How to get virus off

A lot of time this happens that while browsing the internet and downloading files, there are some additional malicious files which gets downloaded and installed on the system. These files can also be loaded from an external storage. 

You may have thought it was funny at first but the virus that you opened that was supposed to be just another file doesn’t go away very easily. Even If you restart your computer it will start again. 

Here's what you can do -

1. Right click on the task bar and open task manager.

2. Go into processes and end the process csmm.exe

3. Go to the toolbar and click start.

4. Click on My computer

5. Click on C:

6. Click on Windows

7. Click on System 32

8. In system 32, search for the file that says csmm and delete it. 

9. Restart your computer and the virus won’t start again.

Other problem can be -

Due to any virus effect if your computer displays a message like “your computer will shutdown within 1 min” then try this:

1> Go to start.


2> Then to run.


3> Then in run menu type SHUTDOWN-A.


4> And the effect of the virus will be neutralized.

Read more about malicious files - 

Malicious files, also known as malware, are computer files designed with the intent to harm, disrupt, or gain unauthorized access to a system or network. These files can pose serious threats to individuals, organizations, and even entire nations. Malicious files come in various forms and can target different aspects of a computer system, including its operating system, software, or data.

Here are some common types of malicious files:

1. Viruses: Viruses are self-replicating programs that attach themselves to clean files and infect other files when executed. They can corrupt or delete data, spread to other systems, and often require human interaction to propagate.

2. Worms: Worms are similar to viruses but do not need a host file to spread. They can replicate and spread independently, usually through network vulnerabilities, email attachments, or instant messaging platforms.

3. Trojans: Trojans, named after the Trojan Horse in Greek mythology, masquerade as legitimate files or software. Once installed, they can create backdoors, steal sensitive information, or provide unauthorized access to a system for the attacker.

4. Ransomware: Ransomware is a type of malware that encrypts files or locks the entire system, rendering it inaccessible to the user. Attackers demand a ransom to provide the decryption key, often in the form of cryptocurrency, in exchange for restoring access.

5. Spyware: Spyware is designed to gather information without the user's consent. It can track keystrokes, capture screenshots, record browsing habits, and transmit sensitive data to the attacker. Spyware is often used for surveillance or stealing personal information.

6. Adware: Adware displays unwanted advertisements, usually in the form of pop-ups or banners, to generate revenue for the attacker. While not inherently malicious, adware can degrade system performance, compromise user privacy, and be difficult to remove.

7. Rootkits: Rootkits are sophisticated malware that provide unauthorized access to a system while concealing their presence. They replace system files, modify system configurations, and give attackers full control over compromised devices, making them difficult to detect and remove.

Preventing and mitigating the risks associated with malicious files involve several best practices:

1. Use reliable antivirus and anti-malware software and keep it up to date.

2. Regularly update your operating system, applications, and firmware to patch security vulnerabilities.

3. Be cautious when downloading files or opening attachments, especially from unknown sources or suspicious emails.

4. Enable automatic updates for your software to ensure you have the latest security patches.

5. Practice safe browsing habits, such as avoiding suspicious websites and not clicking on unverified links.

6. Regularly back up your important data to protect against ransomware attacks.

7. Educate yourself and your employees about safe computing practices, including recognizing phishing attempts and social engineering tactics.

In case of a suspected malware infection, it is essential to isolate the affected system, disconnect it from the network, and seek professional help to remove the malicious files and restore the system's integrity.

Remember, maintaining a strong defense against malicious files requires a combination of technology, user awareness, and proactive security measures.

No comments:

Post a Comment