Removing a Virus

Viruses Abound

Every week I remove viruses from Windows computers. Here’s a common scenario:

Someone gets a fake alert like this and realizes that they have a virus.

When they call me, I tell them to turn off the computer. This is because a virus can continue to inflict more damage. It can install other viruses and even encrypt your hard drive to hold your data hostage to demand a $200 ransom. Turning off a computer stops whatever the virus is doing.

Use a Live Rescue CD

The first thing I do with the computer is boot into a Live CD to search for viruses. Typically the computer displays the key to press for boot options. It is usually one of these: F1, F2, , F10, F12 or Del. The computers may be set up to boot from the CD if one is available.

By booting into another operating system, you keep the virus from running, inflicting damage, and actively thwarting virus scans. The Live CDs I use include:

Lately, I have found Kaspersky Rescue Disk to be the most effective. This approach also works from a USB stick if the computer’s BIOS supports booting from USB.

Update Virus Definitions

Because new viruses are out all the time, it’s best to update the virus definitions. This is done by connecting the computer to the Internet by an ethernet cable if your Live CD supports it.

Scan for Viruses

Kaspersky typically finds viruses like this, a trojan named Packed.Win32.Katusha.o.

Boot Computer and Fix Internet Redirects

Boot the computer, then check for a Proxy setup in Internet Explorer’s Connection Settings. If there is one, disable it by changing to automatic settings. Similarly, check your network connection properties for IPv4 TCP/IP. Often you will see something like this, which should be changed to automatic settings.

Install Microsoft Security Essentials

There are a lot of decent Antivirus programs, but I like Microsoft Security Essentials because it finds viruses, is lightweight, and is free without nagware.

Other Things To Do

If there are still problems, other things that can be done:

  • Install Malwarebytes Antimalware or other antivirus software if you still suspect problems. You should not typically run multiple antivirus programs at once.
  • Boot into Safe Mode (F8 key at computer startup) to make system changes if you suspect that there is still an active virus. Or try another Live Rescue CD.
  • Uninstall unused or virus-installed programs, available in Control Panel – Uninstall a Program.
  • Remove startup items from Programs – Startup folder. You can also remove startup items by typing msconfig into the Start or Run box.
  • Give up on system. Wipe the hard drive and reinstall the operating systems and programs. Sometimes this is the only remaining option if the operating system has been severely compromised. By pulling the drive and connecting to another computer as a peripheral drive, you can backup the data.

Run Windows Update

By running Windows Update and installing all the service packs, you are applying security patches and reducing the likelihood of getting viruses in the future.

Conclusion

Viruses can be scary and destroy your data. These steps can help, but once you have a virus, there are no guarantees. An infected computer is owned by the virus folks.

Therefore, in addition to protecting your computer, you should have backups of your important files such as photos or financial documents. If you have sensitive data, it can be encrypted with TrueCrypt or other tools.

Manage License Keys for Windows and Office

Find Product Keys

Most businesses have trouble keeping track of their license keys. A tool to see what keys you are using for Windows and Microsoft Office is:

LicenseCrawler by Klinzmann

It’s free software. The author jokingly requests that users send him a picture of their hometown instead of payment. Must be funny in German.

Still, it’s simple and streightforward software to help you find the product keys.

Change Microsoft Office Key

If you install Microsoft Office and find that the key is already in use, there is a quicker way to try another key instead of performing a full uninstall and reinstall of Office.

  • Click, Start – Run
  • Type Regedit
  • Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\”version”\Registration
  • Click the plus (+) sign and you should find a couple of items that you need to delete: DigitalProductID and ProductID. One or both of these should contain a 32-character {GUID} (globally unique identifier).
  • Save and close the registry, reboot, and start MS Office again. It should ask you to enter another product ID and attempt registration.

PC Malware Infections on the Rise

The Microsoft Security Intelligence Report (SIR) outlines PC security threats and is based on data captured by Microsoft. Here is a download to the latest volume, covering the first half of 2010.

Much of the report covers recent botnets. Botnets start when a virus infects a computer, either through spam or an infected web page. The virus puts the Windows machine under the control of the botnet, typically run by criminal syndicates. The report explains how criminals use and share your information.

Viruses are on the rise. In the three months between April and June 2010, Microsoft cleaned up more than 6.5 million infections, twice as much as the same period in 2009.

This chart shows the number of computers cleaned by Microsoft, listed by country.

This map illustrates the percentage of computers infected in particular regions. The infection rate was highest in South Korea where 14.6 out of every 1000 machines were found to be enrolled in botnets.

Stay Safe

As always, be sure to run Windows Updates and some form of Anti-virus. I prefer the free Microsoft Security Essentials, which I find to be just as effective but less of a memory hog than anti-virus by Symantec or McAfee.

Or you can just use a Mac which has had almost no threats. The only real-world attack that I know of for the Mac was a Trojan-infected version of Apple iWork that you would get from a pirated torrent download site. Besides that, the only Mac threats have been proof-of-concept attacks developed by researchers but never used.

Visualize Your Hard Drive to Free Space

It’s sometimes difficult to find out what’s taking up all your computer hard drive space. That’s why I like these free programs which visually display the contents of your hard drive by file size. These programs make it easy to find and delete large files and directories that you no longer need.

For Windows – Disk Space Fan

Disk Space Fan shows you a beautiful fan of your hard drive space. Here’s a video of how it works. When you install the free version, it allows you to use the Pro version for free for 15 days, then it reverts to the free version automatically. All the basic tools are included in the free version though.

UPDATE: Daniel in the comments alerted me to the fact that Disk Space Fan is a ripoff of the Mac app DaisyDisk available at http://daisydiskapp.com.

For Mac – GrandPerspective

GrandPerspective for Mac OS X is similar to Disk Space Fan but chooses the box metaphor to visually display your files. The first segment of this video explains how it works.

For more ideas on saving hard disk space, look at the Lifehacker article How to Analyze, Clean Out, and Free Space on Your Hard Drive.

Microsoft Security Essentials 2.0 Beta

My favorite free security software for Windows is Microsoft Security Essentials from Microsoft, the folks who should be protecting their operating system.

Microsoft just came out with a beta of their next version, Microsoft Security Essentials 2.0 featuring:

  • Windows Firewall integration– allows you to turn on or off the Windows Firewall during setup.
  • Enhanced protection from web-based threats – integrates with Internet Explorer to provide improved protection against web-based attacks.
  • New protection engine – offers enhanced detection and cleanup capabilities with better performance.
  • Network inspection system – protects against network-based exploits.

To get the new version, go to the Microsoft Connect site and fill out the beta registration information. Then you’ll see instructions for downloading and installing the beta.