Home / Computers

The Removal Of Sin: Post-Infection Cleaning

By:James Monahan

Computers have become a central part of our daily lives since the first personal computer rolled of the assembly line. It has been doing most of our encoding and word processing chores since then on.

Schools, libraries and classrooms have deployed computers to be an aid in teaching children the basics of learning. And it has become one of the most powerful and irreplaceable piece of equipment for home, education, industry, government, commercial, media and even military use and it still does not stop there.

Computers have long surpassed the age when it was just a calculator for big number operations and a typewriter for memos and other short documents. Along with the upgrading of the computers, people also thought of a way that they could make the computers to communicate and share information.

The network was born out of the need to have communication in big companies to lessen the time that was spent by walking over to the person. And the Internet was born out of the need to communicate with all of the people that we know that we have been separated from by mountains, oceans, and even deserts.

With the introduction of the Information Superhighway, people became more dependent on computers. Computers have turned into some sort of a central equipment that is necessary for the society we live in to function.

But what happens when you cruising along the Information highway and you were struck by a worm. No problem right Iím protected by my Anti-Virus program. But what if youíre not?

Early this year Microsoft released a software they call the Removal tool. The removal tool is a post infection removal tool. What that means is, if virus has struck your computer and you have no knowledge of it this removal tool will take care of that.

The Microsoft Windows Malicious Software Removal Tool scans your computer for a prevalent malicious software that has been running around your computer. Because most computers operate normally even after an infection this removal tool will help you save your computer future complications if the malicious software persists.

The removal tool works around the programs in your computer and finds malicious prevalent softwares like Blaster, Sasser and Mydoom.

The removal tool is not an anti-virus program so it does not have the capability of blocking viruses and infecting your system. But it does work with your anti-virus software program. It is strictly a post infection removal tool.

And installation of the removal tool is no problem because it does not contain any executory file that would be installed in the program files in your computer. The removal tool is activated online. But there are some requirements for you to download and run the removal tool in your computer.

For you to download the removal tool you must have Microsoft Update, Windows Update, Automatic Updates, The Microsoft Download Center, The Malicious Software Removal Tool Web site on Microsoft.com and for you to run it your computer must be on.

The computer must be running Windows Server 2003, Windows XP, or Windows 2000, You must log on to the computer by using an account that is a member of the Administrators group.

So there you go, all the things you need to know for you and your computer to stay connected and virus free.

Article Source: http://www.redsofts.com/articles/

James Monahan is the owner and Senior Editor of
RemovalSite.com and writes expert
articles about removals.

More Articles from Computers Category:
Bluetooth Profiles Explained
A Look At Bluetooth Security
Top PC Hardware Accessories to Boost your Gaming Performance
Bluetooth Wireless Operation
Finding Hip Hop Mix Podcasts
How to Get FREE Internet Access on Your Computer on the Move?
Eagle One: Harrier JumpietóCheap Game for Playstation
Dueling Duals: ATI Puts SLI into the CrossFire
Should I Buy A Laptop Or A Desktop?
How to Choose Between External Storage And Internal Storage Drives
Keep Your Computer Cool
Video Games: Therapy Or Addiction?
The Many Faces Of Computer Games
Protecting Your Data in an Insecure World
Building Cheap Computers in 3 Easy Steps


2006-2008 RedSofts.com - Privacy Policy