How do you do?:
To remove computer virus, you need to have virus removal software installed on your computer. You can do it manually but you run the risk of deleting important files that make your computer operate. I would suggest downloading AVG's free virus removal software. However, you can use any program that you want.
Turn off system restore. Restart your computer.
While your computer is rebooting, press F8 to bring up a menu of boot options. You must press F8 at the moment just before Windows begins to load. Select Safe Mode.
Once your computer is restarted in safe mode, start your virus removal software. Have your software scan your computer. If your software detects any viruses, select the option to remove computer virus.
If your software does not find any computer viruses, make sure that you have the most up-to-date version and your virus library is up-to-date as well.
Wish that helps
2014-05-29 15:50:42
·
answer #2
·
answered by Anonymous
·
0⤊
0⤋
equipment fix won't try this. you will desire to do an entire re-setting up of the working application. or you ought to setting up Anti virus, secret agent ware, spyware, and a registry air purifier. despite in case you do re-setting up of the OS, it rather is nevertheless a real good thought to locate and setting up the aforementioned products. hint; the pay variations constantly paintings lots greater useful than any of the loose stuff.
2016-12-18 13:20:04
·
answer #5
·
answered by ? 4
·
0⤊
0⤋
I'm sure you know this, but just a reminder. Restore points are copies of files. When you restore to a previous day it basically erases everything in that file that was installed after the restore point was established. If the file was infected when the restore point was made you will simply reinfect you computer.
When you properly remove a malware infection all the restore points should be deleted and a new one made to ensure you are not reinfected.
It is hard to help with such vague information. Most posters refer to all infections as a Virus. This not the case. Virus, Worms, Trojans, Spyware, Hijackers and other forms of malware are all different and sometimes require very specialized programs for removal.
Trojans have become the most common form of initial infection. Trojans are unique in that they look innocent and are allowed on the computer. In most cases a Trojan, by itself, will not harm your computer. The Trojan, once installed, is used to download other forms of malware. Trojans are usually recognized after they are installed and start doing their job.
In some cases, when the Trojan is removed the malware associated with it is also removed. In other cases the Trojan must be removed, to prevent it from continually downloading, and then the associated infection must be removed.
The most important part of removing malware is to allow the program(s) access to all areas of the computer. Most AV/AS programs are not allowed to scan all areas when the computer is in the "normal mode". Opening the Hidden Files and Folders is important since most newer Malware hide in these areas.
Using this procedure will open these areas and allow for proper scanning a removal. It then has you delete all old restore points and establish a new one.
I also recommend you start by scanning by using ewido. It is the best Trojan remover available. You can use any other AV/AS programs you have on your computer with this procedure. Be sure you can run the AV/AS program from a desktop Icon while in Safe Mode.
If ewido and other AV/AS programs do not remove the infection you may have a Smitfraud Trojan or a Vundo Trojan. These require special programs for removal. Smitfraud usually install Browser/Homepage hijackers, but can install other forms of malware. Vundo Trojans are generally associated with installing WinFixer adware and popups wanting you to buy useless forms of Antispyware programs. Smitfraud and Vundo removal information is included below the procedure if you need it.
Download and Update Ewido (now called the AVG Antispyware). Do not run:
http://www.ewido.net/en/download/
TEMPORARILY SHOW HIDDEN FILES AND FOLDERS.
1. Click Start, and then click Control Panel.
2. Click Appearance and Themes, and then click Folder Options.
3. On the View tab, under Hidden files and folders, click "Show hidden files and folders", and clear(uncheck) the "Hide protected operating system files" check box.
IMPORTANT: Files are hidden by Windows for a very good reason. It is not wise to experiment with these files. Unfortunately, to successfully remove modern spyware we must turn this protection off temporarily. Please turn the protection back on when you have finished cleaning your system.
EMPTY INTERNET EXPLORER BROWSER CACHE:
1. On the Internet Explorer Tools menu, click Internet Options.
2. On the General tab, in the Temporary Internet Files section, click the Delete Files button. Select the Delete all offline content check box in the confirmation dialogue box that appears, click OK. Click OK again.
RESTART IN SAFE MODE:
To do this you need to hold down or repeatedly tap the F8 key while the computer is booting (when the computer is displaying a black screen with white text). When the boot menu appears, use your keyboard arrows to select "Safe Mode."
Safe Mode can look quite ugly. The color may look bad, and all of your desktop icons will be very large. This is normal.
START THE SCAN WITH YOUR PROGRAM(S).
When the scan and removal are completed REBOOT COMPUTER. This will restart you in normal mode.
RESET HIDDEN FILES AND FOLDERS.
The RESTORE POINTS may be infected with the Malware and cannot be used. Delete the old one(s) and make a new one.
CLEAR OLD RESTORE POINT(S). HERE'S HOW:
1. Click Start, and then click Control Panel.
2. Click Performance and Maintenance, click System, and then click on the System Restore tab.
3. Select the Turn Off System Restore check box, click Apply, then restart your computer.
4. Return to the System Restore Tab and turn System Restore back on.
TO SET A NEW RESTORE POINT:
1. Click the Start button.
2. Point to Programs, then navigate to Accessories, then System Tools, then click System Restore.
3. Choose Create a restore point, and then click Next.
4. In the Restore point description box, type a name for your restore point, and then click Next.
5. Click OK.
NOTE: If you are using Windows XP Service Pack 2 (SP2) and are unable to access the Internet after removing Malware, there is a command that may fix the problem. It works by resetting the winsock catalogue. Click on Start, then Run and type CMD in the box. Click OK. Type "netsh winsock reset" (no quotes)into the DOS window that appears.
ADDITION INFORMATION ABOUT TROJANS:
There are Trojans that fall into the Smitfraud family. Smitfrauds are usually Homepage/Browser Hijackers. A Homepage Hijacker takes you to a website other than what you have set on your computer. A Browser Hijacker directs you to websites other than what you just selected. These require the use of a specialized program for removal. Here are two sites that specialize in removing these:
http://www.internetinspiration.co.uk/roguefix.htm
http://siri.urz.free.fr/Fix/SmitfraudFix_En.php
Another type of Trojan that requires a specialized removal program is Vundo Trojans.
The procedure should fix Vundo-based Winfixer(WinAntiSpyware, WinAntiVirus, Blackworm, Amaena)problems.
Please download Atribune's VundoFix.exe (version 4.2.71 [as of 21 April '06], or later), from
http://www.atribune.org/ccount/click.php?id=4
and save it to your desktop.
Double-click VundoFix.exe to run it.
Put a check next to Run VundoFix as a task.
You will receive a message saying vundofix will close and re-open in a minute or less. Click OK Note: If VundoFix does not reopen after a minute (or two), then you should skip-over the "Run as a task" step, and continue-on to the following steps to SCAN and REMOVE.
When VundoFix re-opens, click the Scan for Vundo button.
Once it's done scanning, click the Remove Vundo button.
You will receive a prompt asking if you want to remove the files, click YES
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed, it will prompt that it will shutdown your computer, click OK.
Turn your computer back on.
The most important thing it to prevent the infecions from getting on your computer in the first place. I recommen you read this site.
http://www.internetinspiration.co.uk/computer_privacy_and_security.htm
2007-03-14 01:19:28
·
answer #6
·
answered by Anonymous
·
0⤊
0⤋