16 Apr

Computer Infection Education series VI


“The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.”

This word is actually a proper blanket term for most infections currently circulating. This includes, worms, adware, spyware, or trojans. This software refers to the malicious intent of these kinds of infections. Malware is after all a short word for Malicious Software .

If “pink is the new black”, then malware is the new virus. Using this term in the proper context will show off your new Computer Infection Education!

Brad Button

13 Apr

Computer Infection Education series V


“Worms use a computer network to send copies of itself to other computers on that network“

  This malware does self replicate like a virus, but it’s small and doesn’t piggy back with other programs. Instead, it clogs up a network by constantly trying to find other computers to compromise.

In my personal experience, these infections tend to by odd in nature and in most cases may not make itself known to the user. They can be used to compromise and control large amounts of computers on a network or lay dormant on a timer. These may be first noticed by a firewall or by network performance issues.

In my opinion, this is where good preventive measures really shine. If you suspect you have a worm, I recommend disconnecting from your current network (both wired and wireless.) This helps any other computers that you have on the network from becoming infected.  

Keep your antivirus and anti malware/spyware protection updated!

 Brad Button

9 Apr

Computer Infection Education series IV


“A rootkit is a software program or coordinated set of programs designed to gain control over a computer system or network of computing systems without being detected.”

  Rootkits are the scourge of all computer technicians and their customers.

This is the means by which your infection keeps coming back even after full scans and manual infection removal. This program can hide files so well that even windows won’t know they exist!

If the rootkit is so new that antivirus companies are unaware of them, it is possible the infection can only be removed by way of full system format. As stated above, they can be so elaborate that even after you do all the scans in the world, hidden files will not only slip through, but they will re-infect your system.

If you think you have a rootkit, I personally recommend that you call a technician as soon as possible if all other scans have failed. We have a very high success rate with these nasty infections, and the sooner you call the easier it is to avoid extreme measures.

Brad Button

2 Apr

Computer Infection Education series III


“Trojan horses are designed to allow a Hacker remote access to a target computer system.”

  Trojan is another word used often as blanket term for malware or a virus. This sneaky program does not replicate itself like a virus. It’s not the malware you will eventually see from this infection.

When I come across Trojans they are typically used as the doorway that serious infections use to get in your computer. For instance, you may click the wrong pop-up, which then infects you with a Trojan – Usually by way of a scare tactic, system optimizer, or error fixing program.  Once installed, it lets a remote system know you are vulnerable to attack by the main infection. Preventing or removing this threat can mean the difference between an infection that requires a tech and a simple scan with your antivirus and/or malware removal program.

If your antivirus detects and reports a Trojan to you I always recommend you stop what you are doing. Save and close your current work and do a full system scan.

 Brad Button

Florida tax-free weekend

Just a note if you are in the market for a new computer, Florida’s tax-free weekend is happening today through Sunday, [&hellip

Summer is here!

It’s time to check your equipment to make sure your computer is protected from these summer storms and power outages. [&hellip

Follow Us!

Follow Us! Follow Us! Follow Us!


Helpful Links