Hunt For the Best Malware Removal Site

Posted: 03/10/2011 in All Teched UP!, antivirus, Apps, free stuff, Geek Stuff, How to...., Indepth
Tags: , ,

If I had a credit for every person that has come to me and told me that their machine is infected with something or their machine is doing strange things, I’d be a rich engineer by now.

Now wouldn’t it be great to have a website that you can reference for self education and removal tips. Well look no further Select Real Security is your one stop shop for all your security needs.

 ‘This website provides you with useful resources and information on computer security. It contains over 100 links to a variety of useful security related resources, including articles and guides on malware prevention, protection, tips, and more. It also contains information on how to secure your computer, data, and internet connection from malicious attacks.’
The site contains the following pages

Here is a section from the quick tips page, as you can see the advise is solid and reliable.

Quick Tips for Computer Security

There are several ways you can protect your computer and data from malicious attacks. Most of them can be done at no cost at all. Here are some simple tips that will help keep your computer and data safe.
  1. Stay away from warez (pirated software), cracks, keygens, and programs from P2P.
  2. Install ALL of your Windows updates (e.g. software updates, security fixes, patches, service packs).
  3. Back up your important data regularly. How do I back up my data?
  4. Keep your system and software updated. How do I keep my software up-to-date?
  5. Use a good antivirus program. Best Free Antivirus Software
  6. Do not open email attachments from unknown sources or files sent through an instant messenger.
  7. Only download software from trusted sources (e.g. Filehippo, Softpedia, Cnet).
  8. Choose strong (complex) passwords. Passwords should be a minimum of eight characters and contain a combination of letters (uppercase/lowercase), numbers, and special symbols (!,@, #, &, %, *). 
  9. Disable unnecessary plug-ins in your web browser. This will help keep you safe from malicious scripts and activeX exploits.
  10. Use a secure DNS service such as OpenDNS or Google DNS. List of Free Secure DNS Services
  11. Do not believe every virus warning you receive; many are hoaxes and scareware. How To Identify and Avoid Antivirus Scams
  12. Remain as anonymous as possible. Do not give out your full name, address, phone number, or other personal information to anyone you do not know or who doesn’t have a legitimate need for it (in person, over the phone, via email, or the Internet).
  13. Turn off your computer when you are not using it. If the computer is on and connected, then it can be exposed to an attack.
  14. Replace programs that have a bad security track record (e.g. IE, Outlook, Adobe Reader).
Select Real Security also provides PDF downloads to help explain security in plain English (see below)
Brian from Select Real Security says

‘Many different symptoms indicate a malware infection. Sometimes, the symptoms can be difficult to detect. Below is a list of symptoms you may experience when your computer is infected with malware. Note that the first three symptoms can also be caused by hardware problems.’
  • Your computer shows strange error messages or popups.
  • Your computer takes longer to start and runs more slowly than usual.
  • Your computer freezes or crashes randomly.
  • The homepage of your Internet browser has changed.
  • Strange or unexpected toolbars appear in your Internet browser.
  • Your search results are being redirected (random websites).
  • You cannot access security related websites.
  • New icons and programs appear on the desktop that you did not put there.
  • Your desktop background has changed without your knowledge.
  • Your programs won’t start.
  • Your security protection has been disabled for no apparent reason.
  • You cannot connect to the internet or it runs very slowly.
  • Your programs and files are suddenly missing.
  • Your computer is performing actions on its own.

If you can say ‘YES’ to any of the above, take a trip over to Select Real Security and have a read of the vast material and resources contained in this site.

Follow Select Real Security on Twitter and Facebook


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s