g Text Version
Beauty & Self
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies

Bored? Games!
Take a Quiz
Rate My Photo

Natural Living
Folklore and Mythology
Distance Learning

All times in EST

Low Carb: 8:00 PM

Full Schedule
g Virus and Spam Site

BellaOnline's Virus and Spam Editor


Internet Security Virus Detection and Removal

Guest Author - Rayna H. Battle

Recently, I have had a rash of clients with the same problem: a phony anti-virus program taking over their PCs. As a computer technician, I know that these phony programs can do a lot of damage. As a computer user, I also have to be extremely wary of what sites I visit and what I download to prevent system infection.

The truth is, anyone can be fooled.

Fake AV programs can wreak much havoc on your computer. The results range from annoying pop-ups to a complete shutdown of your system. As I always say, the best way to keep your PC safe is to avoid malware in the first place, but that isnít always possible. So what can you do if you are infected with a virus masking itself as a helpful AV program? Letís consider a current annoyance and how to remove it.

Rogue Name: Internet Security, Internet Security 2010, Internet Security 2011

Icons: A tell-tale orange ball may appear in your task bar or on your desktop. It looks similar to a small orange sun or planet.

Symptoms Include: Simply logging onto your computer begins the drama. Urgent pop-up boxes frighten you into thinking that your computer is in serious trouble. It is actually, but the culprit is the program thatís actually offering you the warning.

Like many other powerful rogues and viruses, this bug will forcibly turn off your Windows Defender program, prevent you from using any legitimate AV programs, and eventually prevent you from accessing the internet at all.

NOTE: Donít bother trying to turn Windows Defender back on Ė this program wonít let you.

The rogue will also insist that you purchase a specific program to ďfixĒ or ďcleanĒ your computer, but donít fall for that! Never enter your personal information, such as a credit card number, and donít click any links.

Recommended Treatment:
WARNING! Follow these step-by-step instructions only if you are at least an intermediate computer user. Attempting to remove a virus if you donít know what youíre doing can make the situation even worse.

  • Your first priority is obviously to shut down that counterfeit AV program. The only way to do that is by manually shutting down the process itself. You can do this through your Task Manager. End the following processes: IS2010.exe, winlogon86.exe, winupdate86.exe and 41.exe. If you canít open Task Manager, try using the handy (and free) tool Rkill, which was created by Bleeping Computer specifically for viruses like this one.
  • Once youíve stopped the virus from running, itís time to remove it. Use free software like Malwarebytes or the AV program of your choice. Once youíve run as thorough and comprehensive a scan as possible, view the files that are being removed to ensure that youíve gotten rid of all traces of the bug.
  • If you are an advanced computer user, there are also more detailed steps to take if the simpler instructions above arenít helpful. The more advanced instructions wonít be included in this article, but can be easily found with a Google search. If none steps still donít remove the rogue, you may need to contact a professional Ė you can always contact me, of course.

    Known locations of infection: Primarily adult websites, some lesser known social networking sites, and a few shopping sites

    Although this rogue can be defeated by taking a few simple steps, like any bug, itís better never to contract it at all. Be wary online, even with familiar sites.
  • This site needs an editor - click to learn more!

    Add Internet+Security+Virus+Detection+and+Removal to Twitter Add Internet+Security+Virus+Detection+and+Removal to Facebook Add Internet+Security+Virus+Detection+and+Removal to MySpace Add Internet+Security+Virus+Detection+and+Removal to Del.icio.us Digg Internet+Security+Virus+Detection+and+Removal Add Internet+Security+Virus+Detection+and+Removal to Yahoo My Web Add Internet+Security+Virus+Detection+and+Removal to Google Bookmarks Add Internet+Security+Virus+Detection+and+Removal to Stumbleupon Add Internet+Security+Virus+Detection+and+Removal to Reddit

    RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map

    For FREE email updates, subscribe to the Virus and Spam Newsletter

    Past Issues

    Printer Friendly
    tell friend
    Tell a Friend
    Email Editor

    Content copyright © 2015 by Rayna H. Battle. All rights reserved.
    This content was written by Rayna H. Battle. If you wish to use this content in any manner, you need written permission. Contact BellaOnline Administration for details.


    g features
    Craiglist Rentals and Spam

    Review Your Transaction for Hacking Prevention

    Private Message From Amber Sebastian Is Spam!

    Archives | Site Map


    Past Issues

    Less than Monthly

    BellaOnline on Facebook

    | About BellaOnline | Privacy Policy | Advertising | Become an Editor |
    Website copyright © 2016 Minerva WebWorks LLC. All rights reserved.

    BellaOnline Editor