Hacked PC; You have opened an attachment from your e-mail and your computer has started to crawls. It's not just that, but it starts to happen a lot of strange things. Your bank has invited you to say that there was some strange activity in your account and your ISP does not seem to provide your computer with your internet because they claim to be a botnet's slave.
If your computer is infected and infected with a virus, you need to take action immediately. You'll probably want to keep your files and prevent intruders from using your computer to attack other computers. Below are 10 basic steps to follow immediately.
1. Isolate your computer
Disconnect, it's a tool in his hands hacker which moves to threads. you should isolate your system in such a way that it cannot communicate with the network. Isolation will save your other computers and lock the hacker out. Simply pull the network cable from your computer and turn off the Wi-Fi connection. If you have a laptop, there is a switch that turns off Wi-Fi. Don't do this with any software, as the hacker's malware may have anticipated it.
2. Turn off the pc, remove the hard drive and connect it to another computer as a non-bootable disk
Stop your computer and remove the affected hard drive. Connect the disc to another computer as a secondary non-bootable disk. Make sure the other computer has up-to-date anti-virus and anti-spyware. Download a free rootkit scanner from a trusted source, such as Sophos.
If you do not want to remove your hard drive or you do not have a backup computer, go directly to the infected computer to a reputable PC repair shop.
3. Scan your disc
Use the other computer anti-virus, anti-spyware, and rootkits scanner to locate and remove any infections from your hard drive.
4. Back up your important files
Take your personal data and only that. Copy them photos your documents, videos, or anything else on a DVD, or some other clean hard drive.
5. Remove your hard drive from your computer
After the backups, you can move your disk back to your old computer and prepare for the next part of the recovery process.
6. Completely delete your old hard disk (Format and new Partition)
Even if the virus or spyware is gone with scanning, you should still not trust your computer. The only way to make sure the drive is completely clean is to format and reinstall your operating system.
Once you have backed up all your data and put the hard drive back on your computer, use a secure disk eraser tool to wipe the hard drive. There are many free utilities and commercial eraser on disk. Utility wipe disks can take several hours to completely erase the disk because they replace every partition of the hard disk, even these gaps, and often make several passes to ensure that you do not lose anything. There are disk deletion applications that perform several "passes" to make sure that each sector is completely deleted. The process can be time consuming, but it will ensure that you eliminate the threat.
7. Relive your operating system from trusted media and install the updates
Use the original disk of your operating system that you purchased or that came with your computer, do not use something that has been copied from somewhere else or is of unknown origin.
Make sure you download all updates and patches to your operating system before installing anything else.
8. New installation of anti-virus, anti-spyware or other security software before any other programs
Before installing all your other applications, you must install the security software of your choice. It should be ensured that the anti-virus is up-to-date before installing other applications. Some of these may have caused you the problem.
9. Scan backups from your other computer
Even if you are pretty sure everything is clean, scan the data again before re-inserting it back into your system.
10. Make a full backup of your system
When your computer is like new and contains all the programs you use regularly make a full backup so that if it ever happens again you don't have to do the whole process above. Using a backup tool that creates a bootable picture hard drive will secure you and save a lot of your time.