Web Hosting Security

  Home arrow Web Hosting Security arrow Detect and Remove Malware on Your Comp...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Detect and Remove Malware on Your Computer
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 2
    2010-10-27

    Table of Contents:

    Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement
    Concerned about viruses, trojans, and other kinds of malware getting onto your computer? You should be. Fortunately, you don't have to be a helpless victim of hackers. Keep reading to learn how to detect these vicious programs, safely remove them, and keep them from getting onto your PC in the first place.

    There have been many reports released recently that detail the ever-growing presence of malware in the online world. Whether it be via spam emails, social networking sites, through instant messaging clients, or other forms, malware is everywhere. It does not seem to be going away anytime soon, either. 

    Keeping that in mind, you want to ensure that you have the utmost level of protection against malware. While protecting yourself against malware is important, it is equally important to detect it. This three-part series will detail how to detect malware on your Windows PCs as well as how to rid them of this omnipresent nuisance of the cyber world.

    The likelihood of an infection on your PC

    Although you may be one of the most cautious people in the world, there is still a high likelihood that your PC is infected. According to a study released by Dasient, there were 1.3 million websites that were infected with malware in the second quarter of 2010. Even legitimate, trusted websites can be infected and load your PC with malware via drive-by downloads when you visit them. 

    Risky behavior such as visiting porn sites, downloading unauthorized music and movie files, or searching for free things on the net will also expose you to malicious content. Clicking sketchy links and opening attachments in emails or websites can put your PC in harm's way too. 

    If you do not run updated antivirus software, like an estimated 40 percent of computer users, your chances of having an infected PC go even higher. Even if you do run antivirus software, some malware disables it. 

    How to tell if your PC is infected

    There are some signs to look for that can tell you if your PC is infected. On the other hand, there is also malware that may not present negative symptoms that are detectable through the naked eye. Ways to detect these trickier, silent viruses will be detailed later on. 

    As for symptoms to look for in an infected PC, pop-ups are usually one common sign. Pop-up ads may even appear if you are not actively connected to the Internet. A fake antivirus is commonly shown through pop-ups that display messages saying your computer is infected. They then prompt you to click on them to purchase antivirus software in order to clean the virus. 

    Other symptoms include odd dialog boxes or menus that appear to look different from usual. You may have a hard time running applications successfully, or your computer may run very slowly. Frequent crashes are another symptom, as well as the inability to access certain disk drives.

    Some symptoms you may notice while browsing the net include page redirects, where you are sent to a different website from the one you expected to see. You may notice that your home page has been changed, or that your default search engine no longer appears. You may even see that your mouse pointer looks different, or that a new toolbar has become part of your browser.

    It should be noted that, while the symptoms listed may suggest an infection, they could mean that your computer has a different problem. For instance, odd performance behavior could indicate that your system is lacking memory, needs to be defragmented, or is suffering from another issue.

    Stay tuned for part 2 of this series, where further ways to check and remove infections will be discussed.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap