Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.

If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.

In order to use the freescan;

1. Go to www.mcafee.com,

2. Click on home & home office

3. Under the heading of free tools (at the bottom of the page), click scan now

4. Click scan now (accepting user agreement)

5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so

6. Make sure C: Drive is highlighted and click scan

7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.

If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.

(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.

Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.

1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com

2. Click on the Security Response Tab

3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab

4. Click on Virus Removal Tools

5. Click on the virus that is infected on your computer

6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.

Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
benjamnicholson@aol.com
http://www.grinnation.com/computerviruses.htm

Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.

In The News:


pen paper and inkwell


cat break through


Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More