Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.

If a computer is infected by a computer virus the computer needs to be scanned by virus scanning software. If you do not own virus scanning software than you may buy some software at www.norton.com. If you do not wish to buy the virus scanning software at this point, than you may use a free virus scan which is located at www.mcafee.com.

In order to use the freescan;

1. Go to www.mcafee.com,

2. Click on home & home office

3. Under the heading of free tools (at the bottom of the page), click scan now

4. Click scan now (accepting user agreement)

5. The program will download an activex control (make sure that they are allowed), click install when prompted to do so

6. Make sure C: Drive is highlighted and click scan

7. If any files are found by Mcafee to have viruses, go to that location on your hard-drive, and delete those files.

If you cannot access the Internet as a result of the virus or the computer is unusable, than other measures may have to be taken. If the computer is unusable, and you have another hard-drive on hand, than you may hook up the damaged hard-drive as a slave drive.

(Consult the user manual of your computer to see where your hard-drive is hooked up, and how your motherboard is setup). You will have to unhook your hard-drive, put a different hard-drive in as the primary drive, and hookup the damaged drive as the slave drive (make sure the computer is shut down and unplugged when removing computer parts, also make sure you are grounded (static electricity destroys computer parts)). Once this is done than you may boot your computer, and copy the necessary files over to the other hard drive. You may also run scans on your slave drive at this point, in order to remove the virus from the damaged hard drive.

Another way to remove a virus from your computer is to use the removal tools on www.symantec.com.

1. If another computer is available (if the virus infected computer is unusable), than go to www.symantec.com

2. Click on the Security Response Tab

3. You can look for the virus that is infected on your computer. Once you find out what virus is infected on your computer (look for the behavior that the virus is exhibiting on your computer), you can click on the Downloads Tab

4. Click on Virus Removal Tools

5. Click on the virus that is infected on your computer

6. Follow the instructions on the virus removal page in order to remove the virus from the infected computer.

Benjamin Nicholson
CCIE Certified Network Engineer
http://www.grinnation.com
[email protected]
http://www.grinnation.com/computerviruses.htm

Benjamin Nicholson is a CCIE (Cisco Certified Internetworking Expert). He has been working in the I.T. industry for the past 20 years, and most recently has been studying computer viruses and the impact of computer viruses and spyware on society.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Russia says NATO membership of Balkan countries threatens security
Reuters
SARAJEVO (Reuters) - NATO enlargement to take in members from the Balkan countries is undermining security and stability in the region, a senior Russian parliamentarian said on Monday. Valentina Matviyenko, speaking in the upper house of Bosnia's ...

and more »

NPR

Alexa, Tell Me A National Security Secret: Amazon's Reach Goes ...
NPR
It's little known that the CIA uses Amazon Web Services to store its data, and, now, it's the favorite for a big-money Pentagon contract to do the same. Amazon's tentacles go to other agencies, too.
Alexa, tell me a national security secret: Amazon's reach goes beyond the Post Office89.3 KPCC

all 1 news articles »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: April 14 - April 20
Council on Foreign Relations (blog)
April 15: Boko Haram killed three Chadian soldiers in Abadam, Borno. April 15: Herdsmen killed seventy-eight in Awe, Keana, Obi, and Doma LGAs in Nasarawa (casualties not specified by LGA; majority in Obi). April 16: Kidnappers killed one policeman and ...

and more »

Quick Take-Aways From the RSA Security Conference
CSO Online
The transition from “bolted on” to “baked in” security. With security as a top-of-mind issue across business and IT, security functionality is moving toward cloud, application, and IT infrastructure. Intel announced new chip-level security ...

and more »

Stars and Stripes

Chinese smartphones cited by intelligence as security risk sold on US bases
Stars and Stripes
“Regardless of where the device is purchased, on base or off base, servicemembers should practice good (operational security).” In February, the director of national intelligence, along with the heads of the CIA, FBI, National Security Agency, Defense ...

and more »

Chicago Tribune

Oakbrook Center security scans license plates in its parking lots, raising privacy concerns
Chicago Tribune
If you park at Oakbrook Center, your car may be part of a candid camera scenario, as security cars drive up and down aisles in lots and garages, using license plate reading technology to check the plate numbers on vehicles. The license plate ...

and more »

New York Post

National security adviser recently chaired nonprofit with anti-Muslim views
New York Post
National security adviser John Bolton recently chaired a nonprofit that has shared fake anti-Muslim news, according to a new report. Bolton was chairman of the New York-based Gatestone Institute, which peddled misleading and false anti-Muslim accounts ...
National Security Adviser John Bolton is the former chairman of a sensationalist, anti-immigrant nonprofitThe Week Magazine
John Bolton presided over anti-Muslim think tankNBCNews.com
Are Jihadists Taking over Europe?Gatestone Institute

all 17 news articles »

New security at courthouse diffuses several situations
Abilene Recorder Chronicle
The presence of security guards in the Dickinson County Courthouse is making workdays a little less stressful for some employees. Dickinson County Administrator Brad Homman told commissioners Thursday that not only has the screening process and metal ...


Haaretz

Egypt's New Internet Law Blocks Sites Over 'National Security Concern'
Haaretz
What is national security, wondered Yasser Abdel Aziz, a leading member of Egypt's National Council for Human Rights. “If I were to publish something saying that the president is not a native Egyptian, would that harm national security?” At a meeting ...


The Hill

Homeland Security chief issues warning to 'caravan'
The Hill
Homeland Security Secretary Kirstjen Nielsen · Kirstjen Michele NielsenSenators chart path forward on election security bill Navy, Marines chiefs say no morale issues with transgender troops Staff changes upend White House cyber team MORE said Monday ...
Trump Brands Migrant Caravan a 'Disgrace,' Orders Homeland Security Officials to Turn Away Immigrants at BorderNewsweek
DHS boss threatens 'caravan' border-crossers with prosecution, detention, deportationFox News

all 70 news articles »
Google News

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More