g
Printer Friendly Version

editor  
BellaOnline's Virus and Spam Editor
 

Internet Security Virus Detection and Removal

Recently, I have had a rash of clients with the same problem: a phony anti-virus program taking over their PCs. As a computer technician, I know that these phony programs can do a lot of damage. As a computer user, I also have to be extremely wary of what sites I visit and what I download to prevent system infection.

The truth is, anyone can be fooled.

Fake AV programs can wreak much havoc on your computer. The results range from annoying pop-ups to a complete shutdown of your system. As I always say, the best way to keep your PC safe is to avoid malware in the first place, but that isnít always possible. So what can you do if you are infected with a virus masking itself as a helpful AV program? Letís consider a current annoyance and how to remove it.

Rogue Name: Internet Security, Internet Security 2010, Internet Security 2011

Icons: A tell-tale orange ball may appear in your task bar or on your desktop. It looks similar to a small orange sun or planet.

Symptoms Include: Simply logging onto your computer begins the drama. Urgent pop-up boxes frighten you into thinking that your computer is in serious trouble. It is actually, but the culprit is the program thatís actually offering you the warning.

Like many other powerful rogues and viruses, this bug will forcibly turn off your Windows Defender program, prevent you from using any legitimate AV programs, and eventually prevent you from accessing the internet at all.

NOTE: Donít bother trying to turn Windows Defender back on Ė this program wonít let you.

The rogue will also insist that you purchase a specific program to ďfixĒ or ďcleanĒ your computer, but donít fall for that! Never enter your personal information, such as a credit card number, and donít click any links.

Recommended Treatment:
WARNING! Follow these step-by-step instructions only if you are at least an intermediate computer user. Attempting to remove a virus if you donít know what youíre doing can make the situation even worse.

  • Your first priority is obviously to shut down that counterfeit AV program. The only way to do that is by manually shutting down the process itself. You can do this through your Task Manager. End the following processes: IS2010.exe, winlogon86.exe, winupdate86.exe and 41.exe. If you canít open Task Manager, try using the handy (and free) tool Rkill, which was created by Bleeping Computer specifically for viruses like this one.
  • Once youíve stopped the virus from running, itís time to remove it. Use free software like Malwarebytes or the AV program of your choice. Once youíve run as thorough and comprehensive a scan as possible, view the files that are being removed to ensure that youíve gotten rid of all traces of the bug.
  • If you are an advanced computer user, there are also more detailed steps to take if the simpler instructions above arenít helpful. The more advanced instructions wonít be included in this article, but can be easily found with a Google search. If none steps still donít remove the rogue, you may need to contact a professional Ė you can always contact me, of course.

    Known locations of infection: Primarily adult websites, some lesser known social networking sites, and a few shopping sites

    Although this rogue can be defeated by taking a few simple steps, like any bug, itís better never to contract it at all. Be wary online, even with familiar sites.
  • Virus and Spam Site @ BellaOnline
    View This Article in Regular Layout

    Content copyright © 2013 by Rayna H. Battle. All rights reserved.
    This content was written by Rayna H. Battle. If you wish to use this content in any manner, you need written permission. Contact Rayna H. Battle for details.



    | About BellaOnline | Privacy Policy | Advertising | Become an Editor |
    Website copyright © 2013 Minerva WebWorks LLC. All rights reserved.


    BellaOnline Editor