Viruses and spyware usually show up on your computer one of two ways.
Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar.
Either way, once a virus or piece of spyware gets on your system, getting it off can rate harder than curing a severe case of trench foot!
Viruses, malicious programs designed to disrupt normal computing, and spyware, programs intended to literally "spy" on your activities, can enter your computer a number of ways.
Most commonly they enter your system through an email attachment, by sharing files with an infected computer by disk, as a "ride along" with a 3rd party program you install, or through a "back door" port in your computer.
Regardless of how they get on your system, once in place, they cause no end of headaches and frustration.
The following represent typical signs you may suffer from infection by a virus or piece of spyware.
Your computer starts acting oddly by doing things it never did previously.
Your modem starts trying to dial out to the Internet without you initiating a surfing session.
You notice that files start disappearing, the system stalls, runs slowly, or even crashes frequently.
Your computer takes progressively longer to boot up every time you start it or you notice that your available hard drive space has disappeared. Strange popup windows appear, even when you're not surfing the web, or you delete a program and it "magically" reappears next time you boot the system.
If you suspect you a virus or a piece of spyware has invaded your computer, follow these steps to first identify and then delete the offending code:
Step 1 - Back up your important files, but remember to scan these files for viruses before reinstalling to avoid accidentally re-infecting your system.
Step 2 - Update your anti-virus definitions and perform a scan of your hard drive.
If you don't carry virus protection, or you suspect your anti-virus software got corrupted somehow, then log on to www.pandasoftware.com and use the free Panda Active Scan service to check your hard drive for viruses.
Follow the instructions for quarantining and removing the offending files.
Step 3 - Scan your hard drive with an adware, scumware, or spyware detection and removal tool like Adaware www.lavasoft.de/support/download/ or Spybot www.pandasoftware.com
Step 4 - In many cases, when the virus or spyware program gets installed with a free utility or game you download from the Web, you must usually uninstall the utility or game to finally get rid of the problem once and for all.
Step 5 - Avoid re-infection by keeping your anti-virus and firewall up-to-date at all times.
As a last resort, if you run into a program you simply can't get rid of, but can figure out the offending file's name, do a search for the file name on Google.com. Often you will find you're not the first victim and may get valuable advice for cleaning up your system.
However, be very careful of the information you find and think twice before modifying any system files.
About The Author
Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> www.pandasoftware.com
Fundraising software lets you connect with donors in a way... Read More
This article illustrates the best practices to improve the performance... Read More
Now that spyware is the single most dangerous threat to... Read More
Remember back in the days where screensavers were the coolest... Read More
What is Interactive Mapping?Interactive mapping is a visual display medium... Read More
Domino server is a buffer between the operation system and... Read More
Are you a whiz at calculating financial information? Not the... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
I have yet to see a business that, sometimes in... Read More
There are plenty of articles out there about how to... Read More
The java programming language is becoming more and more popular... Read More
If you feel intimidated when someone tries to teach you... Read More
It's not very often I get excited about a software... Read More
This article is the first of a series of articles... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More
What is Spyware?Spyware monitors your surfing habits and sends the... Read More
Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More
It is a well known fact that Java as a... Read More
Vince Lombardi once said that, "The achievements of an organization... Read More
ERP Consulting industry is on the way to serve clients... Read More
Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More
Adware is a type of Spyware program that displays some... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
In our opinion, traditional approach when you select ERP/MRP system... Read More
So, why should you use any O/R mapping tool? I... Read More
... Read More
Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
In a previous article, I wrote about OpenOffice... Read More
We'll give you non formal view, based on our consulting... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
Microsoft Retail Management System serves retail single store as well... Read More
This article is the fourth of a series of articles... Read More
Usually workflow & messaging is realized in CRM and then... Read More
The US House of Representatives has recently passed the "Spy... Read More
The java programming language is becoming more and more popular... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
Trying to figure out a stream in banning one email... Read More
Sales are all about leverage, because there is only so... Read More
Microsoft CRM is CRM answer from Microsoft and attempt to... Read More
Some introduction into Great Plains Software products, now Microsoft Business... Read More
The COSMIC FP (function point) software quality metric, is no... Read More
Software |