SlideShare a Scribd company logo
1 of 28
KAPASAKALIS SPIROS









Introduction.
Threats to watch out for.
Signs that you are corrupted.
How to bar them if you have been corrupted.
How not to get corrupted in your every day
access to the pc.
Conclusion.
How to keep your computer running smoothly.
INDEX





If you own a computer that has access to the
Internet and e-mail, then it is certain that you will
be a victim to malicious
spyware, malware, viruses, worms, or hackers.
Every day thousands of users report problems
with their computer and are wasting money
trying to fix the issue not knowing that they can
do it alone, safely and freely.
The information in this Guide will not only
educate you as to why you are experiencing these
problems, but also what you have to do in order
to avoid experiencing these problems.
INDEX





Spyware
Malware
Hackers
INDEX





Spyware is Internet jargon for hidden programs
advertisers install on your PC without your
permission to spy on you, gather information, and
report this information about you and your online
activities to some outside person.
Spyware is not harmless, it can be responsible for
delivering a boatload of spam, altering your web
browser, slowing down your PC, and serving up a
bounty of pop-up ads. In some of the more
extreme cases, spyware can also steal your
identity, passwords, e-mail address book, and
even use your PC for illegal activities.
INDEX





Malware is short for malicious software and represents all
programs, viruses, Trojans, and worms that have malicious
intent to damage or disrupt a system. Malware is harder to
remove and will fight back when you try to clean it from
your system. In some extreme cases, you will have to
completely wipe out all the information on the computers
hard disk and re-install the operating system.
Among other things, a malware infection can corrupt your
files, alter or delete data, distribute confidential information
such as bank accounts, credit cards, and other personal
data, disable hardware, prevent you from using your
computer, and cause a hard drive to crash.
Frequently, malware is also designed to send itself from
your e-mail account to all the friends and colleagues in your
address book without your knowledge or consent.
INDEX





Hackers are computer programmers turned evil.
They are the people who design the spyware and
malware programs that attack your computer.
Some of them have criminal intent and use these
programs to steal money from individuals and
companies. Some have a grudge against the big
software vendors (like Microsoft) and seek to harm
them by attacking their customers (you). Others do
it purely for fun. Whatever the reason, hackers are
getting more intelligent and sophisticated in their
ability to access computer systems and networks.
INDEX










You are starting to get swamped with pop-up ads
that come from nowhere and continiously
interrupt your use of the computer.
Your computer is unstable, sluggish, locks up,
crashes or deletes files on its own frequently.
Your web browser’s home page changes on its
own and you cannot modify the settings. Also you
might see some toolbars that you never installed.
Mysterious files suddenly appear.
A second or a third we browser is popping up
when u open your browser instantly and you can’t
prevent it.




Method:1 Scanning
Method:2 System Restore
Method:3 Clean Install

INDEX
INDEX







There are thousands of different programs out there in
the anti-spyware/malware/virus, many of which are
free. The most important thing to remember is that
these programs will not find and remove the same
viruses and not of them are 100% sure to delete all of
them.
Imagine yourself scanning your computer and finding
viruses, then you try and remove them with your antivirus program. But your computer is still suffering
from them and you are forced to scan with another
program, which enables you to find more of them.
However, you do not want to stack tons of virus
removal programs on top of each other. Doing so can
actually throw off effectiveness. One good antivirus
scanner should be enough.








System restores are a good way to get rid of light malware
and spyware programs. They require no downloading of
any software and can be performed directly by Windows.
System restores work best if you catch the intrusion right
away. But, you do not want to do a system restore if you
believe that you have had malware, spyware, or viruses on
your computer for any significant amount of time.
This could cause you to lose files, applications, or data. To
do a system restore in Windows, navigate to the control
panel using the path Start > Control Panel. Click
the Recovery icon located within the Control Panel and hit
the Open System Restore button on the next screen.
The rest of the process is very straightforward as the
Windows Wizard will guide your through it.
INDEX




A clean install is not the most fun thing to do.
However, a clean install is the one guaranteed way
to get rid of viruses, spyware, and malware. It’s
simple… when you do a clean install, you are
deleting everything on your hard drive. Thus, no
more viruses.
Most of the time, viruses will not infect items like
pictures, text documents, videos, or MP3 files. If
step 2 (scan), is not working for you, more than
likely the virus is in your computer’s registry. This
is good because you can backup all of your
pictures, documents, etc… before doing the clean
install. That way you will not lose anything
important.

INDEX






Step 1
Step 2
Step 3
Step 4
Step 5

INDEX
BACK





Keep an up-to-date anti-virus software running
at all times.
This is one of the most if not THE most
important thing to do, because you will need it
to scan for viruses and be able to remove them.
BACK




PREVIOUS

Don’t use internet explorer anymore.
Just recently, hackers have figured out a way to
access and download malicious programs to
your computer by using a security hole in
Internet Explorer. What is extraordinary about
this is that you don’t even have to click on
anything or download a program to get
infected. You are especially vulnerable if you
have an older version of Windows such as
Windows 98.
BACK



PREVIOUS

Don't allow your web browser to
automatically run programs, such as MS Word
or other programs through its e-mail program.
Configure it to launch other programs such as
NotePad or WordPad instead. This way the
macro virus won’t spread on your computer.
Therefore it is something you definitely want
to do.
BACK




PREVIOUS

Never open suspicious e-mails.
Most of the viruses are attached to an e-mail, so
if you see one delete it immediately.
BACK





PREVIOUS

Stop using peer to peer file sharing and don’t
ever download programs that look nice.
Think of it like cyber candy. Hackers use these
cute and funny programs as bait in order to get
you to download their destructive programs.
These are guaranteed ways of getting hit by
malicious viruses, spyware, and malware.
Also, peer to peer file sharing sites are mine
fields of malicious programs. Don’t ever think
of accessing those sites or download the
programs that runs them.
INDEX





All in all computer viruses are a very common
enemy on our every day life but we can
prevent them from reaching us or remove them
if we have already been corrupted.
There are many different things we can do
about it but the core procedure is in this
guide, but if what is written here doesn’t work
for you then the best thing you can do before
asking an expert is search in the
internet, because there you can find all the
answers you need.
INDEX







Step 1
Step 2
Step 3
Step 4
Step 5
BACK




Do a clean up every month.
This is very important, because there are many
files that fill your hard disk and if they become
superfluous then they will slow down your
computer.
BACK




PREVIOUS

Defragment the hard drive.
Defragmenting your hard drive makes it easier
for your computer to complete actions in a
faster way.
BACK




PREVIOUS

Uninstall the programs you don’t use.
It is just silly to keep programs you don’t use in
your computer because they fill your hard
drive and make your computer slower.
BACK




PREVIOUS

Delete cookies from the browsers.
Clear your cache after you sign off. These files
are just unnecessary, take up memory, and can
allow spyware to invade your computer.
BACK




PREVIOUS

Format.
If nothing else works you should really
consider formating your computer, but before
you do it make sure you have already backed
up your files.

More Related Content

What's hot

A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
UltraUploader
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
robsworld
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 

What's hot (19)

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Spyware
SpywareSpyware
Spyware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computer
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Presentation
PresentationPresentation
Presentation
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 

Viewers also liked

งานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา ISงานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา IS
Kanyapak Thongsuk
 
Computerized grading system chapter 4 5
Computerized grading system chapter 4 5Computerized grading system chapter 4 5
Computerized grading system chapter 4 5
Chriselle24
 
Presentacion
PresentacionPresentacion
Presentacion
flory2014
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
April Hodges
 
одуванчики Галушко
одуванчики Галушкоодуванчики Галушко
одуванчики Галушко
ozimovska
 
U.S. Top Traffic Cities
U.S. Top Traffic Cities U.S. Top Traffic Cities
U.S. Top Traffic Cities
INRIX
 
операційні системи
операційні системиопераційні системи
операційні системи
anonim555
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
Kanyapak Thongsuk
 

Viewers also liked (19)

งานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา ISงานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา IS
 
Veg choice-menu-diamond a4
Veg choice-menu-diamond a4Veg choice-menu-diamond a4
Veg choice-menu-diamond a4
 
Computerized grading system chapter 4 5
Computerized grading system chapter 4 5Computerized grading system chapter 4 5
Computerized grading system chapter 4 5
 
Online Shopping Cart
Online Shopping CartOnline Shopping Cart
Online Shopping Cart
 
Presentacion
PresentacionPresentacion
Presentacion
 
Hk
HkHk
Hk
 
Bible Verses About Grace
Bible Verses About GraceBible Verses About Grace
Bible Verses About Grace
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Cal Staggers Cool Boats
Cal Staggers Cool BoatsCal Staggers Cool Boats
Cal Staggers Cool Boats
 
カタカナの練習
カタカナの練習カタカナの練習
カタカナの練習
 
одуванчики Галушко
одуванчики Галушкоодуванчики Галушко
одуванчики Галушко
 
U.S. Top Traffic Cities
U.S. Top Traffic Cities U.S. Top Traffic Cities
U.S. Top Traffic Cities
 
Bab 1
Bab 1Bab 1
Bab 1
 
Spice Tour
Spice TourSpice Tour
Spice Tour
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
операційні системи
операційні системиопераційні системи
операційні системи
 
RLAS116 test
RLAS116 testRLAS116 test
RLAS116 test
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
ILANTUS Password Express FAQs
ILANTUS Password Express FAQsILANTUS Password Express FAQs
ILANTUS Password Express FAQs
 

Similar to How to protect your computer from viruses.

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
EchelleOgatis
 

Similar to How to protect your computer from viruses. (20)

Sowmya
SowmyaSowmya
Sowmya
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Virus
VirusVirus
Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Antivirus
AntivirusAntivirus
Antivirus
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

How to protect your computer from viruses.

  • 2.        Introduction. Threats to watch out for. Signs that you are corrupted. How to bar them if you have been corrupted. How not to get corrupted in your every day access to the pc. Conclusion. How to keep your computer running smoothly.
  • 3. INDEX   If you own a computer that has access to the Internet and e-mail, then it is certain that you will be a victim to malicious spyware, malware, viruses, worms, or hackers. Every day thousands of users report problems with their computer and are wasting money trying to fix the issue not knowing that they can do it alone, safely and freely. The information in this Guide will not only educate you as to why you are experiencing these problems, but also what you have to do in order to avoid experiencing these problems.
  • 5. INDEX   Spyware is Internet jargon for hidden programs advertisers install on your PC without your permission to spy on you, gather information, and report this information about you and your online activities to some outside person. Spyware is not harmless, it can be responsible for delivering a boatload of spam, altering your web browser, slowing down your PC, and serving up a bounty of pop-up ads. In some of the more extreme cases, spyware can also steal your identity, passwords, e-mail address book, and even use your PC for illegal activities.
  • 6. INDEX   Malware is short for malicious software and represents all programs, viruses, Trojans, and worms that have malicious intent to damage or disrupt a system. Malware is harder to remove and will fight back when you try to clean it from your system. In some extreme cases, you will have to completely wipe out all the information on the computers hard disk and re-install the operating system. Among other things, a malware infection can corrupt your files, alter or delete data, distribute confidential information such as bank accounts, credit cards, and other personal data, disable hardware, prevent you from using your computer, and cause a hard drive to crash. Frequently, malware is also designed to send itself from your e-mail account to all the friends and colleagues in your address book without your knowledge or consent.
  • 7. INDEX   Hackers are computer programmers turned evil. They are the people who design the spyware and malware programs that attack your computer. Some of them have criminal intent and use these programs to steal money from individuals and companies. Some have a grudge against the big software vendors (like Microsoft) and seek to harm them by attacking their customers (you). Others do it purely for fun. Whatever the reason, hackers are getting more intelligent and sophisticated in their ability to access computer systems and networks.
  • 8. INDEX      You are starting to get swamped with pop-up ads that come from nowhere and continiously interrupt your use of the computer. Your computer is unstable, sluggish, locks up, crashes or deletes files on its own frequently. Your web browser’s home page changes on its own and you cannot modify the settings. Also you might see some toolbars that you never installed. Mysterious files suddenly appear. A second or a third we browser is popping up when u open your browser instantly and you can’t prevent it.
  • 9.    Method:1 Scanning Method:2 System Restore Method:3 Clean Install INDEX
  • 10. INDEX    There are thousands of different programs out there in the anti-spyware/malware/virus, many of which are free. The most important thing to remember is that these programs will not find and remove the same viruses and not of them are 100% sure to delete all of them. Imagine yourself scanning your computer and finding viruses, then you try and remove them with your antivirus program. But your computer is still suffering from them and you are forced to scan with another program, which enables you to find more of them. However, you do not want to stack tons of virus removal programs on top of each other. Doing so can actually throw off effectiveness. One good antivirus scanner should be enough.
  • 11.
  • 12.     System restores are a good way to get rid of light malware and spyware programs. They require no downloading of any software and can be performed directly by Windows. System restores work best if you catch the intrusion right away. But, you do not want to do a system restore if you believe that you have had malware, spyware, or viruses on your computer for any significant amount of time. This could cause you to lose files, applications, or data. To do a system restore in Windows, navigate to the control panel using the path Start > Control Panel. Click the Recovery icon located within the Control Panel and hit the Open System Restore button on the next screen. The rest of the process is very straightforward as the Windows Wizard will guide your through it. INDEX
  • 13.
  • 14.   A clean install is not the most fun thing to do. However, a clean install is the one guaranteed way to get rid of viruses, spyware, and malware. It’s simple… when you do a clean install, you are deleting everything on your hard drive. Thus, no more viruses. Most of the time, viruses will not infect items like pictures, text documents, videos, or MP3 files. If step 2 (scan), is not working for you, more than likely the virus is in your computer’s registry. This is good because you can backup all of your pictures, documents, etc… before doing the clean install. That way you will not lose anything important. INDEX
  • 15.
  • 16.      Step 1 Step 2 Step 3 Step 4 Step 5 INDEX
  • 17. BACK   Keep an up-to-date anti-virus software running at all times. This is one of the most if not THE most important thing to do, because you will need it to scan for viruses and be able to remove them.
  • 18. BACK   PREVIOUS Don’t use internet explorer anymore. Just recently, hackers have figured out a way to access and download malicious programs to your computer by using a security hole in Internet Explorer. What is extraordinary about this is that you don’t even have to click on anything or download a program to get infected. You are especially vulnerable if you have an older version of Windows such as Windows 98.
  • 19. BACK  PREVIOUS Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure it to launch other programs such as NotePad or WordPad instead. This way the macro virus won’t spread on your computer. Therefore it is something you definitely want to do.
  • 20. BACK   PREVIOUS Never open suspicious e-mails. Most of the viruses are attached to an e-mail, so if you see one delete it immediately.
  • 21. BACK   PREVIOUS Stop using peer to peer file sharing and don’t ever download programs that look nice. Think of it like cyber candy. Hackers use these cute and funny programs as bait in order to get you to download their destructive programs. These are guaranteed ways of getting hit by malicious viruses, spyware, and malware. Also, peer to peer file sharing sites are mine fields of malicious programs. Don’t ever think of accessing those sites or download the programs that runs them.
  • 22. INDEX   All in all computer viruses are a very common enemy on our every day life but we can prevent them from reaching us or remove them if we have already been corrupted. There are many different things we can do about it but the core procedure is in this guide, but if what is written here doesn’t work for you then the best thing you can do before asking an expert is search in the internet, because there you can find all the answers you need.
  • 24. BACK   Do a clean up every month. This is very important, because there are many files that fill your hard disk and if they become superfluous then they will slow down your computer.
  • 25. BACK   PREVIOUS Defragment the hard drive. Defragmenting your hard drive makes it easier for your computer to complete actions in a faster way.
  • 26. BACK   PREVIOUS Uninstall the programs you don’t use. It is just silly to keep programs you don’t use in your computer because they fill your hard drive and make your computer slower.
  • 27. BACK   PREVIOUS Delete cookies from the browsers. Clear your cache after you sign off. These files are just unnecessary, take up memory, and can allow spyware to invade your computer.
  • 28. BACK   PREVIOUS Format. If nothing else works you should really consider formating your computer, but before you do it make sure you have already backed up your files.