Tag Archives: infected

Virus Removal – E-Mail Attachment Viruses

Over recent years viruses that are spread in the form of e-mail attachments have become increasingly more common with widespread attacks taking place across the globe, the most famous of which being the CIH virus mail attack.

On 26 April 1998 the first wave of the much feared CIH virus (or Chernobyl virus) struck across the world. The initial spread of this virus was caused by the distribution of infected software and game demo’s, but later even big companies such as IBM were distributing newly built, complete PC systems blissfully unaware that these new systems were already harbouring the CIH virus.

Although the virus was first spread in April 1998, it was not set to activate until a year later on 26 April 1999. If virus removal had not been performed on infected PC’s prior to that date, the virus would be activated. Once activated, the virus had the ability to overwrite the majority of the data on the user’s hard drive, causing havoc within the file system and rendering the user’s PC inoperable.

In 2001 a new strain of this virus was created and distributed globally to thousands of victims in the form of an e-mail attachment. These two attacks combined caused an estimated $8 million worth of damage to computer systems around the world, but unfortunately a lot of this damage could have been avoided if the users had made simple adjustments to their e-mail security settings and updated their antivirus software. These simple adjustments help to protect your system from infection and avoid the difficult task of virus removal after an infection has been detected.

Always check your e-mail security settings to make sure you have the correct security measures in place to combat these attacks should they ever take place again. If you’re security settings are set up to allow JavaScript, Macros or other (possibly malicious) files to execute automatically, then it is vital that you disable these features as soon as possible to ensure that you are not vulnerable to an e-mail based virus attack.

Virus Removal – Fake Virus Alerts

There are many warning messages displayed to us while browsing the web (usually in the form of pop-up ads) which claim that viruses are present on our systems. Many of these pop ups try to instill fear into the user by claiming that the viruses can also physically damage your PC.

These warnings are usually elaborate hoaxes that carry no weight at all. This kind of damage is simply not possible. Although viruses can cause considerable damage to the files within your PC, they do not have the capability to physically damage the computer hardware itself. Even in the worst cases of virus infection, as long as your system is thoroughly cleaned (or in severe cases, both cleaned and reformatted), the hardware itself will remain fully functional.

Should you be worried about these warnings?… No. Unless of course you click on them!

Clicking on these warning can trigger a virus to be downloaded, but if you have clicked on one of these messages in error, try not to worry. For the virus to be activated, the code in which the virus is contained must first be executed.

Whether the infected file is contained within an e-mail, a file you have downloaded from the Internet or even a document file, it will require some form of trigger in order to begin harming your system files. This process is not automatically started just by downloading an infected file.

When.exe files containing viruses are executed, the virus code contained inside these files will run, attempting (and often succeeding) to spread the virus throughout your system and across all of the other systems connected to your network. These newly created segments of the virus then attack other areas of your hard drive, duplicating and attaching itself to other programs and files. If these infected files are then shared with other computer users outside of your network, the virus is passed on to them, infecting the recipients computer and increasing the likelihood of the virus being spread to yet more computers.

If you have clicked on one of these warning messages or suspect that a virus may have accessed your system in another way, virus removal must be undertaken as soon as possible as besides having the ability to spread throughout your system, viruses are also capable of deleting or altering your document contents, changing settings and creating and inserting harmful lines of code into your back end system files.

Virus Removal – Fake Virus Alerts

There are many warning messages displayed to us while browsing the web (usually in the form of pop-up ads) which claim that viruses are present on our systems. Many of these pop ups try to instill fear into the user by claiming that the viruses can also physically damage your PC.

These warnings are usually elaborate hoaxes that carry no weight at all. This kind of damage is simply not possible. Although viruses can cause considerable damage to the files within your PC, they do not have the capability to physically damage the computer hardware itself. Even in the worst cases of virus infection, as long as your system is thoroughly cleaned (or in severe cases, both cleaned and reformatted), the hardware itself will remain fully functional.

Should you be worried about these warnings?… No. Unless of course you click on them!

Clicking on these warning can trigger a virus to be downloaded, but if you have clicked on one of these messages in error, try not to worry. For the virus to be activated, the code in which the virus is contained must first be executed.

Whether the infected file is contained within an e-mail, a file you have downloaded from the Internet or even a document file, it will require some form of trigger in order to begin harming your system files. This process is not automatically started just by downloading an infected file.

When.exe files containing viruses are executed, the virus code contained inside these files will run, attempting (and often succeeding) to spread the virus throughout your system and across all of the other systems connected to your network. These newly created segments of the virus then attack other areas of your hard drive, duplicating and attaching itself to other programs and files. If these infected files are then shared with other computer users outside of your network, the virus is passed on to them, infecting the recipients computer and increasing the likelihood of the virus being spread to yet more computers.

If you have clicked on one of these warning messages or suspect that a virus may have accessed your system in another way, virus removal must be undertaken as soon as possible as besides having the ability to spread throughout your system, viruses are also capable of deleting or altering your document contents, changing settings and creating and inserting harmful lines of code into your back end system files.