Monday, May 30, 2011

A computer virus contamination on your laptop is a real nuisance. Even for a notebook expert, removing a virus from a notebook can be a time consuming and irritating task.

A number of viruses are designed to reinstall themselves even after they have been found and eradicated. Some viruses inscribe themselves into the registry of your PC, so they are loaded as soon as you boot up your notebook.

Of course you should keep your anti-virus software up to date. But still that is not always successful in preventing an infection - especially if you frequent shareware or sites containing adult content.

To remove a virus infection:

1. If you are using a Windows operating system, visit the Microsoft Update website and install the latest updates. This may detect and eradicate the virus.
2. Microsoft now have a 'Malicious Software Removal Tool'. Type this into Google or Bing and follow the instructions.
3. Go to your anti-virus manufacturers website and download the latest updates. Then perform a scan of your PC.

I have tried this and it has not worked!

Some viruses will in reality disable your anti-virus software. If you cannot access your anti-virus application or you remain seeing the same malware pop up after the scan, you will probably find that the virus has written itself into the registry.

Now this moves into advanced PC virus removal. You need to be careful when rewriting the registry file because it tells Windows which programs to start up when when booting the operating system. Unless you are competent with desktops you are best leaving this to a virus removal professional.

So you are an expert!

OK, run your anti-virus program. If it will not run in Windows, reboot your notebook in Safe Mode and run it from there. It will probably find the virus even if it can not kill it. Note down the file names of all the viruses, malware, worms and any other suspect files it lists.

Now you may require a second notebook for this, of course, but type them file names into Google or Bing one at a time. you will find that somebody out there on the World Wide Web has come across these viruses and you will quickly determine which is the most malicious. This is more than likely to be your problem virus.

Now, you will most probably find that someone has written very exact instructions on how to eradicate this virus. If the source seems to be dependable, then by all means follow the advice.

Alternatively, open up your registry file. Look for the particulars of your malicious virus - probably in the boot file. This is the file you need to remove - But! Before you remove any files, make a backup copy of your Registry folder. Accidentally eradicating the wrong file could make it very hard or even impossible to run your PC properly.

Source: http://goo.gl/WdfoF

Monday, May 23, 2011

There are many viruses infecting computers around the World. Virus Trojan and Worm are the common virus attacking computers these days. I have described a way to identify viruses in your computer, safely remove it using detection tool, using antivirus software to get virus protection.

Trojan horse which is also known as trojan, which in the computer language describes as a class of computer threats which is also known as malware that looks like to perform a desirable function or functions but in reality performs malicious functions, without giving notice, that allows unauthorized access to the host computer of the person who created this virus, giving them ability to down load a file to monitor users activities, steal data, or even watch the user's screen and control the computer remotely. This gives remote thieves full control of your computer using these types of Trojan or Trojan horse viruses.

This type of virus normally find a back door during let's say when you are playing a computer game. By going through a back door, this virus can take control of the game. Trojan viruses gets down loaded when user is visiting a site, playing game online, shopping online, there are hundreds of way your computer can get inflected. This all happens without a notice or your permission. This Trojan virus term is derived from the story of the Trojan Horse.

There are many different type of Trojan viruses out there, here are the latest finding of some key viruses that your computer may have been infected.

HOW TO REMOVE ABOVE VIRUSES FROM YOUR COMPUTER:

Virus listed above are most probably a Trojan Vundo or in general called Trojan type virus and it resides at following location. %Documents and SettingsUsersApplication Datadriversxxxxx.exe. You probably got this virus loaded in your computer when you visited some site and down loaded a file from internet. Be extra careful in removing these types of virus from your computer. Just deleting the file xxxxx.exe will not help spreading or harming your computer. If you are not sure use the FREE detection tool and remove the virus professionally or use the following procedure. Procedure varies slightly depending upon the virus type but you should have success if your computer knowledge is sufficient to follow steps describe below.

The procedure described here may vary a little depending upon what AV and Operating System you are using for your Computer. If you are not computer savvy then just use the FREE detection tool and it will tell you what viruses are present in your computer.

Source: http://goo.gl/0JNz2

Wednesday, May 18, 2011

Virus removal forms an essential aspect of computer maintenance because the presence of virus in the system causes its performance to decline severely. There are several pathways via which the virus can enter the computer like emails, attachments, downloads and even certain programs by being embedded in them.

After having gained entry, the virus, Trojan, spyware and malware could manifest its presence in a number of ways and while some are as simple as subtle and unexpected changes in the behavior of the system, others could be as serious as slowing down the system and causing it to crash.

The presence of virus in the system seldom remains concealed and before long the symptoms of an infection are evident in form of extremely sluggish performance, repeated system crash and rebooting, crashing of the application software and popping up of random messages on the screen. In such a situation, it is the owner's prerogative to detect the presence of virus followed by immediately taking steps to affect its removal before it wreaks irrevocable havoc on the stored data.

Installing strong anti virus software on the computer forms the first line of defense in virus removal as the main objective of such packages is to prevent, detect and remove virus. As the market is inundated with anti virus software packages, the seeker would be spoiled for choice and must be careful to opt for the latest package which will sift out even the most recent spyware and malware.

However, as the experts advise, the presence of an anti virus software is not sufficient itself for virus removal because there are new contagions being released every day with each being more harmful than its predecessors. Hence, with the intention of providing a boost to the installed anti virus program, the user must acquire some of the virus removal tools which would assist with detecting and cleaning individual malware.

Virus removal is a process which occurs over different stages and commences with updating the virus definitions so that even the latest and reincarnated versions would be caught. This is followed by updating the anti virus and then subjecting the system to a thorough scan so as to adjudge the extent of infection caused within the system. After having been identified, the next step entails removing the virus without harming the files or alternatively isolating them in the archives in case the virus cannot be removed.

Having removed the virus, it is now time to conduct repairs and restoring files as and when possible. A precautionary measure in this regard would be to scan and check incoming files prior to opening them.

Source: http://goo.gl/XeWsm

Wednesday, May 11, 2011

It is important that any computer that connects to the worldwide web be protected with Internet security software. There are different types of security software that you should install on your PC. You can either use stand alone programs, or go with an all in one security suite.

Antivirus software typically comes to mind when Internet security is the topic of discussion. A computer virus can literally destroy all of your valuable data, and make your PC inoperable. Once you have bought a good antivirus program you should immediately scan your computer. This should be done weekly, and if you use a free version program do it daily. Nearly all antivirus programs automatically update themselves. You should make sure this feature is activated.

Included with the windows operating system is a firewall. Yet, this is not enough to adequately protect your PC from Internet threats. To properly defend your computer you must buy a good solid firewall program from a trusted seller. Failure to heed this advice leaves your computer open to security threats, including identity theft.

Today's worldwide web is plagued with spyware. This means you must install reputable spyware program. Plus, you must have real time protection if you want to have true spyware security. Of course, you can install a no cost spyware program. Be careful because some of these so called free solutions will fill your hard drive with spyware, instead of removing it. When you buy a spyware program be sure you only deal with a trusted merchant. Brand names are best.

Equally important, is to keep your windows operating system current with all the latest updates. Some of these updates repair known security flaws in the windows system, including the Internet browser. It's a good idea to make sure this feature is activated to accept and install windows critical updates.

Naturally, e-mail is important, however spam is not. If your antivirus software does not protect your favorite e-mail client, you need to invest in a good spam filter. Equally important, is to never open attachments from people you do not know. Doing so is a recipe for infecting your computer.

Anyone who engages in peer to peer activity is asking for their computers to become infected. These sites are notorious havens for viruses and spyware. If you wish to engage in peer to peer activities make sure your computer is installed with the best Internet security programs you can afford. Beware though, because even that may not be enough to keep your PC safe. The best way to avoid a PC virus is to stay away from these websites, because even the best Internet security can be hacked.

source: http://goo.gl/qxDAx