Tag Archives: Virus

Virus Recovery Tips For Your Infected Computer

Virus Recovery Tips For Your Infected Computer

Computer viruses are harmful because of the damage they can cause to your computer system, such as deleting files, corrupting data, or simply wiping your hard disk clean. Some even install backdoors on your computer that can give hackers access to your system and your data.

Although some viruses (those that cause your system to crash only once or generate silly onscreen messages) are comparatively benign, most viruses target the essential portions of your programs or operating system to deliver greater damage.

Fighting viruses is relatively simple. Every user should install and maintain anti-virus software. The software should be set to scan all incoming files and emails, and to regularly scan the entire computer for infection. Users can do their part by treating all incoming messages and attachments with suspicion.

Despite taking all these precautions, chances are you may someday find your system infected by a virus. You will probably lose important data, as well as essential program and systems files. Once you have been victimized, what can you do for virus recovery?

The first step is to properly diagnose your problem. If your computer is still functional and you can access the Internet, search for information on current, known viruses. Using the file search function, scan your system for virus programs or infected files. Don’t forget to search your memory as some viruses are designed to hide in there. Be sure to show hidden files because some viruses will be invisible to regular searching.

Test several different programs and operating system functions to determine the depth of infection, if it exists. If only one program or system function is not operating correctly, it may be a problem with that component rather than a virus that is causing the aberrant behavior. Of course, you may have contracted a virus designed to attack only one part of your computer so it pays to check thoroughly regardless of the symptoms.

If your system is not operational, try to boot the computer using an anti-virus CD or diskette. This step will only work if you have created the necessary bootable anti-virus disk when you install the software, before you are infected with the virus. You should also have saved a backup copy of your system on CD in anticipation of a possible future infection.

After booting from the diskette or CD, scan the system and look for the virus or infected files. If you discover a virus, there are several steps to take to restore your computer to normal.

If you are running Microsoft Windows, select the boot option: Last Known Good Configuration. This option only exists the first time you reboot after infection, so make sure you try it first. This approach rarely works, but in some instances it can save your computer.

Check your computer for key operating systems files. A quick search on Microsoft’s web site for “operating system files” should call up a comprehensive list; print out this list and keep it by the computer for comparison. For the same level of service pack, the dates on the files should match up closely; a much more recent date on one or two files might help you pinpoint infected files.

Pay close attention to kernel32.exe and lsass.exe because hackers frequently attack those two files. Although Microsoft does update these files periodically, those updates tend to come in bunches so one file with a different date should be viewed with suspicion. If necessary, replace suspect files with new clean versions copied from another system or downloaded from the Internet.

Windows users may also find their Registry has been corrupted. If you have this problem, there are many Windows Registry repair utilities out there that can help; a simple Internet search will turn up the proper one for your version of Windows. You can also look for helpful and up-to-date recommendations for this type of software on the related forums.

If the virus has only attacked a particular program, it is a simple matter to uninstall and reinstall it. Though the time and effort involved is annoying, the process itself is fairly straightforward. Luckily, most programs will ask you before deleting any user-created data files so you shouldn’t lose any valuable work.

The worst-case scenario involves lots of lost or corrupted data that was never backed up by the user before infection. If you fall into this category, take heart- there are programs or services out there to help. Data Recovery services are usually expensive, but you may find your data is worth the considerable cost involved. Even if you can’t locate any of your files, these experts may be able to recover substantial portions of the lost data.

Virus Recovery Tips for Your Infected Computer

Virus Recovery Tips for Your Infected Computer

Computer viruses are harmful because of the damage they can cause to your computer system, such as deleting files, corrupting data, or simply wiping your hard disk clean. Some even install backdoors on your computer that can give hackers access to your system and your data.

Although some viruses (those that cause your system to crash only once or generate silly onscreen messages) are comparatively benign, most viruses target the essential portions of your programs or operating system to deliver greater damage.

Fighting viruses is relatively simple. Every user should install and maintain anti-virus software. The software should be set to scan all incoming files and emails, and to regularly scan the entire computer for infection. Users can do their part by treating all incoming messages and attachments with suspicion.

Despite taking all these precautions, chances are you may someday find your system infected by a virus. You will probably lose important data, as well as essential program and systems files. Once you have been victimized, what can you do for virus recovery?

The first step is to properly diagnose your problem. If your computer is still functional and you can access the Internet, search for information on current, known viruses. Using the file search function, scan your system for virus programs or infected files. Don’t forget to search your memory as some viruses are designed to hide in there. Be sure to show hidden files because some viruses will be invisible to regular searching.

Test several different programs and operating system functions to determine the depth of infection, if it exists. If only one program or system function is not operating correctly, it may be a problem with that component rather than a virus that is causing the aberrant behavior. Of course, you may have contracted a virus designed to attack only one part of your computer so it pays to check thoroughly regardless of the symptoms.

If your system is not operational, try to boot the computer using an anti-virus CD or diskette. This step will only work if you have created the necessary bootable anti-virus disk when you install the software, before you are infected with the virus. You should also have saved a backup copy of your system on CD in anticipation of a possible future infection.

After booting from the diskette or CD, scan the system and look for the virus or infected files. If you discover a virus, there are several steps to take to restore your computer to normal.

If you are running Microsoft Windows, select the boot option: Last Known Good Configuration. This option only exists the first time you reboot after infection, so make sure you try it first. This approach rarely works, but in some instances it can save your computer.

Check your computer for key operating systems files. A quick search on Microsoft’s web site for “operating system files” should call up a comprehensive list; print out this list and keep it by the computer for comparison. For the same level of service pack, the dates on the files should match up closely; a much more recent date on one or two files might help you pinpoint infected files.

Pay close attention to kernel32.exe and lsass.exe because hackers frequently attack those two files. Although Microsoft does update these files periodically, those updates tend to come in bunches so one file with a different date should be viewed with suspicion. If necessary, replace suspect files with new clean versions copied from another system or downloaded from the Internet.

Windows users may also find their Registry has been corrupted. If you have this problem, there are many Windows Registry repair utilities out there that can help; a simple Internet search will turn up the proper one for your version of Windows. You can also look for helpful and up-to-date recommendations for this type of software on the related forums.

If the virus has only attacked a particular program, it is a simple matter to uninstall and reinstall it. Though the time and effort involved is annoying, the process itself is fairly straightforward. Luckily, most programs will ask you before deleting any user-created data files so you shouldn’t lose any valuable work.

 

Antivirus Software – It’s All About Computer Virus Protection Anti-Infiltration

Antivirus Software – It’s All About Computer Virus Protection Anti-Infiltration

 

Anti-Virusunlike other malicious programs like spyware, worms, adware, rootkits, phishing and Trojan horses, viruses are computer programs that uncanny ability of propagating itself to various system files to infect, and may be transmitted over networks, Internet, e-mail , Instant Messaging, file sharing channels as well as removable media such as diskettes, CDs, DVDs or USB sticks. Some computer viral infections display symptoms that will eventually be noticed by most computer users. However, the vast majority of computer viruses are causing havoc that placement and unnoticed long enough for the damage to be irreversible. Those are the reasons that anti-virus software products are so crucial.

Antivirus software programs were originally created for computer viruses began to spread in the 1980 fighting. more sophisticated current antivirus software programs are more fertile and thus able to identify and remove viruses, along with all other harmful malware. After finding all the malware, the antivirus software to quarantine or encrypt the infected files inaccessible or ineffective, they will try to recover the files by removing the malware, but this can not always be successfully accomplished or they will completely remove the infected files from the system.

The antivirus software programs are numerous and they are all one or more of the following three main methods for identification of malware: The most common is the signature-based detection method. This method breaks files into small segments and compares the contents of each of these segments against a dictionary of the virus signatures is essentially a list of known virus code. This method is somewhat limited in the equation can only be carried out against known viruses and will not be able to select one of the new tracks. Antivirus software relies on signature-based detection method requires frequent virus signature updates for the dictionary and was established to examine all files when the computer’s operating system creates, opens, closes or e-mail them.

The malicious activity detection monitors the behavior of all programs and thus provides protection against new viruses. Any suspicious behavior was reported to the computer used to decide how to proceed – to reject or accept. The heuristic-based detection method was used by the higher end and most advanced antivirus software and is designed to identify new and unknown viruses.

Its task of antivirus software that uses heuristic – based on the detection method used one of two techniques: a) File Analysis – It analyzes suspicious files and virus-like instructions that can significantly slow down the computer, or b) File emulation – it’s running in virtual environments, notes of their actions and performances, and then determine whether these programs are malicious or not.

Needless to say, the best antivirus softwareand one that is most effective, is that using a combination of several of the above methods. After all antivirus software, it’s all about the protection of anti-computer virus infiltration and maintain that security.