Restore computer when infected with Trojan or Virus
Trojan or Virus can happen to anyone. Considering the large number of viruses and Trojans available on the Internet at some point it is unthinkable for anyone. Late perception suggests you can do a better job of protecting yourself, but that can only help you a little in your current predicament. When you know that your computer has been infected with a Trojan or virus, what should you do?
If you know that specific malicious programs have compromised your computer, you can visit some antivirus sites and download a tool to remove them. However, here you will not be able to recognize any specific software. Unfortunately, your options are limited, but if you follow the instructions provided by QuanTriMang.com below, you can protect your computer and files.
1. Call IT support
If you have an IT support unit, tell them immediately and follow their instructions.
2. Disconnect your computer from the Internet
Depending on the type of Trojan horse or virus that attacks your computer that an intruder may have access to your personal information and may use your computer to attack other computers. You can stop this activity by turning off Internet access. The best way to do this is to cancel the physical connection using a cable or telephone line, but you can also simply disable your network connection in other ways.
3. Copy important files
At this point, you need to take some time to copy your files, this is a good idea at this time. If possible, you should copy all photos, documents, Internet favorites . and create them on a CD or save them in other external storage devices such as USB. Remember that these files will not be trusted when they are infected.
4. Install an antivirus program and scan your computer
Since your computer is infected with a dangerous program that you do not know. The safest method is to install an antivirus program from a safe source such as a CD-ROM. You will have to visit a nearby computer store or storage device to purchase the software. There are many options but all of them should need to provide you with the necessary tools.
After you install the software, scan your entire computer. At first scan you will be excited to find dangerous programs. Ideally, an antivirus program will remove these dangerous files from your computer.
If this program succeeds in removing dangerous files or locating them, you can follow the precautionary steps in Step 7 (listed below) to prevent other threats. In the unlikely event that anti-virus programs do not locate and remove dangerous files, you should follow the instructions in the next steps.
5. Reinstall the operating system
If the previous steps do not work for your computer, then you only need to reinstall the operating system. Although this action will lose all programs and files, it is a good way to make sure your computer is free from behind threats and intruders' changes to your computer. . Before performing the reinstallation, you must be aware that all programs and settings so you can return to the computer as originally.
It is also necessary to reinstall antivirus software and apply any patches that are available. Look for previous articles by QuanTriMang that show you the '10 steps to protect your PC before connecting to the Internet' for more support.
6. Return the files
ZoneAlarm software
If you make a CD in step 3, you can now return your files. Before placing these files on your computer you should scan them with safe anti-virus software to make sure they are not infected when returned to your computer.
7. Protect the computer
To prevent future hazards, you should follow the following precautions:
-
Do not open attachments of unknown origin in emai.
-
Do not access links of unknown origin
-
Regularly update antivirus software
-
Use a firewall (You can turn on the firewall available in Windows or use free software like ZoneAlarm).
-
Update the Windows patches constantly by visiting http://windowsupdate.microsoft.com
- Simple ways to never get the virus
- Who created the first computer virus?
- Appeared Trojan Horse virus attacks Mac computers
- The first horse infected with the deadly virus Lyssa
- The Trojan impersonates software that activates Windows
- What is a virus? How is the virus infected?
- 10 most dangerous viruses of all time
- Apple fake Trojan sales announcement
- The Trojan said the sentence ...
- Sophisticated spam Trojan unmatched
- What to do when the computer is poisoned
- Computer virus: Looking back 20 years