INFECTION

http://usa.kaspersky.com/resources/symptoms



                                       
             What are the symptoms of an infected computer?
It’s not always easy to tell if your computer has been compromised. More than ever before, the authors of viruses, worms, Trojans and spyware are going to great lengths to hide their code and conceal what their programs are doing on an infected computer. That’s why it’s essential to follow the advice given in
this guide: in particular, install Internet

________________________________
Here are just a few examples:

Your friends tell you that they have
received e-mail messages from your
address and you haven’t sent
 them anything.

You get lots of system error messages

You notice that files or folders have been deleted or changed.

You notice hard disk access (shown by one of the small flashing lights) when you’re not aware of any programs running.

Your web browser behaves erratically, e.g. you can’t close a browser window.

Your personal firewall tells you that an application has tried to connect to the Internet (and it’s not a program that you ran).


security software, make sure that 
you apply security patches to your
operating  
system and applications
and backup 
your data regularly.
It’s very difficult to provide a
 list of characteristic symptoms of
a  compromised computer because 
the same symptoms can also be
caused by hardware and/or
software problems.

____________________________


Your computer ‘freezes’ frequently, 
or programs start running slowly.

.The operating system will not load
when you start your computer.

Your computer behaves strangely,
i.e. in a way that you haven’t
seen before.

You see unexpected messages or
 images.

Programs start unexpectedly.

You hear unexpected sounds, played
 at random.







  
What to do about it? 
If you can follow the instructions below, you  can
try to fix it ~     
Or, you can contact me. 

Don’t panic if you experience any of the above.  You may have a hardware or software problem,
rather than a virus, 
worm or Trojan. 
Disconnect your computer from the Internet.
If your operating system will not load, start the computer in Safe Mode (when you switch on the computer, press and hold F8 as soon it begins, then choose 'Safe Mode' from the menu that will appear), or boot from a rescue CD.
Make sure your anti-virus signatures are up-to-date. If possible, don't download updates using the computer you think is compromised, but use another computer (e.g. a friend’s computer). This is important: if your computer is infected and you connect to the Internet, a malicious program may send important information to a remote hacker, or send itself to people whose e-mail addresses are stored on your computer.
If you have any problems removing malicious programs, check your Internet security vendor’s web site for information on any dedicated utilities that may be needed to remove a particular malicious program.


If your computer is connected to a local area network, disconnect it from the network.


Scan the whole computer.
If a malicious program is found, follow the guidelines provided by your Internet security vendor. Good security programs provide the option to disinfect infected objects,
quarantine objects that may be infected,
and delete worms and Trojans.

They also create a report file that lists
the names of infected files and
the malicious programs found on
the computer. 
If your Internet security
software doesn't find anything, your
machine is probably not infected. Check
the hardware and software installed
on your computer (remove any unlicensed software and any junk files) and make
sure you have the latest operating system
and application patches installed.
If necessary, contact your Internet security vendor’s technical support department for
further advice. You can also ask them
how to submit a sample file for analysis
by a virus researcher.