dcsimg

Find an IT Download

Recovering from a Trojan Horse or Virus

Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?


432 KB | 3 files | null DOC,null PDF

It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?

If you know what specific malicious program has infected your computer, you can visit one of several antivirus websites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps (Trojan Recovery.pdf) may help save your computer and your files.

Included in this zip file are:

  • Intro Page.doc
  • Terms and Conditions.pdf
  • Trojan Recovery.pdf

Related IT DOWNLOADS

Recent IT Downloads
Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic conce...Read More

Recent IT Downloads
A Rational Foundation for Software Metrology

This report lays the foundation for a rational approach to software metrology, with the scope ...Read More

Recent IT Downloads
Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin po...Read More

Recent IT Downloads
Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance req...Read More