2014 Virus Removal Kansas City and Nationwide Remote
The hackers are at it again
We value your satisfaction over all else.
Email Support Dept
I have talked about virus removal on this site for several years now, and virus removal has been a big issue with almost every computer user on the planet. The question “Why do I keep getting these viruses?” comes up just every day we are in the field. The answer is never one they like to hear. If you like to use the internet and the abundant amount of information and entertainment sites it has to offer, then you are eventually going to get a virus. It is perfectly normal for you to catch computer malware while surfing around on different sites, looking for information about the latest trend or hot-topic, even playing the latest flash based games on the internet, like Facebook and POGO. If you don’t want to deal with the issues of malware your only option is to either limit every internet action you do to the most basic level, or disconnect entirely from the internet. It does not matter what Virus Removal Software you have, Norton, McAfee, Malwarebytes, AVG, Security Essentials, Avira, Panda, they are all going to let Malware slip by. When this happens your browser may start to act funny, taking you to places you did not want to go, pop-ups that wont go away, screen images that disable every action you try, even complete disconnection from the internet. Among many other symptoms you may experience, these items need to removed and repaired. Virus Removal Software is helpful is destroying these little worms, but at times you need a Virus Removal Expert to take control and eliminate the problems. This is where we come in. 90% of the time we are able to destroy whatever virus you may have, within a reasonable amount of time, and get you back up and running like nothing happened. Occasionally your computer may require Windows to be re-installed, when this happens, we transfer all of your files back to the new OS like it was before, many of your specific programs will need to be installed at your convenience. Our virus removal techniques have been developed over time, with trial and error. Most of the time we have seen your problem already and have successfully solved the issue, other times the virus may be new to the market, but usually ressembles previous Malware and can usually be dealt with in a similar manner.
Typical Virus Removal Steps
- Internet Options Cleanup
- Registry Cleanup
- Battle the processes
- MsConfig Listings
- Uninstall Bad Programs
- Check for Vulnerabilities
This process is our super basic description of our Virus Removal techniques that we use here locally in Kansas City and nationwide using remote access. When you call us for Virus Removal we like to attempt to resolve the issues remotely using the internet and TeamViewer Remote Access Installer, this tool makes it possible for us to remotely control your computer to access the virus that is to be removed, as well as all other problems you may be experiencing. When you install this tool, simply allow the installer to run Teamviewer via Ninite.com and you are all set to begin. The installer comes from www.ninite.com which is a service that I trust and use frequently. They have a list of programs on their site, you select the ones you want and hit download. The programs are installed using all the best options for you, no adware, no malware, trial and free versions always. Ninite can also be used to update those programs, it is very fast and easy, all in one location means no more searching around hoping you click the right one. Check it out sometime.
Once TeamViewer has been installed on your computer, you need to open it up by double clicking its’ icon on your desktop. Teamviewer will make a connection and give you an ID number and Random Password (changes every time you open it or restart). Simply call, text or email this information to us, with a description of your problem and we will attack it at an agreed upon appointment. Feel free to watch and see what we do. We prefer to have you on the phone during this appointment so that we may address any other issues you may have, but if you are busy we can also do this solo, and keep you up to date with a chat window. We guarantee that you will be satisfied. If your issue is not something that can be address remotely, we offer in house visits for the Greater Kansas City Area. Most virus removal and computer cleanup sessions cost between $20 and $40, this is just depending on the time it takes to get the job done. There are a few situations that may run up a bit higher, but most virus removal sessions are pretty quick. Call us before you computer gets really bad if you want to save some money. Users that keep up their computer maintenance tend to spend less on virus removal and computer cleanup in the long run. For instance, someone that has not had their computer professionally cleaned in over six months, might end up spending $100-$300 to get it all fixed up just once. Versus, someone that has their computer cleanup every month or so, might end up paying less than $100 for the entire year. It saves to keep up on computer maintenance. Also keep in mind, your computer works much like a vacuum cleaner, it is always sucking in dust when it is running. You might want to start thinking about unplugging it, opening the side panel, and blowing the dust (outside your home) using a can of dry compressed air. This little step done once every 4-6 months can preserve the life of your hardware. Hardware replacement can get very expensive, especially if you have to pay a pro to do it.
Virus Removal is the key to smooth browsing and operation
Computer hardware maintenance is key to longevity and performance
My Geek USA is the Key to all of it
Call us, before it is too late!
Support small business, it is us that keep the economy rolling without unbearable costs.
Shy away from the major corporations that care about nothing but the bottom line.
We value your satisfaction over all else.
Email Support Dept
Here is some more information from our buddies over at Tech Republic.
It’s inevitable that clients will infect workstations, PCs, and laptops with spyware and viruses. Regardless of preventive steps, from gateway protection to automated scans to written Internet use policies, malware threats sneak through even layered defenses. What makes the situation worse is that many clients aren’t willing to invest in standalone anti-spyware software, even though they understand the need for minimal antivirus protection.
Some IT professionals advocate simply wiping systems and reinstalling Windows, while others suggest that’s akin to giving up and letting the bad guys win. The truth lies somewhere in between. After making an image copy of the drive (it’s always best to have a fallback option when battling malicious infections), here are the measures I find most effective.
1: Isolate the drive
Many rootkit and Trojan threats are masters of disguise that hide from the operating system as soon as or before Windows starts. I find that even the best antivirus and antispyware tools — including AVG Anti-Virus Professional, Malwarebytes Anti-Malware, and SuperAntiSpyware — sometimes struggle to remove such entrenched infections.
You need systems dedicated to removal. Pull the hard disk from the offending system, slave it to the dedicated test machine, and run multiple virus and spyware scans against the entire slaved drive.
2: Remove temporary files
While the drive is still slaved, browse to all users’ temporary files. These are typically found within the C:\Documents and Settings\Username\Local Settings\Temp directory within Windows XP or the C:\Users\Username\App Data\Local\Temp folder within Windows Vista.
Delete everything within the temporary folders. Many threats hide there seeking to regenerate upon system startup. With the drive still slaved, it’s much easier to eliminate these offending files.
3: Return the drive and repeat those scans
Once you run a complete antivirus scan and execute two full antispyware scans using two current, recently updated and different anti-spyware applications (removing all found infections), return the hard disk to the system. Then, run the same scans again.
Despite the scans and previous sanitization, you may be surprised at the number of remaining active infections the anti-malware applications subsequently find and remove. Only by performing these additional native scans can you be sure you’ve done what you can to locate and remove known threats.
4: Test the system
When you finish the previous three steps, it’s tempting to think a system is good to go. Don’t make that mistake. Boot it up, open the Web browser, and immediately delete all offline files and cookies. Next, go to the Internet Explorer Connection settings (Tools | Internet Options and select the Connections tab within Internet Explorer) to confirm that a malicious program didn’t change a system’s default proxy or LAN connection settings. Correct any issues you find and ensure settings match those required on your network or the client’s network.
Then, visit 12 to 15 random sites. Look for any anomalies, including the obvious popup windows, redirected Web searches, hijacked home pages, and similar frustrations. Don’t consider the machine cleaned until you can open Google, Yahoo, and other search engines and complete searches on a string of a half-dozen terms. Be sure to test the system’s ability to reach popular anti-malware Web sites, such as AVG, Symantec, and Malwarebytes.
5: Dig deeper on remaining infections
If any infection remnants persist, such as redirected searches or blocked access to specific Web sites, try determining the filename for the active process causing the trouble. Trend Micro’s HijackThis, Microsoft’s Process Explorer, and Windows’ native Microsoft System Configuration Utility (Start | Run and type msconfig) are excellent utilities for helping locate offending processes. If necessary, search the registry for an offending executable and remove all incidents. Then, reboot the system and try again.
If a system still proves corrupt or unusable, it’s time to begin thinking about a reinstall. If an infection persists after all these steps, you’re likely in a losing battle.
Some IT consultants swear by fancier tricks than what I’ve outlined above. I’ve investigatedKNOPPIX as one alternative. And I’ve had a few occasions in the field where I’ve slaved infected Windows drives to my Macintosh laptop to delete particularly obstinate files in the absence of a boot disk. Other technicians recommend leveraging such tools as Reimage, although I’ve experienced difficulty getting the utility to even recognize common NICs, without which the automated repair tool can’t work.