Cyber Monday really made me stop and think about safety and the Holiday buying season. Year after year the amount of purchases made on line continues to increase. Meanwhile, the severity of internet threats released into the wild each day morphs and mutates into quicker, slicker and stronger forms each day.
The threats are real, and they are not going away. It is a good idea to be extremely vigilant about protecting your identity while online. I hope this information is helpful to you in some way. Short post today …Safe Clicking.
In this part of our series we are going to discuss virus identification and removal. I am not going to quote any sources or send you off on an info-chase to cross reference what we go over here. But instead, I am going to give you a sort of show and tell based upon some of the experiences we have documented over the years.
Please note, there are a wealth of different interpretations and acronyms for the various types of virus’s and malware variants in the wild today. The differences between Trojans, Rootkits, Adware, Scareware and the many variant’s out there are sometimes vast, and sometimes almost identical depending upon what you stumble across. It is quite easy to end up in the middle of a digital debate if you use the terms interchangeably in front of the wrong person. So for the sake of this part of the series we will be going over one of the newer TrojanFake.Alert variants.
Playing in the Lab
Back in the day I was among a few others who would get into all kinds of trouble with my teacher for experimenting with viruses in the lab (we called it “The Matrix”). He would tell me “Do not create viruses because you cannot quarantine them with 100% certainty!” But the ignorance of my youth would overwhelm good sense, and I ended up creating experimental boot sector viruses’ for analytical purposes.
It was not until my teacher conveniently found an infected blank “test virus” floppy disk that I inadvertently misplaced, did I realized how right he was. As a consequence I spent the next day or so scanning every floppy disk in the lab to ensure that none of the disks had been cross contaminated.
I am able to laugh about it now looking back on the situation, yet at that time it was not funny at all. Yet the reason I even mention the lab event at all is to highlight one very important fact. Once a computer virus is created by someone for whether for benevolent or malicious purposes, if it is released into the wild, it becomes extremely difficult if not impossible to quarantine the problem.
Do You Know How to Remove a Virus?
This is a common question customers ask when they call us. Although the simple answer is “Yes.” There are a few other questions we ask as well. For example, we often ask:
“What type of symptoms are you experiencing?”
“How long has this been happening?’
“Did these symptoms happen all at once or did the change happen gradually?”
The answer to each of these questions can quickly help us determine what actions to take in removing the virus from the infected computer.
Fake Virus Alerts
Over the last four or five years there have been several variations of Trojan.Fake Alert Viruses released in the world wild web. One of the more recent detections is the Security Shield Fake Alert (pictured below).
If you are an average to mid-level user, this program may seem harmless and even helpful. But that could not be farther from the truth. This is a screen shot of an actual Trojan.Fake Alert variant.
This virus was injected in to the coding of another website. What that means is, all you would have to do is log on to the infected website and you will almost immediately receive the following alert.
Whether you click “No” or “Yes” you will still receive the following pop-up (this photo was taken with a camera and not a screen shot because the computer had already been taken over at this point):
If you are reading this, there is a good possibility that you have already read Part 1 and Part 2 either because you think you have a virus or you are pretty sure you have a virus. If you have not covered the first two parts, you may want to consider going over them before the follow steps .
Being that you are assumed to have already tested all of your hardware at this point it is pretty safe to say that you do have some type of virus in your system. The next logical step in the process is to begin your virus removal. Again, we are proceeding under the assumption that you are pretty sure that you have a virus and all of the hardware on your computer has passed hardware testing.
How to Remove a Virus
There are a variety of different techniques you may hear about, but this technique to me, is one of the easier ones to implement. If you have another computer, you will need to need to download a boot disk of some sort. You can download AVG or Kaspersky rescue disks or whichever recovery disks you are most comfortable with using. You can find direct links to their downloads here http://computercornerhawaii.com/wpp/free-anti-virus-sofware/
I will be removing the “Internet Security” fake alert from a computer for this example. The following video is what it looks like when infecting a PC…
Once you have downloaded the recovery disk and burned it to a bootable DVD, the next step is to restart your computer with the bootable recovery disk or rescue disk inside. You may have to tap the escape or F2 or F12 to access the Boot Options and select the DVD/CD option.
Be sure to select the DVD/CD Drive during your boot option prompt. The objective is to get your computer to boot to the bootable disk you created, and not the infected hard drive in your computer. Once you have selected the DVD/CD drive and began the startup process you should see the rescue program beginning.
If you get an Error like this, no worries, it only means you need to check which boot disk you have downloaded.
Whatever program you choose, the main idea is to be comfortable with using it. In these example videos I am using Microsoft System Sweeper it is still available for download but you must create a Hotmail account to download it as of this posting. But please note that each video is just one step in the overall process, as such if you are following along, it is recommended that you watch each in sequence.
Once your boot disk has loaded completely, look for the option to update the software. This is extremely important. Some of the newer viruses in the wild are not detected by antivirus software unless it has been updated. Updating your antivirus software on your rescue disk will ensure that you are removing all of the latest threats. In addition it can literally mean the difference between spending a day removing the problem or spending a week or two of downtime trying to get your computer back up and running like normal again.
Once you have updated your antivirus software on your rescue cd, run your scan as soon as possible as it may take several hours to complete the scanning process.
When the scan is complete and you are able to see the results, be sure to look for any noticeable system files infected. Reason being if you delete a system file you may inadvertently render your PC incapacitated.
If you do not know what a system file looks like, or you are unsure whether or not you should remove the threat. You may want to ask someone who knows what these types of files look like. Or you could call us. Either way, your computer will still remain infected unless you remove or disinfect the threat.
Once you have removed the virus, when you restart your computer you should have a more stable system without the Internet Security pop-up or icons on your desktop.
I must add that once you have completed your scan from your boot disk, have removed the viruses found and restarted your computer it is always a good idea to start one more scan from within Windows. You can use your currently installed anti-virus software if you so choose. Either way I would recommend updating the software prior to running your new scan, at a minimum.
Or another option is to uninstall your old antivirus software and install a different one so for example if you originally had a version of Norton Internet Security Suite installed when you initially caught the virus, you could uninstall it and install Microsoft Security Essentials (or another antivirus software program of your choosing).
What I like to do is install, update and then run MalwareBytes and ESET. Once both have completely scanned my computer I then like to install update and scan with Microsoft Security Essentials. Then last but not lease I like to scan with CCleaner to clean out my system of any broken file associates, temporary Internet files or no longer active virus components.
It has been a while since we have posted anything so we decided to begin a discussion about computer repair Hawaii. Many of you have contacted Computer Corner Hawaii over the years feeling uncertain, scammed or ripped off after having had our computer repaired. As a result, we have decided to simplify and clarify as much of the process as possible here. In hope of giving you the knowledge you need to make a well educated decision before forking over hundreds of dollars in computer repairs.
Having said that, the format we are using here is a combination of frequently asked questions and open dialog. That way we are able to continue to add new questions you or someone else may have as well as steadily provide answers for older questions.
Commercial or Residential IT Repair Defined
Whether you are at home or at work, there is a good chance you are a phone call away from an IT repair person. A lot of corporations have a “Home Office” division that takes care of all technical related issues remotely. And a lot of home users have a son, nephew, or friend of the family who is known as the guy or girl who can fix computers. So why should you call us or some other computer repair shop instead of them? Let’s examine what it IT repair is on a professional level.
A computer repair shop must adhere to certain standards in accordance with state and federal law in order to exist. What that means to you is:
The business must be registered with the Department of Commerce and Consumer Affairs (DCCA)
The business must file taxes yearly and have their books subject audit by the Department of Accounting and General Services should they feel the need to do so.
The business should be insured in the event of fire, theft or damage to your computer.
The business should not be posting certification logos unless they have actually obtained them less be subjected to copyright and various other fines.
The business is more likely to adhere to federal digital privacy and protection laws and not copy, inspect or pilfer your confidential information for nefarious purposes.
Store Front Mobile and Craigslist PC Repairs
The problems may be different but the solution steps are usually the same. You notice a problem with your computer. You may put it off until the point that your computer does not work at all or you ask someone you know if they can help you fix the problem.
You take it in to the most convenient computer service and repair store front you can find on your way to work cause you have no time and would like to get a good bargain rather than paying so much at the big box computer repair location.
The other scenario is you put it off until it gets too bad that you can’t use it at all and call a sign, or flyer posted on the side of the road or on a bulletin board in a mall for cheap computer repairs. You meet the technician somewhere and give them your computer after briefly describing your problem to them.
As you drive away you realize they gave you no work order or documentation of any type verifying that he has your computer in the event that you never see them again. Although they seemed so trustworthy and legitimate on Craigslist, you still suffer from a case of leeriness and anxiety about whereabouts of you computer and all the personal information on it.
Mobile operation may or may not be registered as an official business with the DCCA or they may or may not be required to have any type of insurance. Using Computer Corner Hawaii as an example, as former Circuit City Firedog technicians, we understand the importance of customer privacy and insurance. As a result we have a strict policy protecting customers’ data.
Further, being that we do extend warranty work for a variety of large manufacturers, we must retain a million dollar liability coverage as part of our agreement. If we were not insured we would not be able to continue to work as we have for so many years, with or without a traditional store front.
Although we want you to choose us to repair your computers, regardless of who you are most comfortable with, we want to empower you to make a decision you feel comfortable about. After all, it is your hard earned money you are investing into this repair.
Computer Repair Questions
From the best of the best to the first time user, we all have computer repair questions. Some seem simple enough, others are more complex. We use to believe we had heard them all, but time and technology has upgraded and improved the type, style and idiosyncrasies’ of each question. The following are many of these questions answered. Check back from time to time as we will continue to add additional questions as they arrive.
How do I check how fast my internet connection speed is?
Your local Internet Service Provider (ISP) normally has a set of servers they use to more accurately check your internet speed. In Hawaii these are the most commonly referred to speed testing services:
How do I know if I have antivirus software installed in my computer?
By default, many manufacturers install Nortons Internet Security or McAfee Internet Security. If you do not recognize your currently installed antivirus software give us a call.
How do I know if I have a virus?
If you have a virus in your computer the symptoms can be as obvious as a large pop-up that will not go away or as discrete as a slight increase in memory usage on your task menu. Sound vague and ambiguous? Well, that’s because it can be extremely difficult to know if you have a virus without doing a virus scan of some sort.
As a result, we like to recommend using Malwarebytes, Microsoft Security Essentials, or ESET Online scanner to scan for viruses in your computer. If you install, update and run one of these programs the results may look like the following if a virus is detected.
Where is the Road Runner or Hawaiian Telcom anti virus software located on their website?
Hawaiian Telcom offers McAfee Internet Security Suite free of charge. Here is a link:
Please note, if you run into any problems accessing your free antivirus software you may need to call Hawaiian Telcom or Oceanic Time Warner to obtain further access information. They will help you obtain the software but you may have to call us (808-206-6051) if you are looking for computer repair Hawaii.