Repair Status Form Technical Support Form Service Inquiry Web Form Pick up and drop off form Service Inquiry Web Form Pick up and drop off form Service Inquiry Web Form

Custom Computer Consulting Malware Antivirus Removal

At some point in time during the service of a computer it is likely to become infected with some form of virus, malware, or spyware program. if you have not already unknowingly been infected. There is some things you should considered before you have any computer specialist exmaine your infected computer.

Cost Factor (associated w/Virus Removal)
Most computer repair centers offer some form of service to remove an infected machine. They use various program that are available on the market. Some are FREE while others require a fee to register. They then scan the disk and remove whatever the program detects, charging you $40, $60, $100.00 for 15 minutes of work. However, what happens to those that remain undetected or those that are never completely removed from the system. You take the system home and start using it. Suddenly, it becomes infected again and back you go to the shop to pay more money.

Software Anti-Virus Programs
First off, virus programs work better in blocking the infection then actually removing the infections. Once the infection has occurred it is difficult in knowing how far the program has infected the computer system. Some programs may help in stopping the servility of the infection once the infiltration has occurred. In principle they do remove some but no all infected files from your system. Some infected files can conceal themselves within the operating system and when attempting to remove it they can replicate them itself. Other additional techniques involve the modifying, replacing of common executable files, placing themselves in boot sectors, batch files, and other locations on your computer. If the program is unable to remove it this will require more thorough examination of the register file (a hierarchical database that stores configuration settings and options on the Windows operating systems.) to locate the infected region and to remove all reference from the file.

Issues w/AntiVirus Programs
Most antivirus software only works by installing references to itself in the registry, fixing the registry does not always remove the file containing the infection.. As long as that file exists, you're still technically infected, and are at risk of re-enabling it. In most cases there is really no way to assure that the infection has been fully removed. Viruses, anti-spy, and malware programs relay on already known virus, by way of last virus signature update to detect the present of an infected computer. Some even have problems removing them completely from the system, leaving fragments of code hidden and protected on your drive or registry enters waiting to revive them to life. It is possible for a new virus to be release into your PC and remain unnoticed by your antivirus software.

CCC- Recommends
Custom Computer Consulting recommends a different and much stronger approach in handling a infected computer. To assure that your computer is clean from infection we use special tools to clean and scribe your hard drive. This means we wipe clear the contents of the entire drive and those files that may remain hidden will be scrambled by using a high grade encryption program rendering any virus program inoperable. This method of attack will assure that no virus or malware program remains. We will then assist you in implementing the appropriate security measure giving our client's the maximum possible protection against future infections.

CCC - Follows Security Experts Recommendations
Many security experts in the field agree the best way to remove any virus is to thoroughly scrub the drive and reload the computer with a fresh operation system to assure that the drive is completely free of any infected files.

CCC- Performs The Following Security Measures

1st We will perform repeatedly a scrabbling of the hard drive using military guard encryption. The will scrabble any hidden and protected files that remain on your drive.

2nd We will then reformat the drive completely and check for any errors. Identifying and marking those sectors that are questionable and unusable to store data -- assuring the integrity of the hard drive.

3rd We will then reload of the operating system and apply the latest service packs.

4th If requested retrieve any recoverable important data you wish to be save.

5th If requested, we offer a service that can assist in reinstallation of any programs including those associated with any of your other devices.

6th Afterwards, we will then instruct our client's on how to prevent future infection from infiltrating your system.

CCC - Criteria before a Complete Reinstall of an OS

Bullet Point
Type of Virus
Bullet Point What it has targeted on your system
Bullet Point Cost & Time Required to successfully remove it
Bullet Point The probability it may propagate itself somewhere else
Bullet Point Does it replicate itself when attempting to remove it
Bullet Point Has any other files been infected(i.e. OS / Program Apps)

If the system is too badly infected we will not spend any additional time needed to remove all the infected files before reinstall the operating system. Custom Computer Consulting fellows a simple rule if it takes more then 20 minutes to successfully remove any infection a full reinstall will be necessary. Our client's time is important to us.

Malware/Virus FYI

Malware (malicious (or malevolent) software created by attackers to disrupt computer operation, gather information, or gain access to private computer systems. No matter what type of attack you encounter the damage to your computer’s operating system and it important file can become compromised. The common type of infections include computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs.

Virus/Worms
Virus and worms are known for the manner in which they are spread, rather than a specific type of behavior. The term computer virus is used to infect a programs executable file and when ran causes the virus to spread across other executable files. A worm is a program that actively Transmits itself over the network to infect other computer -- requiring no user intervention.

Trojans horses, rootkits, and backdoors
For a malicious program to work it must be able run undetected, shut down, or deleted. A Trojan horse disguises itself as something normal or desirable. Trojan horse is a broad term. It is any program that invites the user to run it, concealing harmful or malicious code. The user may will fully install it without realizing it as it may be bundled within the program installer.

Rootkits
Rootkits is a technique which allows the concealment of the malware by modifying the host’s operating system so it may remain hidden from the user. Rootkites can prevent a malicious process from being visible to the system list of processes or keep it files from being read. Some malicious programs contain routines to defend against removal, but to resist attempts to remove them – replicating themselves.

Bookdoors
A backdoor is a method of bypassing normal authentication procedures. Once a system has been comprised, one or more backdoors may be installed in order to allow easier access.

CCC - Service Time
It will depend on how much of the infection has penetrated the system and if it can be successfully removed. If the operating system needs to be reinstalled we allocate a minium of two hours. A normal reinstall takes between 90 to 180 minutes to perform -- assuming that all information and disks are available at the time of reinstall. This does not include any reinstallation of applications or devices. Just the OS and any WEB updates (service patches).

CCC - To Schedule a Service (Select the appropriate ICON from the sidebar)

Last Update: 8/20/15 11:31