Is Your Computer Sick?

Viruses and spyware usually show up on your computer one of two ways.

Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar.

Either way, once a virus or piece of spyware gets on your system, getting it off can rate harder than curing a severe case of trench foot!

Viruses, malicious programs designed to disrupt normal computing, and spyware, programs intended to literally "spy" on your activities, can enter your computer a number of ways.

Most commonly they enter your system through an email attachment, by sharing files with an infected computer by disk, as a "ride along" with a 3rd party program you install, or through a "back door" port in your computer.

Regardless of how they get on your system, once in place, they cause no end of headaches and frustration.

The following represent typical signs you may suffer from infection by a virus or piece of spyware.

Your computer starts acting oddly by doing things it never did previously.

Your modem starts trying to dial out to the Internet without you initiating a surfing session.

You notice that files start disappearing, the system stalls, runs slowly, or even crashes frequently.

Your computer takes progressively longer to boot up every time you start it or you notice that your available hard drive space has disappeared. Strange popup windows appear, even when you're not surfing the web, or you delete a program and it "magically" reappears next time you boot the system.

If you suspect you a virus or a piece of spyware has invaded your computer, follow these steps to first identify and then delete the offending code:

Step 1 - Back up your important files, but remember to scan these files for viruses before reinstalling to avoid accidentally re-infecting your system.

Step 2 - Update your anti-virus definitions and perform a scan of your hard drive.

If you don't carry virus protection, or you suspect your anti-virus software got corrupted somehow, then log on to www.pandasoftware.com and use the free Panda Active Scan service to check your hard drive for viruses.

Follow the instructions for quarantining and removing the offending files.

Step 3 - Scan your hard drive with an adware, scumware, or spyware detection and removal tool like Adaware www.lavasoft.de/support/download/ or Spybot http://spybot.safer-networking.de/.

Step 4 - In many cases, when the virus or spyware program gets installed with a free utility or game you download from the Web, you must usually uninstall the utility or game to finally get rid of the problem once and for all.

Step 5 - Avoid re-infection by keeping your anti-virus and firewall up-to-date at all times.

As a last resort, if you run into a program you simply can't get rid of, but can figure out the offending file's name, do a search for the file name on Google.com. Often you will find you're not the first victim and may get valuable advice for cleaning up your system.

However, be very careful of the information you find and think twice before modifying any system files.

About The Author

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.turnwordsintotraffic.com

In The News:


pen paper and inkwell


cat break through


Microsoft CRM Integration with IBM Lotus Notes Domino ? Machinery Dealership Example

IBM Lotus Notes with Domino email server is traditional document... Read More

Spyware - The Internet Devil Of Our Times!

Spyware and Adware infest over 90 percent of computers in... Read More

Microsoft CRM Customization

Microsoft CRM customization techniques are very diversified and based on... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

10 Things You Can Do With Photoshop CS2 That You Couldnt Do Before Now

Is Photoshop CS2 worth the upgrade? You bet it is!... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Device Driver Basics

Most people understand that the "hardware" part of their computer... Read More

Microsoft Great Plains Nationwide Remote Support

ERP Consulting industry is on the way to serve clients... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

And kill the best layout software in the process of... Read More

Is Your Computer Sick?

Viruses and spyware usually show up on your computer one... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

C++ Function Templates

C++ Function templates are those functions which can handle different... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur

I started using PIP (Picture It Publishing) Platinum 2002 right... Read More

Microsoft Great Plains Integrations ? Retail Management Sample

Microsoft Business Solutions is emerging as very attractive vendor for... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

Removing Incoming Email in MS Exchange, C# Example

The purpose of one of our projects was MS Exchange... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Groupware: Avoid the Ad Hoc Shuffle

GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More

Seven Reasons Why a Hosted Inventory Management Solution Might Be Right For Your Organization

Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

Software Piracy - Global Increase

Pirated software is on the increase and now accounts for... Read More

Microsoft Great Plains Implementation for Midsize & Large Corporation: Lockbox Processing

Microsoft Great Plains is now targeting large and midsize businesses... Read More

Microsoft Great Plains Reporting ? Overview for Developer

Looks like Microsoft Great Plains becomes more and more... Read More

Microsoft CRM USA Nationwide Remote Support

Remember old good days when your company probably had Great... Read More

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

MCP Market News: Microsoft SQL Server & SQL Reporting Services

Are you ready? SQL Server 2005, the next-generation data management... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Basic Steps To Optimize Your Internet Security

After seeing many people complain about their weak Internet security... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

Internet Security Threats: Who Can Read Your Email?

Before being able to choose a secure Internet communication system,... Read More