![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Viruses - How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible. If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com. In order to use the freescan; 1. Go to www.mcafee.com, 2. Click on home & home office 3. Under the heading of free tools (at the bottom of the page), click scan now 4. Click scan now (accepting user agreement) 5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so 6. Make sure C: Drive is highlighted and click scan 7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files. If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive. (Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive. Another way to remove a virus from your computer is to use the removal tools on www.symantec.com. 1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com 2. Click on the Security Response Tab 3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab 4. Click on Virus Removal Tools 5. Click on the virus that is infected on your computer 6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer. Benjamin Nicholson Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.
MORE RESOURCES: Security expert: Nashville school shooting should serve as a wake up call for similar schools in Nor CBS News Microsoft pushes OOB security updates for Windows Snipping tool flaw BleepingComputer When it comes to database security it's down to people, not tech fixes, to save the day The Register Executive Order on Prohibition on Use by the United States ... The White House Biden bans government use of commercial spyware that may pose a ... SiliconANGLE News Running a security program before your first security hire Help Net Security Balancing security risks and innovation potential of shadow IT teams Help Net Security Japan’s new security policies: A long road to full implementation Brookings Institution Roof replacements, security vestibules among improvements in ... Alaska Public Media News Counter-Terrorism: High-level Debate : What's In Blue Security Council Report Survey Surfaces Need to Change SecOps Priorities Security Boulevard College Athlete Influencers Confront Security Concerns NBC4 Washington Importance of school security FOX 13 Tampa UN Security Council turns down request for Nord Stream inquiry Al Jazeera English WCPS starts security assistants program to curb student misbehavior Herald-Mail Media UA releases security assessment outlining systemic safety issues Arizona Public Media LA Metro adding new security officers amid safety concerns FOX 11 Los Angeles Tausight expands its AI-based PHI Security Intelligence platform to ... Help Net Security NEW: Shaheen Leads 37 Senators in Letter to Pentagon ... Senator Jeanne Shaheen What you need before the next vulnerability hits Help Net Security Improve Mobile Device Security with this HC3 Checklist HIPAA Journal Why cybersecurity risks matter - and how to raise security World Economic Forum SLED investigating after late-night shooting at SC State, university adds security measures WIS News 10 Israel defense minister’s firing triggers security fears, reservist call-ups and greater protests Breaking Defense Commerce Department Outlines Proposed National Security ... US Department of Commerce Under pressure, St. Louis' Railway Exchange boosts security to ... St. Louis Post-Dispatch Secretary Mayorkas, Administrator Criswell Visit Devastated Areas ... Homeland Security Meandering Moose Breaches Security At Sinclair Oil Refinery Cowboy State Daily New for Devs in SQL Server 2022: Ledger for Blockchain-Backed ... Visual Studio Magazine Rising Rate of Drug Shortages Is Framed as a National Security Threat The New York Times Las Cruces Police Department advises against posting doorbell security footage online - KFOX El Paso Maryland native works to help others with food security News 13 Orlando Pasquotank officials discuss county courthouse repairs, security ... The Daily Advance Opinion: Sensible legislation would 'sentence' gun security violators ... Chattanooga Times Free Press Detroit Zoo beefs up security after unusual activity suspected at the ... WXYZ 7 Action News Detroit Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner Ukraine-Russia updates: Kyiv seeks UN Security Council meeting Al Jazeera English Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine TikTok Pushed by U.S. to Resolve National Security Concerns The New York Times FACT SHEET: President Biden’s Budget Strengthens Border ... The White House FACT SHEET: Biden-Harris Administration Announces National ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense After Denver school shooting, an outcry erupts over security The Associated Press President Biden Joins DHS To Recognize Twenty Years of Progress ... Homeland Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. ![]() |
home | site map |
© 2006 |