

Most likely, you’ll find out that the product is "fakeware" (malicious software that calls itself an anti-virus program).

If you were only able to get a product name, then you need to do a search on it. Remember, never give out your personal financial information in these dialogues with malware. Be prepared to write down any product name it gives you, or any file name and directory path (example: C:\Users\YourUserName\AppData\LocalLow\Temp\Virus). If it gives you a security message that says "For More Info Click Here," or something else to click on, and it is not asking you to enter personal financial information or install anything, you may want to go ahead and click on it.

Keep an eye out for any security messages that pop up, as these usually provide the exact name of the virus that has infected your computer. Know Your EnemyĪny great war general will tell you to know your enemy, get inside their head, think like they do, act like they do, and become their best friend, as this will prepare you to overcome your enemy. Here are five steps you should take to remove a virus from your computer. Five Easy Steps to Remove Viruses and Other Malicious Software I also must advise you also that using good virus protection software, like Malwarebytes, to remove malware is faster and safer for your data. These reports are useful for hunting the suckers down yourself, as they tell you the file names and aliases created, processes created, registry keys created, and other information about the virus. However, Microsoft bought out Threat Expert and turned it into a downloadable program.

This used to be a web site that analyzes and reports the behavior of computer viruses, worms, Trojans, adware, spyware, and other security-related risks. While I was searching online how to get rid of my computer virus, I also found Threat Expert, which anyone who owns a computer should know about, in case your virus protection software fails or is not available. This real-time protection has prevented so many hacker attacks on my computer on a daily basis that I can’t even keep track of them. The full version of Malwarebytes, which I ended up buying, includes not only scheduled scanning and updating but real-time protection against hackers trying to break through your firewall.
