Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.
If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.
In order to use the freescan;
1. Go to www.mcafee.com,
2. Click on home & home office
3. Under the heading of free tools (at the bottom of the page), click scan now
4. Click scan now (accepting user agreement)
5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so
6. Make sure C: Drive is highlighted and click scan
7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.
If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.
(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.
Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.
1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com
2. Click on the Security Response Tab
3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab
4. Click on Virus Removal Tools
5. Click on the virus that is infected on your computer
6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.
Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
benjamnicholson@aol.com
http://www.grinnation.com/computerviruses.htm
a>
Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.
Identity theft ? also known as ID theft, identity fraud... Read More
With the Internet entering our lives in such an explosive... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Be careful of sites that promise to send you "instant... Read More
Identity Theft is one of the most serious problems facing... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
This is the second in a series of articles highlighting... Read More
To blog or not to blog? Well, why not? Lots... Read More
When we think of adware, what comes to mind are... Read More
As more people are logging onto the Internet everyday, Network... Read More
If you know what is the 'Fishing' then it's very... Read More
Sooner or later everyone with an email account will receive... Read More
It's late. You've been scouring the web for that perfect... Read More
Microsoft routinely releases new security updates, many of which are... Read More
As soon as almost all computer users already got used... Read More
P C. owners are constantly at risk from attacks by... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
First off I should explain what phishing is. Phishing is... Read More
If you are wondering how to fight spyware for safe... Read More
When the Internet first came about, it was realized it... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
There are several basic concepts to keep in mind when... Read More
Security leaks can be a big problem for any site... Read More
A new variation of the Nigerian Scam theme ... Read More
Imagine this ? you open up your email box and... Read More
This is not some new fangled techno-speak, it is a... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
You may not realize it, but as you are surfing... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Every day millions of people go online to find information,... Read More
Since its birth, the Internet has grown and expanded to... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Do you really have to know how feeds work? Not... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Long gone are the days that we could feel secure... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Nowadays more and more people are using a computer. A... Read More
When we think of adware, what comes to mind are... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Well, if that would have been said to me by... Read More
Spyware is software or hardware installed on a computer without... Read More
There you are busily typing away on your PC or... Read More
To blog or not to blog? Well, why not? Lots... Read More
Sooner or later everyone with an email account will receive... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Ok, ok, I know you've seen them. All those pop... Read More
If you are a parent, as am I, I think... Read More
So you want to know who your kids are chatting... Read More
Today,on most internet user's computers, we have the ability to... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
A little bit of time invested into learning about internet... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
No longer are viruses the only threat on the internet.... Read More
Threats we ordinary Web users face online leave us no... Read More
The Threat10 years ago you could probably have run no... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Imagine this ? you open up your email box and... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Internet Security |