These days, computer viruses are a simple fact of life. Without warning, vicious malware can infect your computer and wreak havoc with your data, and often spread quickly throughout your local area network and beyond. Your hard work and precious files might fall victim to dangerous code that’s designed for fast and calculated destruction.
If you’re on a PC with Windows, you are exposed to viruses, even with a good anti-virus program. If your computer is slow, it could be a virus or other malware consuming your computing power.
Here are some basic definitions so we understand the problem a little better:
Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose.
Trojan horse (A Type of Virus)
This is a program that disguises itself as another program. Similar to a virus, these programs are hidden and cause an unwanted effect. They differ from viruses because they are normally not designed to replicate like a virus.
Worm (A Type of Virus)
This is a special type of virus that spreads without any user interaction, typically by exploiting a flaw in popular software.
This is software that secretly gathers information about a user while he/she navigates the Internet. This information is normally used for advertising purposes. Spyware can also gather information about email addresses and even passwords and credit card numbers.
This involves the capturing of information that you type on the keyboard by installed hardware. This is often used by fraudsters to capture personal details including passwords.
A program that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection. Once a program has gained access, it can be used to monitor traffic and keystrokes; create a backdoor into the system for the hacker’s use; alter log files; attack other machines on the network; and alter existing system tools to circumvent detection. Rootkit commands replace original system command to run malicious commands chosen by the attacker and to hide the presence of the Rootkit on the system by modifying the results returned by suppressing all evidence of the presence of the Rootkit.
If you suspect that your home or office computer/network has been infected with a virus, your best move is to call M&M Computer Services. Today’s internet threats are completely different because their goal is to not simply to disable your computer but to gain as many account numbers, credit card numbers, log-ins, passwords, etc. as possible to be used for Internet crimes such as fraud, identity theft, etc. This leaves you exposed to possibly having business information, credit cards and/or bank accounts being compromised as well as your email and social network accounts being taken over. All of which result in difficult and embarrassing situations.
Whether it’s for business or personal use we will get your computer cleaned, running in tip top shape, and back to you quickly. We will also teach you about virus prevention techniques and provide you with the tools to keep your system clean.
We offer a complete set of services to detect, remove and repair your system as well as installing protection from future infections and a healthy maintenance schedule.