How to Scan & Remove Viruses: A Complete Guide

Protecting Your Computer from Major Virus Outbreaks
Periodically, reports emerge concerning new and damaging viruses rapidly disseminating online, compromising a vast number of Windows-based systems. This article details the procedures for eliminating these threats and, ideally, safeguarding against future infections.
Please be aware that a significant viral outbreak is anticipated on April 1st, 2009. This threat is known as Conficker, and we will outline the necessary precautions to ensure your security.
Essential Steps to Take During an Outbreak
When a widespread outbreak occurs, implementing the following measures is crucial.
- Run the Microsoft Windows Malicious Software Removal Tool.
- Consider utilizing the McAfee Stinger Tool as an additional security measure.
- Verify that your anti-virus software is current with the latest definitions.
- Ensure that Windows Updates are enabled to receive critical security patches.
- Subscribe to receive notifications regarding Microsoft Security Alerts.
The viruses we are addressing are not typical in nature. Standard anti-virus programs are generally effective against common threats.
These are the particularly severe viruses capable of causing system crashes, data theft, deletion of personal files – such as family photos – and even remote control of your computer by malicious actors. Such scenarios can be largely avoided through preventative measures.
These types of infections can lead to your computer being used to send spam, or participate in other illegal activities. Taking preventative steps is vital.
Utilizing the Microsoft Windows Malicious Software Removal Tool
Initiating the process of identifying and eliminating detrimental viruses and worms from a computer system involves executing Microsoft’s dedicated Malicious Software Removal Tool. While not intended as a substitute for comprehensive antivirus software, it represents a highly effective method for eradicating particularly severe threats, such as the notorious Conficker worm.
Executing the tool is straightforward; simply download the file from Microsoft and launch it. Installation is not a prerequisite, streamlining the process.
Should an infection be present, the tool will proceed with its removal and subsequently notify the user. Fortunately, in this instance, a positive message indicated the absence of malicious software. Detailed scan results are accessible by clicking "View detailed results of the scan."

Reviewing the list allows users to identify current threats and verify their system’s security status.

The tool receives automatic updates via Windows Update. However, direct download is also an option. Maintaining access to this tool is crucial for ongoing system protection.
The Microsoft Windows Malicious Software Removal Tool can be downloaded from microsoft.com.
Utilizing the McAfee Stinger Tool (Optional)
For an alternative approach, the McAfee Stinger tool presents a viable option. This freeware utility is specifically designed to eliminate the most aggressive and damaging viruses affecting your system. Before use, it’s advisable to verify Stinger’s capability to address the current viral infection by consulting the List Viruses dialog.
Ensure you are operating with the newest iteration of Stinger to maximize its effectiveness.
Initiate a comprehensive system scan by selecting the "Scan Now" button. However, be prepared for a potentially lengthy process, as a full scan requires considerable time.
Upon completion, a report detailing the number of files successfully cleaned will be generated.
While possessing a basic and somewhat unrefined interface, the Stinger tool effectively performs its intended function. It should be understood, however, that it doesn't substitute for a fully-featured antivirus program.
The McAfee Avert Stinger download is available at vil.nai.com.
Maintaining Current Anti-Virus Protection
Ensuring your digital security begins with up-to-date anti-virus software. It is crucial to verify that your chosen security program is active and functioning correctly. Consider the following steps to optimize your protection:
- Confirm that automatic updates for virus definitions are enabled.
- Verify that real-time scanning capabilities are activated.
- Perform a comprehensive system scan for enhanced security (recommended).
Should you require assistance in selecting anti-virus software, and are operating on a limited budget, the AVG Free edition presents a viable option. Alternatively, a detailed evaluation of various anti-virus programs tested on Windows 7 is available for your review.
It's worth noting that while ClamWin is functional, it may not be ideal for typical users due to the absence of real-time protection features. This program is currently utilized on my system solely for screenshot purposes.
Ensuring Windows Updates are Enabled
We now focus on a crucial step: verifying that Windows is completely up-to-date and that Windows Updates is activated. Adequate protection against malware and unauthorized access is impossible when utilizing an outdated, unpatched Windows version.
Access Windows Updates and initiate a check for available updates. Install all recommended security patches promptly. Subsequently, select the "Change settings" option.

Configure the settings to automatically check for updates. Allowing automatic installation of updates is also a beneficial practice. Remember, operating a system without current patches significantly increases vulnerability to various threats.

It is important to emphasize the critical nature of patching. Maintaining a current patch level is the primary defense against internet-based worms and malicious software.
Stay Informed with Microsoft Security Notifications
To ensure robust security, consider registering for notifications from Microsoft whenever a critical security update becomes available. Regularly reviewing the latest security bulletins is also recommended, and can be done by visiting Microsoft’s dedicated security bulletin webpage.
You can receive Microsoft Security Alerts via email or through RSS feeds for convenient updates.
Access the most recent Microsoft Security Bulletin directly from their homepage.
Verifying Patch Installation
A key question arises: how can you determine if your system is protected against known vulnerabilities? Let's illustrate with the Conficker worm vulnerability – specifically, a Vulnerability in Server Service Could Allow Remote Code Execution. Examining the available downloads will reveal the appropriate patch for your operating system.
Even if Windows Update indicates your system is current, you can specifically check for a patch’s installation.
To do this, navigate to "View update history" located on the left-hand side of the Windows Update interface.

This action will display a comprehensive record of all installed updates. Carefully review the list to locate the update referenced in the security bulletin.
In my case, the relevant update was KB958644, designed for x64-based systems, as I operate a 64-bit version of Vista.

Confirming the patch installation provides reassurance that you are currently protected against this specific threat.
Safeguarding Your Digital Life
The previously discussed measures are crucial for defending your computer against malicious threats like hackers, worms, and viruses. However, these steps represent only a portion of a comprehensive security strategy.
Continued awareness and the exercise of sound judgment remain paramount. Avoid downloading files originating from sources you do not fully trust.
Additional Security Layers
- Firewall Protection: Implementing a firewall adds an important barrier against unauthorized access.
- Email Security: Ensure your email service provider actively scans incoming attachments for viruses before delivery.
By combining proactive security measures with cautious online behavior, you significantly enhance your overall protection. Remaining vigilant is key to maintaining a secure computing environment.
Ultimately, a multi-faceted approach – encompassing software safeguards and user awareness – is the most effective way to mitigate digital risks.