Web Hosting Security

  Home arrow Web Hosting Security arrow How to Detect and Remove Maleware: Pro...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

How to Detect and Remove Maleware: Protecting Yourself
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2010-11-17

    Table of Contents:

    Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement
    It's time to wrap up this series on malware, so let's see some ways to manually remove infections on your computer, as well as how to prevent them from happening in the first place.

    Taking the long road: removing an infection manually

    Although antivirus programs are usually helpful in removing infections, sometimes you may have to do some extra legwork to get rid of malware that does not seem to want to disappear. In that case, manual removal is in order. This can be done if you want to save the time and money on paying an outside service to fix your computer as well.

    A System Restore could help fix your problem. Performing this action will place your computer in the working condition it was in prior to the infection. It essentially undoes system changes and reverts your computer back to a previous state in time. You will want to execute the System Restore as long as you have a version of your system that you know is clean and clear of any major problems. 

    If you do not have this, you could be better off disabling the System Restore feature altogether. You could also just ignore the option. The reasoning behind this is that if you reboot, there is a chance that the malware could simply restore itself once again, putting you back where you started.

    Another method for manual infection removal is to go into the Programs section of your Control Panel. From here, you can take a look at the list of programs on your computer and see if there are any unknown or mysterious programs that you do not recognize. If you see any, you may want to uninstall them.  Before doing so, however, you can do a quick Internet search to find details on the program. If it is a form of malware, you will likely find information on the Internet that says so.

    HiJack is a tool found online that is free, and can help you with some more complex malware problems. Running the program will produce a detailed log that you can post on online forums, such as the Bleeping Computer forum, which was mentioned in part two of this series. By posting the log on the forums, members can take a look at the state of your system and tell you if there is anything suspicious going on, as well as what steps to take to further fix the problem, once identified.

    If you have tried everything and nothing seems to work, you can take the last resort of reinstalling your operating system to get a fresh start.

    Protecting yourself from malware infections in the future

    There are various ways to protect your computer from getting infected. It obviously helps to run antivirus software, using the most updated version available. You also want to do the same for any firewall software or programs that combat spyware, such as Windows Defender.

    It is just as important to behave sensibly when using your computer as well. If you come across popups that prompt you to accept or click OK, avoid clicking the options; hit the CTRL and F4 buttons to close them. If the windows do not want to close, then close the browser by hitting ALT and F4. Clicking affirmatively on popups can download malware to your computer, creating a headache for you and your machine. If you receive spam emails, do not click to open any odd attachments, and do not click on links. 

    While there are plenty more methods that are useful in detecting, removing, and preventing malware infections, the ones listed in this series are at least a foundation to follow. By behaving intelligently while using your computer and performing some preemptive maintenance, you can avoid plenty of hassles in the future. 


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap