PC Virus Removal – Viruses – Worms & Trojan Horses

Pc Virus Removal – Computer Virus Removal. The first indication most people will have that their system has been subject to a virus is when they start to experience strange behaviour on their computer, or they suddenly realise that files are missing or a program does not work normally. Another indicator is the mass sending of e-mails that you have no knowledge of.

At this point most people who had not invested in Pc virus removal software will undoubtably wish they had!

For immediate help with virus removal 24 hours a day 7 days a week take advantage of our one time remote computer help package for only £23.99, either click here to order or call.

What Is A Computer Virus?

Viruses are actually a particular type of computer ‘malware’ – a general term covering all types of malicious software. The most common types are Viruses, Worms and Trojan Horses.

The authors of virus have had to become increasingly clever to avoid being detected by antivirus software by constantly evolving the virus to avoid detection, and unfortunately even the best anti virus software will not detect all types of infestation and often other software is required.

An increasingly alarming trend is also for the viruses to block your security software from accessing the internet so it is impossible for you to update your definitions which is imperative as you need the latest definations to protect against the latest viruses

If you think your system has been infected then update your virus files straight away and do a virus scan or if your computer is unprotected seek proffesional help especially if you have valuable data on your PC.

How Computer Viruses work

A virus is in a majority of cases hidden inside another program such as an installation program or a rogue document or image and is generally delivered via an e-mail attachment or a dodgy piece of downloaded software (you get what you pay for!).

Another version and probably the most troublesome is a boot sector virus.

Biological viruses require a host organism to live and reproduce and this naming convention has been adopted by the computer community because of the similarities to a computer virus, so when the ‘host’ program is run, the virus program also runs.

Once it’s in memory the virus is able to do its dirty work, which usually amongst other things includes infecting other system programs.

After the infection stage of the virus, there’s follows a destructive stage. The virus waits for a pre-determined trigger (for example a specific date or a certain number of times the virus has replicated itself) and then delivers what is commonly called a payload.

Payloads range from simple messages to file deletion commands and in extreme cases even the destruction of the core operating system.

Spam mail is the most common delivery system for computer viruses as are hyperlinks contained in the body of the e-mail and we find increasingly the culprits are getting very sneaky and may mask a link making it look like a link to somewhere else for example the link really cheap holidays actually takes you to the Microsoft Office site so if your unsure about the source of a mail or it has a link you have never visited before delete it.


Worms are similar to viruses in that they’re self-replicating. They reproduce themselves across networks without human assistance, such as e-mail sending. A worm, though, doesn’t need another executable program to be distributed so can be very destructive and invasive.

Worms usually affect entire networks more than individual computer systems on the network. Their self-replicating behavior can quite literally overload network resources, causing slowdowns in data transmission by consuming massive bandwidth normally used by every day network traffic.

Worms can also be designed to carry a payload, using a ‘backdoor’ installation program. A backdoor is a hidden access point to a computer or program that bypasses the normal login security protocols.

Worms are commonly used by spammers to distribute junk e-mail sometimes carrying their own viruses.

Trojan Horses

Trojan horses are the third common type of malware. A ‘trojan’ is a program that pretends to do one thing but actually does something different.

The term comes from the story of the Greeks who built a large wooden horse in which to hide. The Trojans mistakenly believed they’d receive a gift from the Greeks so they took the horse inside their compound giving their enemies easy access to wreak havoc.

This is in effect how a Trojan works but unlike viruses or worms, a Trojan generally doesn’t replicate itself.

Trojans may be hidden in otherwise useful software and is quite often found in downloaded cracked programs so if this is something you do think again, you may be getting a lot more than you realise and once you do the solution will not be cheap.

Once started they can do almost anything including erasing data, corrupting files, installing backdoors and logging keystrokes so that hackers can steal information such as credit card numbers and passwords which quite often can lead to identity theft.

Virus Removal

If you think your computer may have been infected by either a virus, worm or trojan make sure you run your Pc virus removal software without delay, virus removal software should be considered as a must have by all computer users. If you find the problem is re-occuring and you are unable to complete a full virus removal then contact your local Pc repair professional by choosing your area from the links provided.

Worse case scenario if all else fails is to illicit the help of a data recovery expert if you can’t access your data through normal means. Professional hard drive recovery techniques allow access to drive information out side of the operating system.

Pc Virus Removal – Viruses – Worms & Trojan Horses – Virus Removal

Leave a Comment

Please confim that you agree to our Cookie Policy and Privacy Policy!

Scroll to Top