• Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...
  • Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

    A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability...

Thursday, 14 November 2013

How to remove malware from PC or laptop



The PC or the Laptop might be running slow and the peripheral devices are malfunctioning. If strange windows are popping up left right and center, it means that the computer is infected with virus or the malware. The spyware as it is called creates obstructions in performing normal functions and would go a long way in making the computer paralyzed. There are some advices which one can follow so that the PC is not infected by malicious programs.

As the first step, purchase an anti virus suite so that it is able to ward off the intruders from infecting the computer however it doesn’t guarantee safety from the malware. The security software should be regularly updated from the internet so that all the definitions of the virus are contained in the databases. It is important to note that no antivirus program can filter out all the malware which are being created in the virtual world.
It is important to enter the safe mode to eliminate the culprit but prior to that one should disconnect the PC from the internet and switch off the Wi-Fi mode. To boot into safe mode, shut down the PC and restart the computer. As soon as you see the information on the screen, keep on pressing the F8 button. One could find numerous options on the screen, wherein it is possible to select the advanced boot alternative. Choose the safe option with the networking mode and press the enter button.


If you are using the windows 8, press the shift button and you will arrive at the boot menu from where it is possible to select the safe mode. Once in the safe mode, delete all the temporary files which are bound to increase the speed of the virus scanning. Free the disk space that might even delete the malware. To accomplish the task, go to all programs, accessories and click on disk cleanup option. It will start the process and help the computer to work faster.
If the antivirus is not able to detect the malware, it is time to install the on demand malware scanner which runs only when the program is opened. To start with the process, connect the computer to the internet and download the application along with its updated version. To ensure safety, download the malware scanner to another computer and store it in the USB drive to be carried to the infected computer. For installation run the set up file and use the wizard to install the program. If the database is outdated use the application to download the updates from the internet. Once the scanner is started, it will identify how many files are scanned and how many need to be done. The anti malware application will delete the malicious software however if the infection is deep seated and infects the root kit, it is important to format the disk drive and install the windows operating system. If malware is eliminated, you can run the antivirus to check whether it is still present in the system.

1 comment: