|
Call: 1-877-2-GET-PMX
Call: 1-877-249-8769

Virus Removal

Welcome to PMX Computing!  Our main goal is to help you with your computing needs.  Let us show you our Virus Removal strategies.

 

Viruses are one of the most lethal threats to any computer.  Here are some viruses to look for:

 

Trojan Horse:
A Trojan Horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly, the program performs other undesired functions. A Trojan Horse neither replicates nor copies itself, but will cause damage or compromise the security of the computer. A Trojan Horse must be sent by someone, or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user.  These include data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

 

Worms:
A worm is a program that makes and facilitates the distribution of copies of itself. For example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

 

Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

 

Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and stays in the computer's memory after it's initiating program closes.

 

Rootkit Virus:
A Rootkit Virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term Rootkit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files.

 

Polymorphic Viruses:
A polymorphic virus not only replicates itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated anti-virus software to detect.

 

Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

 

Basic virus removal is $125. A charge of $75 per hour will be applied depending on services required.

 

Do not tread lightly into the world of Computer viruses.  PMX is a dutiful friend who can help remove these viruses!

 

Contact PMX for Virus Removal.  Find us on Facebook!

 

PLEASE COMPLETE THE FOLLOWING FORM. A CONTRACT WILL BE GENERATED BASED ON THE INFORMATION PROVIDED.

Virus Removal

computer repair computer virus Virus Removal PC Repair pmx business computer repair services Fake Alerter pmx computing pmx computing inc web development web marketing web developer web server Website campaign management joomla developer SEO Geek Squad

Home Virus Removal