Viruses that can attack your PC Computer Virus Resources
Each year computer viruses cost companies and private users over $10 billion. Some of these infections are merely a nuisance that slow down productivity, while others are far more threatening. The truly dangerous viruses can steal personal information, destroy a computer’s hard drive, and spread themselves to other computers. Consumers who buy refurbished computer products, such as Used Laptops, often have no software protection installed to defend against even the most common computer viruses. Security sites monitor these threats and regularly release alerts, but it’s important to understand the differences between viruses, worms, and Trojan horses. They all act a bit differently and it’s important to know how they work and how they are spread.
Windows Viruses
What is a Computer Virus? – A definition and explanation of how viruses spread
Microsoft and Viruses – Microsoft’s support page defines virus signs and symptoms
Virus News – Kaspersky’s updates
Win Viruses – A list of binary viruses designed specifically for the Windows platform
Windows Virus Protection – How to protect a computer running Windows
Internet Worms
What is a Computer Worm? – A definition
Conficker Worm – A report on the Conficker Worm from CBS 60 Minutes
Conficker Eye Chart – A basic visual test for possible Conficker infection
Taxonomy of Computer Worms – A portal to a PDF file from a malcode workshop
Worms 101 – A guide to different kinds of computer worms
Macro Viruses
What is a Macro Virus? – A definition
Avoiding Macro Viruses – What to watch out for and avoid
Virus List – A list of known macro viruses
Script and Macro Viruses – A chart detailing how viruses attach and travel
Macro Virus on a Mac – How to eliminate a Word macro virus on a Mac
Malware (Trojans, etc..)
Trojan Horse Attacks – A definition of Trojan horses and how to get rid of them
Stopbadware.org – News and alerts on current malware threats
Fighting Malware and Spam – A directory of viruses, malware, and current alerts
What is Spyware and Adware? – Defining the problem and how to solve it
Types of Malware – Different types of malware that can infect your computer
Generator Based Viruses
The Virus Underground – An article about virus generators and virus writers
Macro Virus Maker – An article on the early virus generators
The Anna Kournikova Virus – A BBC article on one of the first and most infamous viruses created by a generator
Virus Construction Tools – A list of known virus generators
ILOVEYOU – The destruction caused by the ILOVEYOU virus
Computer Hoaxes
What is a Virus Hoax? – A definition
Virus Hoaxes and False Alarms – A directory of known virus hoaxes
Virus Hoaxes and Realities – A list of virus stories and their veracity
Virus Hoax Warnings – An extensive list of false viruses from McAfee
Procedures for a Virus Hoax – How to recognize a virus hoax
Script, Java, WinHelp viruses
Java Virus – Symptoms and solutions if a virus has attached to Java
Attachments and Applications – A list of attachments and applications associated with common computer viruses
Facebook Virus – A report on social networking viruses
Viruses on Adobe – Viruses attacking Adobe Acrobat and Reader
Virus in Scripts – Viruses attached to PHP, HTML, and ASP scripts
(taken from http://www.pcbargainhunter.com/articles/computer-virus-list.html)
Cleaning-up (Before Starting)
After Analyzing
After running Cleaner
Final clean-up after 3 rounds
Start of scanning the Registry
Result of scanning
Rescan after fixing the issues
Defragging your hard disk space for orderly file management Before tidying
After tidying
Hard Disk Space and Partitioning