There are different types of computer virus, but this type can be considered the most dangerous computer virus. Win32/Sality.AT is a malware which deletes everything it finds, by turning it into a shortcut file. It infects everything, even files stored on USB or external Hard Drives that came in touch with the computer and if you connect them (the external Hard drive and USB) to another computer and open one of the shortcut (malware-infected) files, you will infect that computer as well.
The best way to get rid of this infection is via Safe Mode (click here to learn how to boot into safe mode), while all the pieces of software are "asleep."
Once you are in Safe Mode, follow the steps below:
Viruses are designed to deprive you of the pleasure to browse the net and download files quickly and nowadays it is difficult to tell which is the worst computer virus. The solution is to remove them; however, there are some viruses which may incapacitate your antivirus and prevent it from operating normally. If you try reinstalling it or install a different one, the result will be the same.
If you wonder how to get rid of a virus on your computer, you need to access the safe mode (so that the virus remains inactive). If don't know how to get into Safe Mode, check the don't know how to boot in Safe Mode guide to find out.
Once you're in safe mode:
Considered to be the worst computer virus, ransomware is a type of malware that restricts the users' access to the computer and forces the users to pay a "ransom" to the operators of the malware in order to remove the restriction. Although very rare to get, it can sometimes cause data loss (you will have to reinstall Windows, and the "C:" drive will be wiped). It can also prevent you from accessing Windows, encrypt files so you can't use them, stop certain software from running (e.g the web browser) make you complete surveys and etc.
The best way to remove it, is by installing an anti-malware software such as Malwarebytes' Anti-Malware, through Safe Mode.
If you don't know how to get into safe mode, check out these solutions.
Note: If you already had an antivirus (anti-malware) installed, remove it in the control panel. If you don't know how to uninstall a program, check out these solutions.
Also, DO NOT PAY THE "FINE", Because there is no guarantee that the ransomware will be removed from your computer.
To define computer spyware: it is a piece of software designed to steal personal data (especially credit card numbers, account passwords etc.), without your knowledge.
How do you get spyware on your computer? There are many ways for spywares to invade your computer, such as: visiting websites like "Enter our site and win an Iphone" or "Click here to download ..."(any software which is not free). This means that spywares are harmful only if you have access to the internet. Once they invade your computer they store everything you write and periodically send it to the creator of the spyware who most often "unloads" your credit card.
How to detect spyware on computer? The best way to detect and fight against them is to install an antivirus, antimalware or an antispyware software. Malwarebytes' Anti-Malware (for Windows and Mac OS) and SuperAntiSpyware (for Windows only) are known to protect many computers from being invaded by spywares. Install one of them and run periodic scans.
Note: If you use a computer and you have sensitive data stored on it, it would be better to buy the full version of one of these softwares (also called Internet security). It will run full scans in the background and the wait time will be shorter.
A botnet is a network consisting of hacked computers that are infected by malware and controlled by the botnet owner without the computer owner’s consent and knowledge.
The bots can be used to launch DDoS attacks that can cause a website to go offline, send spam messages, drive fake traffic, click advertisements and much more, depending on the botnet owner. Normally the user won’t even notice that their computer is a zombie bot being controlled because the malware is programmed to stay hidden as long as possible, by bypassing both known antivirus or firewall software and does not damage nor change any part of the operating system that may trigger the owner’s suspicion.
The best way to remove a Zombie/Bot malware infection is through Safe Mode. To get into Safe Mode:
Remember: The answer to the "how to protect computer from virus" question is not visiting suspicious websites at all.
Phishing email messages, links, or phone calls are another way for a virus to find its way to your computer. You are asked to provide your credit card number, log in to Facebook (or other social network) through the email and etc.
The best way to protect yourself from phishing emails, and the best mobile device or computer virus protection in general, is to avoid opening them and READ THE TITLE CAREFULLY. So, if you notice an email that has a suspicious title and is sent from a suspicious email address, don't open it. Usually suspicious mails are directed to the Junk folder and valid emails are shown in the regular Inbox folder. However, there are some cases where valid emails are shown in the junk folder.
Also, ignore emails that inform you that you've won a contest or emails from a stranger asking for assistance with their inheritance.
Note: If you are not sure how to recognise a phishing email, read this tutorial. If you are still not able to recognise a phishing email, consider installing an antivirus software which will delete phishing emails automatically.
If you are not sure which antivirus software to install, check out the don't know which antivirus software to install solutions.
If you wonder how to protect computer from virus, you may take advantage of the Firewall. The OS (Operating System) Firewall is designed to protect you from the attacks of hackers. It can also stop your computer from sending malicious software to other computers. That is why, it is very important to have it activated all the time. By activating the firewall you will minimize the chances for hackers to find a bug in your computer.
To activate it:
- Windows:
Start -> Control Panel -> Windows Firewall (or type 'Firewall' in the search box) -> click Turn Windows Firewall on or off in the left pane -> Click Turn on Windows Firewall under each network location that you want to help protect, and apply the changes.
- MacOS:
Apple menu -> System Preferences -> Security -> Firewall -> Choose what mode you would like the Firewall to use
Apple menu -> System Preferences -> Security (or Security & Privacy) -> Click the Firewall tab -> Unlock the pane by clicking the lock in the lower-left corner and enter the administrator username and password -> Turn On Firewall (or Start) -> Click Advanced to customize the firewall configuration
Note: Some antiviruses have their own Firewall that will substitute the default Windows Firewall once they are installed (You will be notified by the Antivirus software). Do not enable the default Windows Firewall in those situations.
A Backdoor Trojan is a malicious software that usually finds a way into its victim's computers without their knowledge or consent, through websites, software and etc. It allows the software developer that created it to control the computer of the victim and steal sensitive data.
To delete a Backdoor Trojan, and every trojan computer virus, you need an antivirus software and free time. Malwarebytes' Anti-Malware is one of the best for the task. The best way to remove a Backdoor Trojan is through safe mode:
Boot your computer in safe mode and once it is in safe mode, install a fresh copy of Malwarebytes Anti-Malware (or other antivirus software) and run a FULL scan, to ensure that everything is scanned thoroughly. Once the Trojan is deleted, restart your computer.
Note: If you are not sure how to enter the safe mode, feel free to consult the don't know how to boot in Safe Mode guide.
Before you install a piece of software, be sure to read the End User License Agreement, or EULA. It contains information on how this software interacts with your computer (or mobile device) and use your private information. If you find that a particular software is using your personal data or tracking your computer (or mobile device), then it is up to you to determine whether you really want to install the software.
If you don’t receive the email in the next 2 minutes please check your junk folder, and add [email protected] to your safe sender list.