Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"
Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.
The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.
You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.
James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?
The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.
Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.
Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.
![]() |
|
![]() |
|
![]() |
|
![]() |
If you constantly deal with bank or electronic accounts, it... Read More
There has not been a time in the history of... Read More
When it comes to a secure website and passwords it... Read More
Many of us have run into an annoying and time-consuming... Read More
Before you enter your name, address or any other data... Read More
No longer are viruses the only threat on the internet.... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Business on the internet is getting down right shameless. This... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
The Threat10 years ago you could probably have run no... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
What is computer security? Computer security is the process of... Read More
As you know, this time the virus under the name... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
First of all we need to get some terms stated.... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
This is not some new fangled techno-speak, it is a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
During the release of a new software product specialized to... Read More
Nowadays more and more people are using a computer. A... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
With the Internet entering our lives in such an explosive... Read More
In 1997, I decided after 15 years as a practicing... Read More
So you want to know who your kids are chatting... Read More
A friend called me one day and asked if I... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Is your data secure? Think again. Securing data is unlike... Read More
You and I are a lot alike. We are both... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Well, if that would have been said to me by... Read More
I got a virus the other day, Thursday I believe... Read More
You may not realize it, but as you are surfing... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
If you are a parent, you have probably wondered at... Read More
Imagine this ? you open up your email box and... Read More
As soon as almost all computer users already got used... Read More
So called phishers try to catch the information about the... Read More
In today's times spyware is a very serious issue and... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Be careful of sites that promise to send you "instant... Read More
Ebay is a great site and is used by many... Read More
If you run any type of Internet business, Adware and... Read More
My first experience with a spyware BHO based infection was... Read More
Much has been said on the theory of password protection... Read More
Identity theft rates one of the fastest growing crimes in... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
I am the victim of an internet scam. It is... Read More
Every now and then you can read about a new... Read More
If you know what is the 'Fishing' then it's very... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Have been an Internet user for more than 9 years,... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
In a word, no - an email message has always... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Internet Security |