Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.
If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.
In order to use the freescan;
1. Go to www.mcafee.com,
2. Click on home & home office
3. Under the heading of free tools (at the bottom of the page), click scan now
4. Click scan now (accepting user agreement)
5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so
6. Make sure C: Drive is highlighted and click scan
7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.
If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.
(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.
Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.
1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com
2. Click on the Security Response Tab
3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab
4. Click on Virus Removal Tools
5. Click on the virus that is infected on your computer
6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.
Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
benjamnicholson@aol.com
http://www.grinnation.com/computerviruses.htm
a>
Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.
![]() |
|
![]() |
|
![]() |
|
![]() |
"Dear Bank of the West customer", the message begins. I've... Read More
In recent days, I was one of the unfortunate persons... Read More
Over the past few years as the internet has become... Read More
Today,on most internet user's computers, we have the ability to... Read More
By browsing a web page, you could infect your computer... Read More
In a word, no - an email message has always... Read More
If you use emails actively in your communication, you must... Read More
If you run any type of Internet business, Adware and... Read More
If you have used a Windows machine for a while,... Read More
Did you know...? 1 in 5 children who use computer... Read More
Whether we like it or not, we are all living... Read More
The money being spent online is steadily growing. With billions... Read More
Every day millions of people go online to find information,... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Be careful of sites that promise to send you "instant... Read More
So called phishers try to catch the information about the... Read More
Let us take the example of scrambling an egg. First,... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
During the release of a new software product specialized to... Read More
We all know that it's dangerous to use the same... Read More
The words Corporate Security may conjure up images of a... Read More
As the number of people using the Internet as an... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Internet scams and frauds are on the rise! The quantity... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Recently I have received email from my bank/credit Card Company,... Read More
P C. owners are constantly at risk from attacks by... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
You are at your computer, checking out software on EBay.... Read More
When it comes to a secure website and passwords it... Read More
Well, this is an article I never thought I would... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Computer infections can be broken up into 4 main categories... Read More
Internet scams and frauds are on the rise! The quantity... Read More
We all know that it's dangerous to use the same... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
I am the victim of an internet scam. It is... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
By browsing a web page, you could infect your computer... Read More
Computer security for most can be described in 2 words,... Read More
Do you sometimes notice your computer running slower. Is your... Read More
If you are a parent, as am I, I think... Read More
As you know, this time the virus under the name... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
A couple of days ago, I was searching for a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
You can detect spyware online using free spyware cleaners and... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Every single time you access a website, you leave tracks.... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Ebay is a great site and is used by many... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
When surfing the Internet you probably take your anonymity for... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Internet Security |