Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"
Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.
The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.
You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.
James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?
The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.
Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.
Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.
1)Spyware is on your system. Like it or not, statistically... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
First off I should explain what phishing is. Phishing is... Read More
If you are a parent, you have probably wondered at... Read More
When the Internet first came about, it was realized it... Read More
Every now and then you can read about a new... Read More
During the release of a new software product specialized to... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
As soon as almost all computer users already got used... Read More
Credit card fraud is a growing problem for online businesses... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Spyware is software that runs on a personal computer without... Read More
The most frustrating part of having Spyware on your computer... Read More
I am the victim of an internet scam. It is... Read More
You are at your computer, checking out software on EBay.... Read More
Have been an Internet user for more than 9 years,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Only the top spyware removers are successful at detecting and... Read More
Let us take the example of scrambling an egg. First,... Read More
In 1997, I decided after 15 years as a practicing... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Phishing is a relatively new form of online fraud that... Read More
With the advent of the World Wide Web, a whole... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Over £5 billion pounds was spent on online shopping in... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
If you run any type of Internet business, Adware and... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Well, this is an article I never thought I would... Read More
Today the internet is a mine field of malicious code... Read More
As more people are logging onto the Internet everyday, Network... Read More
If you use the internet, you have probably been infected... Read More
If you constantly deal with bank or electronic accounts, it... Read More
To blog or not to blog? Well, why not? Lots... Read More
There are ways to insure security though. You can get... Read More
A little bit of time invested into learning about internet... Read More
Shopping for horse gifts or other gift items on the... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Paypal is a great site and is used by many... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Threats we ordinary Web users face online leave us no... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
If you are wondering how to fight spyware for safe... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
As soon as almost all computer users already got used... Read More
History and BackgroundThe virus was one of the first ever... Read More
Identity theft rates one of the fastest growing crimes in... Read More
The words Corporate Security may conjure up images of a... Read More
Whether we like it or not, we are all living... Read More
Imagine this ? you open up your email box and... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Fishing on the Internet has come a long way. However,... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
In 1997, I decided after 15 years as a practicing... Read More
Internet Security |