Computer Viruses - How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.
If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.
In order to use the freescan;
1. Go to www.mcafee.com,
2. Click on home & home office
3. Under the heading of free tools (at the bottom of the page), click scan now
4. Click scan now (accepting user agreement)
5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so
6. Make sure C: Drive is highlighted and click scan
7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.
If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.
(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.
Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.
1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com
2. Click on the Security Response Tab
3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab
4. Click on Virus Removal Tools
5. Click on the virus that is infected on your computer
6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.
Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.
The Move to a New Anti-Virus Model
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
The 5 Critical Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my!
Free Ways to Tackle Threats to Your Computer
Protect Your PC
Another Fine Mess!
I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.....who? Strangers basically, Geez! The majority of identity thefts occur thru contractors employing people in entry-level jobs that have not been properly screened. Not even Hackers,Phishers or Dumpster Divers account for as many! The ideal location for a Identity stealer would be in a out sourced agency that fails to use adequate screening processes.
Dont Miss Information Because of Misinformation
It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet.
How to Know Whether an Email is a Fake or Not
A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
Viruses, Trojans, and Spyware - Oh My!
Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"
P C. owners are constantly at risk from attacks by hackers.Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.
Phishing - Learn To Identify It
Phishing: (fish'ing) (n.)
Watch Out For That Scam
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email, foreign investment letters and online dating. Here are some ways to identify a possible scam or fraud that you may have encountered while surfing the internet.
Dont Allow Hackers to Take Out Money from Your Bank Account
If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'.Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers.
Internet Shopping - How Safe Is It?
Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. They are afraid of being scammed, and rightfully so. Online shopping can be a completely safe and rewarding experience provided you are dealing with a legitimate, reputable retailer. But how do you know if they are legitimate??? Here lies the "fear of the unknown."
Ransom Trojan Uses Cryptography for Malicious Purpose
Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.
Burning Bridges is Bad, But Firewalls are Good
When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Following the scan, which usually takes fourty minutes or longer if you scan the entire system, you are hit with the "access denied" error. Frustrating, for sure, but being the savvy computer user that you are you decide to boot to safe mode to take care of the issue. No spyware can load when booted to safe mode, right?
Top Ten Spyware and Adware Threats Identified
On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.
What to Look for before You Purchase Spyware Software
Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a decision to purchase any such software we should check the reliability and should consider various attributes possessed by them and then select the best and the most appropriate one. The various attributes that one should consider to be the most important when purchasing spyware detection and removal software are -
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. It involves the receiving of an email message with a link to a website where the victim would enter personal information. In this particular scam, you get an email from "Personal Banking: email@example.com" stating that there may have been some unauthorized access to your account and that you should click the link and enter your account and verify some information. When you click the link you are taken to a site which looks identical to the Wells Fargo site.
Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves.
How to Fight Spyware
If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware.
|© Athifea Distribution LLC - 2013|