ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Malware and Spyware Removal Guides - Prevent, Identify and Remove

Updated on November 9, 2013
Source

Anti-Virus vs Anti-Spyware

The term 'malware' already covers 'spyware' literally but I chose to write it down separately as many of us use 'malware' to refer to anti-virus only, leaving out spyware. The definition of 'malware' is any program that attempts to leak, change or destroy your data, applications or even the hardware without your knowledge and intentions.

This post is, basically, a compilation from different malware and spyware removal guides that I read over the past few days while trying to strengthen my computer protection. I request you to contribute your own experience and knowledge about the malware identification and removal techniques with us so that it benefits others too.

Stay Alert: Prevention Better Than Fix

Watch system to detect unexplained processes and behaviors
Watch system to detect unexplained processes and behaviors | Source

How To Prevent Virus/Malware From Entering Your Computer/Network

The obvious response would be to use a good anti-virus. There are both paid and free anti-virus available in the market. You can choose your package according to your needs while also keeping an eye on your budget. Note that the anti-virus may or may not contain anti-spyware. In the latter case, you will have to install one or more anti-spyware separately.

If it is a single, standalone computer, you can go for a cheap or free antivirus. In case of networks, it is advised that you have anti-virus or anti-malware - to be precise, on each computer of the network. A network can be either P2P or Client-Server.

In the P2P type networks, each computer can access the Internet directly. That increases the risk of acquiring malware that may then propagate to other computers in the network. This kind of risk is less in client-server model as one has to request the server for Internet data packets. If the anti-virus on the server is among the best, you can better prevent virus from entering your network.

Education or training people on the dangers of acquiring malware is a must if you are using a network as people may assume there is anti-virus on the server and hence they can use portable drives etc. on the nodes. But you know that is not true. Each node is susceptible both in P2P and Client-Server model.

The best method is to allow Internet connection via only the main computer - server or P2P - having good anti-malware. Further, train people to use virus scan for all removable media and downloads. If it is a corporate network, you can completely block portable media and downloads at the node levels. That would further prevent malware from entering your computer.

An Infected Machine Acts Weird
An Infected Machine Acts Weird

How To Identify A Virus Infected Computer?

A virus can lie dormant for weeks before some activity on part of user triggers it. That means, your computer could be virus infected even when you bought it but was dormant. While you cannot go and argue with the person you bought the computer from, the first thing to do when you find a virus on a computer is to isolate it from the rest of the network.

In other words, if you suspect that a computer on your computer is infected, unplug it from the network to troubleshoot, identify and remove the malware. That should be the first step and it intends to stop the malware from replicating itself to other computers on the network.

But how do you know if a computer or network is infected by malware? There are many signs that tell you that a particular computer is infected. Some of the signs to identify a virus infected computer are listed below.

1. The Virus/Malware may disable your anti-virus protection

2. The virus/malware may make your applications act or terminate in an unexpected way

3. You may not be able to log on to sites related to anti-virus or malware

4. Your Control Panel items may not work - especially the Windows Update

5. You may start getting unwanted prompts and popups in some cases

6. You may see unfamiliar process(es) in the Task Manager

The list is too long but if your computer is really infected and the virus is active, you will notice the difference in the functioning of the computer.

What To Do If Your Computer Has Malware?

As they say, "It is better to be safe than sorry", if you feel one or more computers on your network are infected, run a scan using online safety scanners. I won't recommend the one you already have on the computer as if it were to detect the virus, it would have done it in the real time. There are many online safety scanners available - from Norton and Microsoft likes. Personally, I use Malwarebytes if I have any doubt. It is not a real time protection but you can download it for free and run it to scan and remove most types of malware.

If you are using Windows 7 or above, you can also use the built in tool called MRT to scan and fix malware. You can also download MRT: Malware Removal Tool from the Microsoft website. Please note that MRT too does not provide constant monitoring and is hence, not a substitute for an antivirus.

Like I said above, first of all, isolate the computer with unexpected behaviors. Then connect directly to Internet to download software from Norton or Microsoft Online Safety Scanner. Run the software to see if it can find any malware. I recommend using two-three such tools - including MalwareBytes - for removal of malware from your computer.

You may additionally scan the entire network to see if the virus already replicated to other computers. Once fixed, you can add the computer back to the network.

IMPORTANT: Note what made the computer susceptible to malware. Was it someone using a portable storage device? Or was it an attempt to download something directly from the computer? Was it an email attachment? Based on the results, you take suitable action so that such incident is not repeated in future. You cannot foolproof your network but you sure can take steps to prevent malware from entering your computer network.

NOTE: If the computer was really infected, it proves that your existing defense is not good. You have to change whatever anti-malware you were using to avoid further infections.

Here are some key points revisited from the section:

  1. Change the current anti-malware system as it failed to detect the virus;
  2. Check the reasons why the computer was infected and take remedies to ensure it doesn't repeat;
  3. Using more than one antivirus is dangerous because of clashes; Do not install two antivirus on same system; You can, however, add anti-spyware in addition to anti-virus as an additional line of defense; Windows 7 and 8 have built in anti-spyware called Windows Defender so you won't have to necessarily install an anti-spyware;
  4. You may want to block sites that have poor ratings (example: sites offering pirated audio/video/software, social networks, porn etc.);
  5. Train the users and educate them on how to use different sites without harming the security of the network; If they want to use Facebook, tell them how to distinguish between a genuine and a malicious link; If they wish to download anything, inform them on how to check site information in Alexa etc. before they actually use the site for downloads;
  6. If possible, block/stop users from using their own portable storage devices on just any computer;
  7. Use the security features provided by your browsers as well as add-ons or extensions that provide security against malware;
  8. Use a DNS server that offers malware protection such as Comodo DNS servers

Computer in ICU
Computer in ICU

Malware and Spyware Guide: Malware Defense System

There are many guides and tutorials on what to do when your computer is infected and on how to protect your computer from malware. But the most efficient thing you can have is your own Malware Defense Plan. You, as a network admin, for home or office network, can create a list that defines how to prevent virus entry/infection followed by what to do in case of infection and finally, how to improve the current defense system to avoid further intrusions/infections. The list can include:

  1. Current practices - network rules for Internet access; storage usage; browser settings etc.
  2. Identification - regular checkup of network for any suspicious process in Task Manager and/or irregular behavior;
  3. Remedies - Steps to be taken in case of infection; and
  4. Strengthening the Malware Defense System

A Malware Defense Plan will not only help you act swift in case of an attack/infection, it also provides you an opportunity to explore the options available for you and your likes to prevent malware entry into your network. Thus, each time you face a problem, you will have a better malware defense system in place.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)