All
All

Recovering from a Trojan Horse or Virus

432 KB | 3 files | null DOC,null PDF

Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?

It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?

If you know what specific malicious program has infected your computer, you can visit one of several antivirus websites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps (Trojan Recovery.pdf) may help save your computer and your files.

Included in this zip file are:

  • Intro Page.doc
  • Terms and Conditions.pdf
  • Trojan Recovery.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ...  More >>

DataM46 A Rational Foundation for Software Metrology

This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being software as the object of measurement. ...  More >>

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.