Category Archives: Site Security
5 Professional Virus Removal Techniques
Virus removal can be tricky for the average computer owner. This is because, depending on the virus you catch, sometimes functions and applications that can be run are limited. In some instances the virus is so bad that the Ctrl + Alt + Delete function cant even be done. Professionals use several different, more complex techniques for virus removal on your desktop or laptop. These techniques are above the level of running anti-virus software and clicking a few different buttons to get the job done and are the biggest reasons people turn to professionals when those simple techniques just dont cut it.
Reconnecting Hard Drive
One technique professionals use is to disconnect the hard drive from the infected computer and reconnect it to a computer that has the latest anti-virus software installed on it. This is good for the computer that has been infected and not protected by anti-virus software. The hard drive is cleaned up by the clean computer. All too often, computers come to professionals that have caught a virus and have absolutely no protection whatsoever by anti-virus software, making it necessary to completely disconnect an infected hard drive and reconnecting it to one that is protected.
Safe Mode
Booting the computer into safe mode will, with some viruses, give the specialist a little bit more wiggle room to get in there and remove the virus themselves without having to resort to more drastic options like disconnecting the hard drive. In safe mode, milder viruses are kept at bay until the worker can maneuver and clear away the virus. Safe mode can also keep your computer safe from additional viruses until the first ones can be taken care of.
Reinstall Hard Drive
Sometimes with medium-toughness viruses, reinstalling the hard drive can give the computer a chance to kind of regroup and fight harder to allow the professional to manually remove viruses from it. Reinstalling the hard drive is one of those “drastic measures” listed above, because its much more difficult than running anti-virus software like with smaller virus pests.
System Restore
In cases where the virus hasnt completely limited the amount of options we can use to remove viruses, a system restore can be achieved. System restores can completely wipe out the hard drive, causing you to lose everything, or they can restore your computer to a date previous to when the problems started, back to a time when the virus wasnt there. System restores can be very effective, but professionals are best to carry them out to prevent any more data loss than necessary.
Advanced Anti-Virus
Anti-virus software that you buy in a store and install on your computer is often quite simple and works best for simple, less complex viruses. Hard-hitting, debilitating viruses, however, sometimes require more advanced and complex anti-virus software. Software like this is most often used by professionals and allows them to get a more firm hold on the virus (especially those tough ones) an eliminate them more thoroughly.
Understanding Computer Security Dangers in the Digital Wild West
Today, more than ever, criminals are targeting computer systems in an attempt to wreak havoc. Complacency and ignorance, regarding security issues, are computer hackers best friends. Computer Repairs Brisbane understands these risks and can help you implement a risk mitigation strategy. Some of the methods used to collect information about a system, network, and its users are: footprinting, scanning, and enumeration.
Footprinting is the methodical gathering of information about a company or individuals intranet, extranet, internet, and remote access usage. Hackers exploit publicly available information like the name, address, and contact information for the party who registered the domain by using whois services. They harvest employee, vendor, and location details from the companys website. With an employees first and last names, hackers are often able to guess their usernames. More investigation of the employee on social networks will reveal a date of birth, children, spouses, and pets names, home addresses, and phone numbers. Unfortunately, these are the very things that many people use as passwords.
Scanning is the electronic equivalent of casing a home or business for easy access. A burglar will check for unsecured windows and doors. Hackers search for unsecured networks by using ping sweeps, port scanning, and active operating system detection tools. If a hacker can access an unsecured port, they can exploit known vulnerabilities in your operating system or other application software.
Enumeration techniques seek out information about the services running on the network. Cyber criminals use banner grabbing to watch the output from remote applications. Applications like telnet send usernames and passwords across the network in plain text. Given the fact that many people use the same usernames and passwords for access to many different systems, this compromise can be devastating.
These are just a few of the methods used by hackers to document, assess, and attack your systems. Let Computer Repairs Brisbane be your first line of defense. Our technicians have the knowledge and skills to help you protect your network by implementing border protections, intrusion response and detection systems, and will provide you with the information that you need to make informed security policies.
Understanding Computer Security Dangers in the Digital Wild West
Today, more than ever, criminals are targeting computer systems in an attempt to wreak havoc. Complacency and ignorance, regarding security issues, are computer hackers best friends. Computer Repairs Brisbane understands these risks and can help you implement a risk mitigation strategy. Some of the methods used to collect information about a system, network, and its users are: footprinting, scanning, and enumeration.
Footprinting is the methodical gathering of information about a company or individuals intranet, extranet, internet, and remote access usage. Hackers exploit publicly available information like the name, address, and contact information for the party who registered the domain by using whois services. They harvest employee, vendor, and location details from the companys website. With an employees first and last names, hackers are often able to guess their usernames. More investigation of the employee on social networks will reveal a date of birth, children, spouses, and pets names, home addresses, and phone numbers. Unfortunately, these are the very things that many people use as passwords.
Scanning is the electronic equivalent of casing a home or business for easy access. A burglar will check for unsecured windows and doors. Hackers search for unsecured networks by using ping sweeps, port scanning, and active operating system detection tools. If a hacker can access an unsecured port, they can exploit known vulnerabilities in your operating system or other application software.
Enumeration techniques seek out information about the services running on the network. Cyber criminals use banner grabbing to watch the output from remote applications. Applications like telnet send usernames and passwords across the network in plain text. Given the fact that many people use the same usernames and passwords for access to many different systems, this compromise can be devastating.
These are just a few of the methods used by hackers to document, assess, and attack your systems. Let Computer Repairs Brisbane be your first line of defense. Our technicians have the knowledge and skills to help you protect your network by implementing border protections, intrusion response and detection systems, and will provide you with the information that you need to make informed security policies.