How to deal with malicious programs (malware)

Date:

2018-03-17 17:05:18

Views:

360

Rating:

1Like 0Dislike

Share:

The Number of Internet users is growing literally every day. Right now it is possible to do almost anything – to order groceries, medications, buy things, watch a movie, and more. The attackers use computer illiteracy of users and to infect computers with malware. Many firms spetsializiruyutsya for cleaning computers from viruses, but it is quite expensive procedure, so no extra is the ability to get rid of the undesirable effects of a visit to the Internet itself. Best free antivirus programs, as well as many others can be downloaded from the website Free-software.com.ua no Intrusive ads and other inconveniences. 


First and foremost, you need to prepare a Live CD. This is a bootable CD that has Linux system and any antivirus programs. You can buy a ready-made solution, which would include more options – checking the disks for errors, the registry repair and other utilities. The principle of operation of such discs is quite simple – you need to insert it into the drive, restart the computer and using the BIOS to boot from disk. This allows you to remove programs that start automatically with the operating system and block the antivirus software. If your computer is missing, you can put a system image on a USB flash-drive (“stick”). On the Internet quite a lot of such proposals, they are free and often contain instructions for entry and use. But it is worth remembering that the drive can no longer be used to store other data – in the process of creating the image of the stick will be write-protected and use it for other purposes only after the full erase. 

In some modern computers have a protection system Secure Boot. This is preset by the manufacturer, the utility, protecting from malware residing at the storage device, runs together with the system. On the one hand, this is a useful feature that protects the computers of those users who do not remove the flash drive when you reboot. But it also interferes with you to recover the system using Live CD. Every manufacturer has its own algorithm disable this utility, so a single no instructions and you need to find in the Internet the recommendations.

In General, the process of cleaning the computer from malware is quite simple and does not cause problems even for inexperienced users – everything is automatic. After the work is completed, a message will appear, you will need to reboot computer and in BIOS choose to boot from the hard disk. 

Despite the simplicity of these operations, it is worth to give preference to preventive measures of protection from infection – up-to-date antivirus program that is periodically run cleanup, do not visit dubious sites and test each drive before using.


Article in other languages:

AR: https://tostpost.com/ar/computers/10337-malware.html

BE: https://tostpost.com/be/kamputary/18563-yak-zmagacca-z-shkodnasnym-pragramam-malware.html

DE: https://tostpost.com/de/computer/18576-wie-man-mit-schadprogrammen-malware.html

ES: https://tostpost.com/es/los-ordenadores/18591-como-luchar-contra-el-software-malicioso-malware.html

HI: https://tostpost.com/hi/computers/10343-how-to-deal-with-malicious-programs-malware.html

JA: https://tostpost.com/ja/computers/10344-how-to-deal-with-malicious-programs-malware.html

KK: https://tostpost.com/kk/komp-yuterler/18561-alay-k-resuge-ziyandy-ba-darlamalarmen-malware.html

PL: https://tostpost.com/pl/komputery/18536-jak-radzi-sobie-ze-z-o-liwym-oprogramowaniem-malware.html

PT: https://tostpost.com/pt/computadores/18533-como-lidar-com-programas-maliciosos-malware.html

TR: https://tostpost.com/tr/bilgisayarlar/18569-le-ba-a-kmak-i-in-nas-l-zararl-yaz-l-m-malware.html

UK: https://tostpost.com/uk/komp-yuteri/18557-yak-borotisya-z-shk-dlivimi-programami-malware.html






Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."

Comments (0)

This article has no comment, be the first!

Add comment

Related News

Popular methods of grouping elements of an array: insertion sort and using the key

Popular methods of grouping elements of an array: insertion sort and using the key

One of the tasks when working with such a program element as an array – this ordering is contained in the members in ascending or descending order. The search for solutions to problems related to the sorting of an array &nda...

HP 620: features, benefits, reviews

HP 620: features, benefits, reviews

want to buy for little money a quality reliable work laptop? The HP 620 is a classic design, good specifications and affordable price. The model is compact and ergonomic. High performance along with other benefits makes a laptop l...

How to open a dll? Guidelines and recommendations for beginners

How to open a dll? Guidelines and recommendations for beginners

it so Happens that if long ago I use a computer all the main programs you know, even friends sometimes ask to help with a particular app, as there… In General, I think that you get a similar feeling when you are faced with ...

The subject of the game

The subject of the game "the Witcher 3" - cherry liqueur alcohol

In-game “the Witcher 3" cherry liqueur on alcohol is quite a popular subject, because it is mandatory in its application. It can be found in some places of the game or try to create yourself with the right skills. Recip...

How to increase FPS in

How to increase FPS in "GTA 5"? Effective ways

has long become a classic game GTA has lots of fans. Unfortunately, when running fifth part of this masterpiece users face lots of problems. Most often, the health of the game is affected by low FPS. How to solve the problem?What ...

SFP transceiver: purpose, types, features

SFP transceiver: purpose, types, features

Improving data transmission technologies has led to the emergence of fiber-optic network to connect devices requires the use of special equipment – SFP transceiver. The SFPS replaced the more cumbersome equipment and GBIC ar...