Can't see it but I believe you installed it
Looks clean, great job!
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
Next we remove all used tools.
Please download OTCleanIt
and save it to desktop.
- Double-click OTCleanIt.exe.
- Click the CleanUp! button.
- Select Yes when the "Begin cleanup Process?" prompt appears.
- If you are prompted to Reboot during the cleanup, select Yes.
- The tool will delete itself once it finishes, if not delete it by yourself.
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.Hide system files
Create a new, clean System Restore point
- Open My Computer.
- Go to Tools > Folder Options.
- Select the View tab.
- Scroll down to Hidden files and folders.
- Select Do not show hidden files and folders.
- Check (tick) Hide extensions of known file types.
- Check (tick) Hide protected operating system files (Recommended).
- Click OK.
- Close My Computer.
Warning: Do not clear infected System Restore points before creating a new System Restore point first!
- Click on Start > All Programs > Accessories > System Tools > System Restore.
- On the Welcome Page, select Create a restore point. Click Next.
- Give this restore point a descriptive name and click Create.
- When done, click Close.
Please read the above to create a new System Restore point first, then clear out the infected System Restore points.Clear infected System Restore points
Keep your system updated
- Click on Start > All Programs > Accessories > System Tools > Disk Cleanup.
- Select C drive and click OK.
- Select the More Options tab.
- Under System Restore, click on Clean up....
- You will be prompted. Click Yes.
- When done, click OK.
- You will be prompted again. Press Yes to confirm.
- When done, Disk Cleanup will close automatically.
Microsoft releases patches for Windows and Office products regularly to patch up Windows and Office products loopholes and fix any bugs found. Please ensure that you visit the following websites regularly or do update your system regularly.
Install the updates immediately if they are found. Reboot your computer if necessary, revisit Windows Update and Office update sites until there are no more updates to be installed.To update Windows
Go to Start
> All Programs
> Windows UpdateTo update Office
Open up any Office program.
Go to Help
> Check for Updates
Alternatively, you can visit the links below to update Windows and Office products.Windows UpdateOffice Update
If you are forgetful, you can change some settings so that you will be informed of updates. Here's how:
- Go to Start > Control Panel > Automatic Updates
- Select Automatic (recommended) radio button if you want the updates to be downloaded and installed without prompting you.
- Select Download updates for me, but let me chose when to install them radio button if you want the updates to be downloaded automatically but to be installed at another time.
- Select Notify me but don't automatically download or install them radio button if you want to be notified of the updates.
Besides Windows that needs regular updating, antivirus, anti-spyware and firewall programs update regularly too.
Please make sure that you update your antivirus, firewall and anti-spyware programs at least once a week.Install third party firewall
As the term conveys, a firewall
is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders.
I want you to download a free firewall NOW
from one of these excellent vendors:1) ZoneAlarm
(At installing Zonealarm, please uncheck this option "include a ZoneAlarm Spy Blocker...". The Toolbar is not recommended... You can read more about it here
.)2) Agnitum3) Sunbelt/Kerio4) Comodo
(at installing Comodo, please uncheck these options: "Install Comodo SafeSurf..", "Make Comodo my default search provider" and "Make Comodo Search my homepage". If you use another antivirus, please uncheck "Install Comodo Antivirus".)5) Online-Armor FreeIf you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time. Be careful when opening attachments and downloading files.
- Never open email attachments, not even if they are from someone you know. If you need to open them, scan them with your antivirus program before opening.
- Never open emails from unknown senders.
- Beware of emails that warn about viruses that are spreading, especially those from antivirus vendors. These email addresses can be easily spoofed. Check the antivirus vendor websites to be sure.
- Be careful of what you download. Only download files from known sources. Also, avoid cracked programs. If you need a particular program that costs too much for you, try finding free alternatives on Sourceforge or Pricelessware.
Many of the exploits are directed to users of Internet Explorer and Firefox.
with NoScript add-on
helps to prevent most exploits from running as NoScript by default disables all scripts on all websites. If you trust the website, you can manually allow it.
If you prefer to use Internet Explorer, please refer to this website to learn how to secure Internet Explorer 6
To secure Internet Explorer 7, please read this article
You never know when your PC will become unstable or become so infected that you can't recover it. Follow this Microsoft article
to learn how to backup. Follow this article
by Microsoft to restore your backups.
Alternatively, you can use 3rd-party programs to back up your data. One example can be found at Bleeping Computer
P2P may be a great way to get lots of stuffs, but it is a great way to get infected as well. There's no way to tell if the file being shared is infected. Worse still, some worms spread via P2P networks, infecting you as well. If you do need to use them, use them sparingly. Check this list of clean and infected P2P programs
if you need to use one.Prevent a re-infection
- Spyware Blaster
SpywareBlaster is a program that is used to secure Internet Explorer by making it harder for ActiveX programs to run on your computer. It does this by disabling known offending ActiveX programs from running at all.
You can download SpywareBlaster from Javacool.
If you need help in using SpywareBlaster, you can read SpywareBlaster's tutorial at Bleeping Computer.
- Hosts File
A Hosts file is like a phone book. You look up someone's name in the phone book before calling him/her. Similarly, your PC will look up the website's IP address before you can view the website.
Hosts file will replace your current Hosts file with another one containing well-known advertisement sites, spyware sites and other bad sites. This new Hosts file will protect you by re-directing these bad sites to 127.0.0.1.
Here are some Hosts files:
MVPS Hosts File
Bluetack's Hosts File
Bluetack's Host Manager
A tutorial about Hosts File can be found at Malware Removal.
- Malwarebytes RogueNET Bleeping Computer
Before downloading any anti-spyware programs, always check it. This will save you from a lot of trouble. If in doubt, don't ever download it.
Here are some more things to read about:Securing SkypeGreater email safetyPhishing - what is it?80 Super Security Tips
Happy surfing and stay clean!