Personal Tech Pipeline | Six Steps For Curing Malware Infections

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

February 20, 2006

Six Steps For Curing Malware Infections

To remove malicious software from infected systems on your network, follow these simple steps.

Courtesy of TechBuilder.org

Page 1 of 3


When panic-stricken customers or users call for help with systems that have gone kablooey, the culprit is probably a malware infection.

Common complaints from malware infections include dying audio, blinking video, even a system that mysteriously turns itself on and off. The reasons for infection can vary, too. Maybe the customers simply lowered their security settings...or failed to update the security software you already installed...or just had a spate of bad luck.

Whatever the scenario, have no fear. In this TechBuilder Recipe, we'll offer several simple steps you can take to diagnose the most common malware-related problems. Then we'll show you how to get infected systems back in working order, quickly and efficiently. We'll also provide quick and easy preventive measures you can take to keep your systems battle-hardened against future malware mutations. Finally, we'll show you how to use freeware utilities that will help you and your clients limit your security spending.

Malware has become a serious business. While some malware is still created as a kind of competitive game, today most attacks are driven by the profit motive. In other words, most of the bad guys are in it for the money. This means your clients have much more at risk than just their data. Their passwords, credit-card accounts, and other payment data are now up for grabs, too.

When it comes to malware, spyware tops the list of offenders. Unlike viruses and worms, spyware is not self-replicating. Instead, spyware enters a system via a software download or Web site. As the term suggests, Web browsing done from an infected system can be spied on by a third party. While the spying may be done for relatively harmless marketing, spyware can actually participate by shoving in nasty pop-up ads, re-routing browsers to ad sites, and -- far more insidiously -- stealing user IDs, credit-card numbers, and other valuable information. (For more information on the differences between spyware and viruses -- and their prevention -- see this earlier TechBuilder Recipe, Fight Spyware Like You Mean It!)

The good news is that, by cleaning up malware from a system, you may also help fix other system problems users did not even know they had.

INGREDIENTS

Here's what you'll need to start healing a malware-infected system:

  • The user's system: This is the system that you suspect is malware-infected. For the purposes of this Recipe, we're assuming the system runs on Windows and has an Internet connection.

  • Virus-removal software: We recommend McAfee Stinger, which is freeware.

  • Anti-spyware software: We like SpyBot Search & Destroy, also a freeware package.

  • Anti-virus software: We recommend Grisoft AVG (free edition), Symantec Norton AntiVirus, or Trend Micro PC-cillin Internet Security.

Note: McAfee's Stinger is mainly deployed for removing viruses, while Spybot Search and Destroy is used for tracking down and removing spyware. There's very little overlap in what they do, which is why we recommend you install and use both. If you deploy only one of these programs, the system could still end up infected, despite your most noble efforts. So to be safe, use both.

E-mail This Story
Print This Story
Reprint This Story


Page 2: Six Steps to Taking on Malware


Page 1 | 2 | 3



Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
On the CIO Agenda with IBM
With business growth back on the agenda, the role of the CIO is changing from manager of technology to C-suite collaborator in enabling innovation that matters for the business. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

EMC SAN helps El Camino deliver superior service
EMC CLARiiON and Centera systems are helping El Camino Hospital provide better patient care. The hospital can quickly and effortlessly monitor, modify, and protect the availability of its entire storage environment while saving money ($150,000)

Block or Secure IM Use
IM threats up 250%. Protect your corporate network. Free Download.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
Stellent eSeminar "Approaches to Metadata Design" on March 23
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia