Is Your Computer Sick?

Viruses and spyware usually show up on your computer one of two ways.

Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar.

Either way, once a virus or piece of spyware gets on your system, getting it off can rate harder than curing a severe case of trench foot!

Viruses, malicious programs designed to disrupt normal computing, and spyware, programs intended to literally "spy" on your activities, can enter your computer a number of ways.

Most commonly they enter your system through an email attachment, by sharing files with an infected computer by disk, as a "ride along" with a 3rd party program you install, or through a "back door" port in your computer.

Regardless of how they get on your system, once in place, they cause no end of headaches and frustration.

The following represent typical signs you may suffer from infection by a virus or piece of spyware.

Your computer starts acting oddly by doing things it never did previously.

Your modem starts trying to dial out to the Internet without you initiating a surfing session.

You notice that files start disappearing, the system stalls, runs slowly, or even crashes frequently.

Your computer takes progressively longer to boot up every time you start it or you notice that your available hard drive space has disappeared. Strange popup windows appear, even when you're not surfing the web, or you delete a program and it "magically" reappears next time you boot the system.

If you suspect you a virus or a piece of spyware has invaded your computer, follow these steps to first identify and then delete the offending code:

Step 1 - Back up your important files, but remember to scan these files for viruses before reinstalling to avoid accidentally re-infecting your system.

Step 2 - Update your anti-virus definitions and perform a scan of your hard drive.

If you don't carry virus protection, or you suspect your anti-virus software got corrupted somehow, then log on to www.pandasoftware.com and use the free Panda Active Scan service to check your hard drive for viruses.

Follow the instructions for quarantining and removing the offending files.

Step 3 - Scan your hard drive with an adware, scumware, or spyware detection and removal tool like Adaware www.lavasoft.de/support/download/ or Spybot http://spybot.safer-networking.de/.

Step 4 - In many cases, when the virus or spyware program gets installed with a free utility or game you download from the Web, you must usually uninstall the utility or game to finally get rid of the problem once and for all.

Step 5 - Avoid re-infection by keeping your anti-virus and firewall up-to-date at all times.

As a last resort, if you run into a program you simply can't get rid of, but can figure out the offending file's name, do a search for the file name on Google.com. Often you will find you're not the first victim and may get valuable advice for cleaning up your system.

However, be very careful of the information you find and think twice before modifying any system files.

About The Author

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.turnwordsintotraffic.com

In The News:


pen paper and inkwell


cat break through


How a Bug Challenges to a Software Professional

It is really interesting that a bug can create problem... Read More

Make or Break Factors - When Considering Estimating Software

Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security â?" these days weâ??re... Read More

Great Plains Dexterity Customization Options ? Overview For Developers

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft CRM Implementation for Large Corporation ? overview

Microsoft Business Solutions CRM is now approaching the phase of... Read More

Fleet Maintenance Software Reviews

Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

Microsoft Great Plains: exchange & brokerage ? implementation notes

If you company is small or mid-size special products or... Read More

Microsoft Great Plains in Metal Distribution: Implementation & Customization ? Consultant Overview

Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

5 Time-Saving Tips in Microsoft Word

Whether you have used Microsoft Word for years, have just... Read More

Outlook... Not Just for Email! Using Your Outlook Calendar

Microsoft Outlook is one of the most widely used software... Read More

Free Software - Powerful Alternatives to Budget-Busting Software

When you buy a computer, it most likely comes with... Read More

Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of... Read More

Great Plains Dexterity Development: FAQ

Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

The Tools and Features of Adobe Photoshop

Adobe Photoshop is one of the world's leading graphics editing... Read More

Microsoft and Webmasters

Does Microsoft care for WebmastersIt's always been a problem with... Read More

Microsoft Business Solutions - Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL

Microsoft bought Navision, Denmark based software development company, along with... Read More

How to Evaluate Staffing Software

If you are in the market for new staffing software,... Read More

Tripwire for Linux File Integrity

What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th... Read More

Alien Intruders!

You probably didn't casually invite, or extend a formal attendance... Read More

Microsoft Great Plains Implementation & Customization: Computer Parts Retailer Example

Microsoft Great Plains fits to majority of horizontals and retail... Read More

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

6 Easy Steps for a Smoother CD/DVD Order

It's all about turn times in the eMedia industry! The... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

Reduce Pop-ups and Annoying Ads

There is many things more frustrating than surfing a website... Read More