) and select Properties.<\/p>\n<ul>\n<li> Select the General tab.<\/li>\n<li> Double click on Internet Protocol (TCP\/IP).<\/li>\n<li> Under General tab:<\/li>\n<li> Select \u201cObtain an IP address automatically\u201d.<\/li>\n<li> Select \u201cObtain DNS server address automatically\u201d.<\/li>\n<li> Click OK twice to save the settings.<\/li>\n<\/ul>\n<p>Reboot if you had to change any setting.<\/p>\n<p><strong>PART 4<\/strong><\/p>\n<p>To Flush the DNS cache:<\/p>\n<ul>\n<li> Click the Start logo in the bottom left corner of the screen<\/li>\n<li> Click on Run<\/li>\n<li> In the command window copy\/paste the following<\/li>\n<\/ul>\n<p><strong>ipconfig \/flushdns<\/strong><\/p>\n<ul>\n<li> Hit enter<\/li>\n<li> Exit the command window.<\/li>\n<li> Reboot<\/li>\n<\/ul>\n<p>When I rebooted, I was able to get online again- happy days!<\/p>\n<p>It seems that the problems are caused by a virus known as <a title=\"DOS\/Alureon.A virus on Bleeping Computer .com\" href=\"http:\/\/www.bleepingcomputer.com\/forums\/topic403945.html\" target=\"_blank\">DOS\/Alureon.A<\/a> and it\u2019s been quite successful in propagating it\u2019s evil spawn across the web!\u00a0 It is also commonly identified as a <a title=\"Google Results Redirect\" href=\"http:\/\/www.bleepingcomputer.com\/virus-removal\/remove-tdss-tdl3-alureon-rootkit-using-tdsskiller\" target=\"_blank\">Google Redirect<\/a> virus, as that\u2019s exactly what it was doing on the original patient I  was treating- no matter what one searched for or what link was clicked  from the results page, the user was redirected to spam and infected  websites.\u00a0 Another useful tool for this problem seems to be <a title=\"Eset Online Scanner\" href=\"http:\/\/www.eset.com\/home\/products\/online-scanner\" target=\"_blank\">Eset\u2019s Scan<\/a>, another free tool.\u00a0 It appears to be effective in helping with the actual virus that causes the problem as well.<\/p>\n<p>I hope this helps others that have this problem.\u00a0 Good luck<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Fake message- The page does not support your version of browser I acquired the above message on my laptop while fixing a very ill PC for a friend.\u00a0 I was almost impressed with the amount of work that had gone in to developing a virus that fools many into thinking that is is a legitimate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[13],"tags":[38,45,62],"class_list":["post-6643","post","type-post","status-publish","format-standard","hentry","category-13","tag-fake","tag-internet","tag-virus"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6cOVM-1J9","_links":{"self":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts\/6643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6643"}],"version-history":[{"count":0,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=\/wp\/v2\/posts\/6643\/revisions"}],"wp:attachment":[{"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tom.tomwork.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}