I Need a Virus Removed

Viruses are one of the most lethal threats to any computer. Here are some viruses to look for:

Trojan Horse

A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly, the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but will cause damage or compromise the security of the computer. A Trojan Horse must be sent by someone, or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user; including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worms

A worm is a program that makes and facilitates the distribution of copies of itself from one disk drive to another or by copying itself using email or another transport mechanism. The worm may damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

Boot-sector Virus

A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot-up. These are normally spread by floppy disks.

Macro Virus

Macro viruses are viruses that use another application’s macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

Memory Resident Viruses

Memory Resident Viruses live in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and stays in the computer’s memory after its initiating program closes.

Root-kit Virus

A root-kit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term root-kit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files.

Polymorphic Viruses

A polymorphic virus not only replicates itself, but it also changes its digital signature every time it replicates. It is difficult for less advanced anti-virus software to detect it.

Logic Bombs/Time Bombs

These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are: a virus which deletes your photos on Halloween, or deletes a database table if a certain employee gets fired.

Basic virus removal is $125. A charge of $75 per hour will be applied depending on services required.

Some of the Actions USDSC Might Take:

  • If symptoms indicate internet connectivity issues:

    Make sure all wires are appropriately connected. Go to device manager and make sure internet connectivity devices are working. Verify appropriate IP settings. Verify appropriate router settings. Run router Diagnose and Repair to attempt to pinpoint problem, as it may be an Internet Service Provider issue. Power down computer, power down router, power down modem. Power up modem, power up router, power up computer. Rerun Diagnose and Repair. Contact the Internet Service Provider if necessary.

  • If symptoms indicate virus, malware, or spyware problems:

    If problems are severe, operate in safe-mode. Otherwise, boot normally. Install the USDSC security suite, which includes: Microsoft Security Essentials, Malwarebytes, SpybotSearchandDestroy. (make sure these programs are updated) If these programs can not completely eradicate the problem, search online for previously found solutions. If all else fails, then a OS re-install may be necessary.

  • If symptoms require OS re-installation

    If possible, back up all data. Check the hard drive for a factory reset image. If present, restore and replace the backed up data (if available) and move along to system optimization. If there is no factory reset image acquire the appropriate OS install disc from either the client or the USDSC CD book. Insert the disc and enter advanced boot options (mash F8 or F12 upon system boot). Select from from CD/DVD ROM. Windows will begin loading files, follow on-screen instructions to complete install. If available, replace backed up data.

  • If symptoms call for system optimization:

    After installing an OS or cleaning a system after virus removal follow these steps: Go to Ninite.com and install CCleaner, Adobe suite, Google Chrome (preferred browser), Open Office (if Microsoft office is not available from the client), and 7-zip. Setup and run Window’s automatic updates Uninstall any useless programs (mostly when restoring to a factory image) Ex. Unregistered Norton, McAfee, Company specific programs, (Dell quick start), Google Desktop etc. Use either CC Cleaner or enter into run “MSCONFIG” and remove any unwanted programs from the start up menu. Restart your machine and ensure that the boot time is under 3 minutes. If the machine boots within 3 minutes and there are no visible issues. Run CCleaner to clear cookies, browsing history for browsers and applications. Also scan and resolve any registry issues with the CCleaner registry tool.

USDSC is your best resource when facing a threat to the viability of your machine or server. Competent, caring, and immediately available–USDSC is your answer.