Click for Home Page
Malware Information Center
   Malware Information Center
Products and Services
E-Mail Center
Technical Support
Virus Center
Site Map Virus, Spyware and Malware Center

1. Overview, Sources and Threats of Malware
2. Preventing Intrusions
3. Suggested Programs to Install on Your Computer

Overview, Sources and Threats of Malware

Everyone Must Be Aware

Now that computers are used in large numbers, unscrupulous people are attacking them. The various forms of malicious software (malware) such as viruses, trojans, worms, spyware, and other intrusions threaten every computer.

Not convinced on just how big a threat malware is to your computer? Or how rapidly it can become infected? Read the article 12 Minutes to PC Infection.

IOCC.COM offers this page as a beginning point in the fight against unwanted intrusions.

If your virus program and "definitions" or "updates" are more than one week old, they are out of date!

Already Infected?

If your computer is running slowly, or if you have been notified of a complaint pointing to a virus or malware problem on your computer, we suggest these steps:
  • Download and install a program from the "Viruses, Worms and Trojans" section (see the "Programs to Install" link, above. "AVG Free" is one of our favorites. You might find one of the stand-alone or online scanners to be more useful in initial removal.
  • Download and install at least one program from the "Spyware, Adware, and other Malware" section (see the "Programs to Install" link, above). "Ad-Aware" and "Spybot" are our long-term favorites. Windows 2000 and Windows XP users will probably find "Microsoft Antispyware" easier.
  • Once installed, run each program. Obtain the updates for each, run the scans for your entire computer until they are completed. Choose the options to remove or quarantine the viruses or malware. Then, reboot your computer.
  • If the program finds problems, run the scan again after the reboot. Keep doing this as long as the number of problems found changes (either up or down) until there are no longer any problems detected.
  • If the program cannot rid your computer of problems, try another program from the list.
  • Read the Recovering from Viruses, Worms, and Trojan Horses article at US-CERT.
If you are not comfortable with the virus and spyware removal procedures, and Pinnacle Computers provide the services at reasonable rates. Give us a call.

The Sources of Malware

Malware takes several forms such as viruses, trojans, worms, spyware and fraudulent practices. The most common means malware utilizes to infect your computer are:
  • E-mail
  • Web browsing
  • Removable media and networks
  • Operating system, from Oxford University, Harvard University, and Consumer Reports.

Current Big Threats

Authentium's Threat Matrix (Authenium is one of two anti-virus scans utilized by Postini).

In addition, look at this list of top viruses and advisories and notice how recent they are dated! Now you can understand why you must keep your anti-virus program updated! See links to "Prevention" and "Programs to Install on Your Computer" (above).

1. Overview, Sources and Threats of Malware
2. Preventing Intrusions
3. Suggested Programs to Install on Your Computer

Home • Services • Application (PDF) • Email • Terms & Conditions • Privacy Policy • Support • Anti-Malware • Site Map • Community • Weather • Search • Bookmark • Printer Friendly

Address:, LLC
PO Box 1026
Arkadelphia, Arkansas 71923

Billing @
Support @

Telephone Numbers:
Local: 870-246-6923
Fax: 870-403-9448

All trademarks and logos used in this site are the property of their respective owners. All other content copyright ©2003-2018, LLC. This page was retrieved from on Wednesday, February 21, 2018 at 4:42 am CST.