How to Combat The Virus / Malware


Under these authors convey simple tips and tricks in the Computer Virus Eradication. Ever annoyed that meet malware (virus / trojan / worm) that can not be eradicated with AntiVirus AntiVirus famous-even?

Probably most computer users never experienced it, but according to the authors observed over the years, more computer users are unaware of the existence of malware (virus / trojan / worm) in the engine computer, especially trojans entering through the 'door' behind computer users, or viruses that are not too dangerous, in which the presence and action has little impact on the overall computer system.
When Your computer's operating system is Windows OS, aka a million people, some times you may be very difficult to see malware that can not be removed even on Normal Windows environment due to the virus have been settled (resident) in memory of your computer.

So what's the solution? Below are options you can choose the solution according to desire / need your:
Remove malware from Safe Mode in Windows environment with the 'equipment war' liking you, for example ANSAV.EXE or Anti-Virus-Buatanku.exe.

   1. Manually, try to turn off suspicious services running are unfamiliar to you and if you do not need to through MMC - service.msc or through the service configuration in the Windows Control Panel.
   2. If No. 1 above fails, that means the malware remain resident in memory even though the Windows in Safe Mode circumstances even as the effort of the creator of the virus to complicate the process pembasmiannya, then you can do that malware eradication manually without any tool support. For pembasmiannya device, you can create repair.inf files and / or REPAIR.REG own to remove and / or restore registry settings modified by viruses, of course by adjusting the pattern of attacks by viruses, making the content of the file repair.inf nor REPAIR.REG be different in each case a virus attack. For this, you can learn to eradication of the virus manually from vaksin.com or from sites or a trusted computer security from computer security e-books. Your hard work is required in learning the ins and outs of malware (existence, the pattern of life, attack patterns, and habits) and of the computer operating system itself, especially the hierarchy in the Windows System and the hierarchy in the Windows Registry, as well as the ins and outs of the software that The most frequently used by the general public that is often used by virus makers to launch its action through social engineering techniques like forgery virus icon with an icon of Microsoft Word, etc.. That way, the expected skills and your feeling will become more honed and Threats sensitive to the presence of such a virus / trojan / worm on your computer or your network computer.
   3. Use the Live-CD as a means to combat malware manually. You can use a Linux Live-CD or the Windows Live-CD. (Highly recommended)
   4. Create own Live-CD with Bart's PE Builder application (Bart's PE Builder is used to create a bootable Window CD-Rom/DVD Windows XP or Windows Server 2003) or you can Create Bootable USB Flash Disk with such tools Flashboot (FlashBoot is a tool to create Bootable USB Flash Disks) or other similar applications with the integration of your favorite Portable AntiVirus or made your own (highly recommended)
   5. When not using the Live-CD, you can try using Portable Anti Virus that you copy (burn) on CD or have provided vendor that has been integrating Flash Disk Portable Anti Virus, or where none exists, you can use your U3 Smart Drive where can install Portable U3 Portable AntiVirus in it. In the usual Flash Disk, you can try to install the application from portableapps.com (recommended)
   6. If your computer BIOS has to allow computer Boot from USB Removable Flash Disk Drives kind, you can use your USB Flash Disk as a Bootable Media, which also have you make as a medium for AutoRun / Non-Autorun Portable Anti Virus (recommended).
   7. You also can use the help of another computer that is free of viruses and diseases that already have a trusted Anti-Virus installation and up-to-date. Technically, you loose a virus infected computer hard drive, then connect with the auxiliary computer hard drive slot (can be as a master or slave), the last living you scan an infected hard drive by using the Anti Virus from computer aide, the other way, you do not need trouble removing the hard drive is infected with a virus, but you live scan of the computer assistant through a computer network connection. The most simple you use the technique of Cross-Link (2 PC via cable connection). But you have to be careful when using a computer network, because many viruses are not only attacking a single (stand-alone) PC units only, but at the same computer network around it.

Note:

    * Digital Media Discs such as CD + R / DVD + R more authors recommend to be used as a means of eradication of the virus rather than a USB Flash Disk is because CD + R / DVD + R is Read-Only, so the virus can not delete / rename all the data in it .
    * To avoid blocking the application by the virus Anti Virus attacker, before burning (burning) Portable Anti-Virus to the media CD + R / DVD + R, make sure you have to rename the executable files Anti-virus is for example: ANSAV.EXE be 4N54V ~ ~. EXE .
    * Turn off System Restore first
    * Decide on the relationship with the Internet and will be improved also with the network (if the computer got a virus which is in a computer network)
    * When the Master File Viruses can be stopped its activity and / turned off, you can simply remove the children the virus breeding results of the parent virus is already on the orphan status.
    * Once the virus can be eradicated, Backup System Files Do not forget you and the entire database on your Windows Registry (Export All Keys into the big single. REG files). If necessary, the total file protection registry backups with compression and password. You can restore the file if one registry in Windows when you encounter data corruption.


 
© 2011 Kodok Bule | Except as noted, this content is licensed under Creative Commons Attribution 2.5.
For details and restrictions, see the Content License | Recode by Mr.Kodok Bule | Based on Android Developers Blog