Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.

If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.

In order to use the freescan;

1. Go to www.mcafee.com,

2. Click on home & home office

3. Under the heading of free tools (at the bottom of the page), click scan now

4. Click scan now (accepting user agreement)

5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so

6. Make sure C: Drive is highlighted and click scan

7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.

If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.

(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.

Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.

1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com

2. Click on the Security Response Tab

3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab

4. Click on Virus Removal Tools

5. Click on the virus that is infected on your computer

6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.

Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
benjamnicholson@aol.com
http://www.grinnation.com/computerviruses.htm

Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.

In The News:


pen paper and inkwell


cat break through


Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More