logo
g Text Version
Beauty & Self
Books & Music
Career
Computers
Education
Family
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
Money
News & Politics
Relationships
Religion & Spirituality
Sports
Travel & Culture
TV & Movies

dailyclick
Bored? Games!
Nutrition
Postcards
Take a Quiz
Rate My Photo

new
Creativity
Family Travel
Southwest USA
Irish Culture
Home Finance
Comedy Movies
Romance Novels


dailyclick
All times in EST

Full Schedule
g
g Virus and Spam Site

BellaOnline's Virus and Spam Editor

g

Internet Security Virus Detection and Removal


Recently, I have had a rash of clients with the same problem: a phony anti-virus program taking over their PCs. As a computer technician, I know that these phony programs can do a lot of damage. As a computer user, I also have to be extremely wary of what sites I visit and what I download to prevent system infection.

The truth is, anyone can be fooled.

Fake AV programs can wreak much havoc on your computer. The results range from annoying pop-ups to a complete shutdown of your system. As I always say, the best way to keep your PC safe is to avoid malware in the first place, but that isnít always possible. So what can you do if you are infected with a virus masking itself as a helpful AV program? Letís consider a current annoyance and how to remove it.

Rogue Name: Internet Security, Internet Security 2010, Internet Security 2011

Icons: A tell-tale orange ball may appear in your task bar or on your desktop. It looks similar to a small orange sun or planet.

Symptoms Include: Simply logging onto your computer begins the drama. Urgent pop-up boxes frighten you into thinking that your computer is in serious trouble. It is actually, but the culprit is the program thatís actually offering you the warning.

Like many other powerful rogues and viruses, this bug will forcibly turn off your Windows Defender program, prevent you from using any legitimate AV programs, and eventually prevent you from accessing the internet at all.

NOTE: Donít bother trying to turn Windows Defender back on Ė this program wonít let you.

The rogue will also insist that you purchase a specific program to ďfixĒ or ďcleanĒ your computer, but donít fall for that! Never enter your personal information, such as a credit card number, and donít click any links.

Recommended Treatment:
WARNING! Follow these step-by-step instructions only if you are at least an intermediate computer user. Attempting to remove a virus if you donít know what youíre doing can make the situation even worse.

  • Your first priority is obviously to shut down that counterfeit AV program. The only way to do that is by manually shutting down the process itself. You can do this through your Task Manager. End the following processes: IS2010.exe, winlogon86.exe, winupdate86.exe and 41.exe. If you canít open Task Manager, try using the handy (and free) tool Rkill, which was created by Bleeping Computer specifically for viruses like this one.
  • Once youíve stopped the virus from running, itís time to remove it. Use free software like Malwarebytes or the AV program of your choice. Once youíve run as thorough and comprehensive a scan as possible, view the files that are being removed to ensure that youíve gotten rid of all traces of the bug.
  • If you are an advanced computer user, there are also more detailed steps to take if the simpler instructions above arenít helpful. The more advanced instructions wonít be included in this article, but can be easily found with a Google search. If none steps still donít remove the rogue, you may need to contact a professional Ė you can always contact me, of course.

    Known locations of infection: Primarily adult websites, some lesser known social networking sites, and a few shopping sites

    Although this rogue can be defeated by taking a few simple steps, like any bug, itís better never to contract it at all. Be wary online, even with familiar sites.
  • Add Internet+Security+Virus+Detection+and+Removal to Twitter Add Internet+Security+Virus+Detection+and+Removal to Facebook Add Internet+Security+Virus+Detection+and+Removal to MySpace Add Internet+Security+Virus+Detection+and+Removal to Del.icio.us Digg Internet+Security+Virus+Detection+and+Removal Add Internet+Security+Virus+Detection+and+Removal to Yahoo My Web Add Internet+Security+Virus+Detection+and+Removal to Google Bookmarks Add Internet+Security+Virus+Detection+and+Removal to Stumbleupon Add Internet+Security+Virus+Detection+and+Removal to Reddit




    RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map


    For FREE email updates, subscribe to the Virus and Spam Newsletter


    Past Issues


    print
    Printer Friendly
    bookmark
    Bookmark
    tell friend
    Tell a Friend
    forum
    Forum
    email
    Email Editor


    Content copyright © 2014 by Rayna H. Battle. All rights reserved.
    This content was written by Rayna H. Battle. If you wish to use this content in any manner, you need written permission. Contact Rayna H. Battle for details.

    g


    g features
    Craiglist Rentals and Spam

    Review Your Transaction for Hacking Prevention

    Private Message From Amber Sebastian Is Spam!

    Archives | Site Map

    forum
    Forum
    email
    Contact

    Past Issues
    memberscenter


    vote
    Poetry
    Daily
    Weekly
    Monthly
    Less than Monthly



    BellaOnline on Facebook
    g


    | About BellaOnline | Privacy Policy | Advertising | Become an Editor |
    Website copyright © 2014 Minerva WebWorks LLC. All rights reserved.


    BellaOnline Editor