Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How to detect and remove computer viruses?

By Annphilip Subscribe to RSS | March 30th 2012 | Views:

Like cancer to human beings, computer viruses are hazardous to the health of your PC. In this article we will discuss about the different types of computer viruses, methods to detect it, remove it and prevent it from infecting again. Before going into the details, we will try to understand what exactly a virus is?

Computer virus is an executable software program designed with some negative intentions. It can replicate by itself or can spread from one computer to the other. We can measure the levels of infection by checking its destructive nature. When some virus destroys hard disk contents, others interfere with normal functioning of the system. In normal PC’s viruses are getting infected from software programs. While for PC’s connected with Internet, viruses are introduced through downloading of files through FTP or checking anonymous email.

How virus works once it entered into the system?

•Some virus reduce or completely destroy the memory space

•Corrupt data

•Modify data

•Deleting data

•Sending anonymous messages

•Getting anonymous messages

•Interfere with normal functions

Different types of viruses that can be a threat to computer are as follows: -

File virus- As the name indicates this type of virus infect executable files and change the coding. When the original file is opened the malicious code will be executed and the original file becomes inaccessible. Some of the commonly found file viruses are Trojan and Loveletter virus. Files infected by file virus should be deleted before it spread to other files.

Boot sector virus – This type of virus spread mostly through infected floppy disc and hard drives. Sometimes people forget to take floppy disk from the floppy drives. When the system gets started it tries to boot from the floppy disc. Thus the boot sector virus will come into contact with the users local drives. The common messages that appear after getting infected with boot sector virus are “disk error” or “replace the disc”

Macro virus- Like other viruses, macro viruses do not infect programs. Most of the macro virus infects Microsoft word or related applications and perform a sequence of actions. Macro virus has the ability to perform actions in an automatic sequence. Compared to other viruses, macro viruses are relatively harmless. Melissa virus is a widely known macro virus. This virus infected documents by spreading through an e-mail attachment.

Virus Hoax – This virus spread as a false warning about a computer virus. Most of the warnings arrive as an email message or as a text message within the internal network of a company. Antivirus specialists are recommending people to delete messages related to virus hoax.

Now we will discuss about ways to protect your computer against viruses. To protect your computer from different types of viruses so many Virus Removal Assistance programs or software are available in shops. Most of the technologically advanced people set firewall on their system. Firewall is nothing but a barrier against destructive forces like offensive web sites and hackers.

Some other virus removal tools widely used by people across the world are Kaspersky Antivirus, Norton Antivirus, McAfee and AVG. most of these antivirus applications has the ability to map your wireless network and safeguard your Wi-Fi networks. Whenever we start our system, these antivirus applications start scanning files and folders. When they find a virus, spyware or malware they will alert us. Some virus detecting tolls also give identity protection by providing anti-banking and anti-phishing filters.

If you don’t have an antivirus program, then your risk related to computer virus infection is really high. If you don’t want to lose your valuable and personal data, get one virus removal tool as early as possible. You can also opt for an online virus removal tool.

Annphilip - About Author:
Ann is a freelancer. She is interested in writing about different computer applications and its pros and cons. As a regular user of Internet, she is using Virus Removal Assistance to stay away from viruses.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:

Related Computer Articles Subscribe to RSS

Diagnose and maintain your computer with Computer Services
Published by Wills Loren on February 8th 2012 | Computer We provide Computer services most event planners have something directly to them, ...
Nieuwe computer koopbeslissing
Published by Johnwright on April 26th 2012 | Computer
Deze kan heel overweldigend voor een nieuwe of eerste keer dat de computer kopen met weinig ervaring...
A2ZPC— a reliable name in computer repair services
Published by Meghnath Kumar on May 19th 2012 | Computer
After all it’s a machine and excess use might get any kind of electronic machine to stop working i...
Should I fix my computer on my own?
Published by Antonio Matsuoka on April 12th 2012 | Computer
If you are thinking about fixing your computer on your own, I highly recommend giving this article a...
How to detect and remove computer viruses?
Published by Annphilip on March 30th 2012 | Computer
In this article we will discuss about the different types of computer viruses, methods to detect it,...
What happens to my computer after I throw it away?
Published by Antonio Matsuoka on April 14th 2012 | Computer
With ‘being green’ becoming one of the newest trends for companies, most people are bucking the ...
Enroll with TESDA to provide the best computer technical support and services
Published by Carolmoore on February 28th 2012 | Computer
With a rise in the number of computer technicians, the challenge to provide the best computer techni...
Get smart PC help for your computer problems
Published by Micel Anderson on December 21st 2011 | Computer
In order to get rid of the problems of your old PC, always take help of a smart PC help program. Mor...
A wrong click may lead your computer to welcome spywares
Published by IGennie on December 7th 2011 | Computer
Spyware Removal, Internet Security, Fraud Protection, technical support, tech support, antivirus sof...
There are several factors to consider in finding quality computer repair Charlottesville service
Published by Jack on August 19th 2012 | Computer
For both residential and commercial sectors, computers serve a big purpose. Computers are ideal for ...
The benefits and the know-how of remote computer operating:
Published by Heather Protz on March 30th 2012 | Computer
With remote computing, you can operate a system virtually from another computer in an outside locati...
Remote Computer support quintessential for computer business’s success
Published by Paxton on January 2nd 2012 | Computer
This business scope has been identified and judiciously capitalised upon by various remote computer ...
IT support Sydney is professional computer experts
Published by Avena Sowell on April 13th 2012 | Computer
Among the services, that IT support Sydney can give you include data recovery and search engines opt...
Personal computers help London forums for your personal computer
Published by Suphia Smith on April 17th 2012 | Computer
If you are facing problems with your pc, instead of calling a technician immediately take the help o...
A guide to computer support Edinburgh
Published by Mary Porter on June 19th 2012 | Computer
You do not have to be an IT expert to be able to appreciate the importance of comprehensive computer...
How to Fix Registry Problems of your computer
Published by Hennary Joe on January 13th 2012 | Computer
Speed up your PC with the best PC utility program. Speedupmypc is the most updated and successful so...
Different Types of Computer Infections – Protect Your Data from viruses and worms
Published by Jack Kallis on March 30th 2012 | Computer
Get to know about the various computer infections and their forms as well as get aware of the common...
Are you looking for a new Tablet computer?
Published by on June 16th 2012 | Computer
A tablet computer is a portable computer which has the appearance of a large and flat touch screen. ...