A overview of basic steps to clean computers from most spyware infections. Even though spyware is mutating at a tremendous rate, this strategy of attack will remain viable for quite some time, although some of the minor details will change slightly.
Despite top of the line antivirus and antispyware protections in place, the spyware creators are still able to create items that get through the filters and cause infections. (But that’s not what this article is about). The most common methods of infection are still infected attachments to emails and “drive-by” hits from websites while browsing the Internet. (But that’s not what this article is about either). Having watched the evolution of some of these infections over the past couple of years, I’ve found a couple of tricks that work on many of these infections. That’s what this article is about: revealing a plan of attack that can eliminate most of these spyware infections.
First, the tools you will need:
That’s all you need. Go ahead and collect them. I’ll be here when you get back.
I didn’t mention that you also need an infected computer to clean, but I took a guess that you knew that already. Depending on the severity of the infection, you have several steps. I’m going to start with the simplest solution, and then get more difficult. Before you get started, keep in mind that spyware evolves all the time and what works now may not work in 6 months, but the basic strategy outlined below should be effective for the foreseeable future. Finally, although I offer these steps as a possible method for cleaning the spyware, keep in mind that it is still your computer. I take no responsibility for any damage caused by the spyware infection or your attempts to clean it up.
Scenario 1 – Computer still works, even though infected.
If you can get to a desktop and run programs, you can often clean the computer before it gets more severely infected.
Scenario 2 – Normal boot doesn’t work, the Internet is blocked, or you can’t run programs
Quite often these days, the infection will block your access to your desktop, or prevent programs from running, or reconfigure your Internet settings so that you can’t successfully run the spyware removal tools. Booting to safe mode quite often prevents the spyware from blocking you.
Scenario 3 – Safe Mode isn’t working
The trickiest solution is when the infection has blocked your access to the desktop in safe mode. In this case we have to reset a couple of registry settings to re-enable access to the desktop for safe mode to work. WARNING! This routine involves modifying the registry.
Because Windows always checks that registry key when it boots, it will now use the built in Explorer you are used to using, allowing you to proceed with the rest of your cleanup without too much difficulty.
If none of these techniques work, you can always check back with us to see if new techniques have been developed.
Tailoring Your IT Solution to Your Business
An IT professional will help you to find out which program really suits your company, how to integrate it into the day-to-day running of your business and develop an IT solution to make your working life easier, more secure and more up-to-date.Outsourcing IT rather than having it in-house
Outsourcing your IT department is a cheaper option providing 24x7 computer consulting and computer support so that you can concentrate on growing your business.Network Security – As Important As Your Client Base
As technologies improve, so the security threats also become more sophisticated. More than ever before, the security of our network is paramount to keeping of your customers protected.