Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.

If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.

In order to use the freescan;

1. Go to www.mcafee.com,

2. Click on home & home office

3. Under the heading of free tools (at the bottom of the page), click scan now

4. Click scan now (accepting user agreement)

5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so

6. Make sure C: Drive is highlighted and click scan

7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.

If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.

(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.

Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.

1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com

2. Click on the Security Response Tab

3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab

4. Click on Virus Removal Tools

5. Click on the virus that is infected on your computer

6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.

Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
benjamnicholson@aol.com
http://www.grinnation.com/computerviruses.htm

Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.

In The News:


pen paper and inkwell


cat break through


How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More