What are the symptoms of an infected computer?
It’s hard to tell if your computer has been compromised. The authors of viruses, worms, Trojans and spyware are going to great lengths to hide their code and conceal what their programs are doing on an infected computer. It’s very difficult to provide a list of characteristic symptoms of a compromised computer because the same symptoms can also be caused by hardware and/or software problems.
Here are just a few examples:
- Your computer behaves in a way that you haven’t seen before.
- You see unexpected messages or images.
- You hear unexpected sounds.
- Programs start unexpectedly.
- Your personal firewall tells you that an application has tried to connect to the Internet (and it’s not a program that you ran).
- Your friends tell you that they have received e-mail messages from your address and you haven’t sent them anything.
- Your computer ‘freezes’ frequently, or programs start running slowly.
- You get lots of system error messages.
- The operating system will not load when you start your computer.
- You notice that files or folders have been deleted or changed.
- You notice hard disk access (shown by one of the small flashing lights) when you’re not aware of any programs running.
- Your web browser behaves erratically, e.g. you can’t close a browser window.
Here’s what you should do:
First don’t panic if you experience any of the above. You may have a hardware or software problem, rather than a virus, worm or Trojan.
Disconnect your computer from the Internet. If your computer is connected to a local area network, disconnect it from the network.
Start the computer in Safe Mode (when you switch on the computer, press and hold F8 as soon it begins, then choose ‘Safe Mode’ from the menu that will appear), or boot from a rescue CD.
Make sure your anti-virus signatures are up-to-date. If possible, don’t download updates using the computer you think is compromised, but use another computer (e.g. a friend’s computer). This is important: if your computer is infected and you connect to the Internet, a malicious program may send important information to a remote hacker, or send itself to people whose e-mail addresses are stored on your computer.
Scan the whole computer. If a malicious program is found, follow the guidelines provided by your Internet security vendor. Good security programs provide the option to disinfect infected objects, quarantine objects that may be infected, and delete worms and Trojans. They also create a report file that lists the names of infected files and the malicious programs found on the computer.
If you don’t find anything, your machine is probably not infected. Check the hardware and software installed on your computer (remove any unlicensed software and any junk files) and make sure you have the latest operating system and application patches installed.
If you have any problems removing malicious programs or you need any further assistance please contact BWS Technologies 334-358-6305.