Geeks in Phoenix

Geek Blog

Virus removal guidelines for Windows

Updated July 10, 2024

Are you worried about viruses infecting your Windows computer? If so, you're not alone. With the increasing number of malware and viruses targeting Windows operating systems, it's crucial to protect your PC proactively. In this comprehensive guide, we'll cover virus removal guidelines for Windows to help you keep your computer safe and secure.

Prevention is critical to protecting your Windows computer from viruses. This starts with using reputable anti-virus software and always keeping it updated. Regularly updating your operating system and other software is also crucial, as many updates include security patches that protect you from newly discovered vulnerabilities.

In addition to using anti-virus software, it's essential to practice safe browsing habits. Avoid clicking on suspicious links or downloading files from untrustworthy sources, as these can often be vectors for malware. You should also be cautious when opening email attachments, as many viruses are spread through phishing emails.

Prerequisite: To start the removal process, you will need to download software to scan for and remove any malicious software. It is recommended that you download this software on another computer that is known to be uninfected and use a clean, recently formatted USB to transfer the software to your infected computer.

Microsoft Safety Scanner - This program is completely self-contained and requires no Internet access to run or install. Just download it, copy it over to the infected computer via a USB drive, and then run it. If you decide to run a full scan, it can take hours or even days, depending on how many files are on the drive(s). This software is time-stamped and will only run for ten days. After that, you would need to download a new copy of it.

Malwarebytes - This program requires Internet access to download the complete installation files. I recommend downloading the installer and copying it to the infected computer via a USB drive. Once the installer is on the infected computer, connect to the Internet and start the installation program.

Avast Free - This program requires Internet access to download the complete installation files. I recommend downloading the installer and copying it to the infected computer via a USB drive. Once you have the installer on the infected computer, connect to the Internet and then start the installation program.

Taking immediate action is essential if you suspect your Windows computer is infected with a virus. Here are some virus removal guidelines to help you effectively eradicate malware from your system:

1. Disconnect from the Internet: If you suspect your computer is infected, one of the first steps you should take is to disconnect it from the Internet. This can help prevent the virus from spreading to other devices on your network or communicating with its command-and-control servers.

2. Enter Safe Mode with Networking: Boot your computer into Safe Mode with Networking to limit the number of processes running and make it easier to remove the virus. Depending on what software you want to use, you may need an Internet connection to install it. Now, Safe Mode with Networking only supports wired (ethernet) connections because it uses generic network drivers, and there just aren't any generic WiFi drivers.

You will need to use the Advanced Boot Options to get Windows to boot up into Safe Mode, and here is how to get there:

Windows 11 Advanced Boot Options

Windows 10 Advanced Boot Options

3. Scan for viruses: Run and/or install one of the recommended programs listed above, then run a full scan. Be prepared to wait as the software scans all of the files on your drive(s). This can take anywhere from a few minutes to a few hours.

4. Remove suspicious files and programs: Inspect your system for any suspicious files or programs and remove them. Look for unusual filenames, recently installed programs, or programs you don't remember installing.

If you can't remove the virus on your own, consider seeking help from a professional computer technician or a reputable IT support service, such as Geeks in Phoenix. They can assist in performing a more in-depth virus removal process and provide guidance on preventing future infections.

After removing the virus from your Windows computer, it's important to take steps to prevent future infections. This includes maintaining up-to-date anti-virus software, patching your operating system and software, and practicing safe browsing habits.

In conclusion, viruses pose a significant threat to Windows computers, but by following the virus removal guidelines outlined in this article, you can effectively protect your system from malware. Remember that prevention is vital, so stay vigilant and secure your computer to avoid falling victim to malicious software.

Check out the following article for more information on free Internet security software.

Free Internet security software

Check out this article for a detailed description of one of the worst cases of infection I have seen.

A real life virus removal horror story

Free Internet Security Software

Updated July 9, 2024

Here is a list of a few free Internet security programs I recommend for those on a budget. Remember that free software often comes with limitations but is fully functional. Some require manual updating, but that is a small price for great free software. Let us start with an anti-virus program.

When it comes to anti-virus software, I like to see real-world testing comparisons. Take a look at AV-Test, an independent IT security institute that tests all major AV software every three (3) months. That way, the tests will be done with real-world AV samples.

Windows Defender (built into Windows)

  • Pros: It is built into Windows and is one of the highest-rated AV programs. If you decide to install a third-party AV program, Windows Defender will switch itself into a secondary AV program and can be set up to periodically scan for threats.
  • Cons: Windows Defender only protects the operating system and does not integrate with browsers.

Avast Free

  • Pros: This is a fully functional anti-virus program that has file, behavior, web, and mail scanners. The program updates itself automatically.
  • Cons: There is no free technical support. Support for this product is sold by call or by year.

Next is a Firewall program:

Windows Defender Firewall (built into Windows)

  • Pros: It is already installed and running inside Windows.
  • Cons: It provides essential inbound/outbound protection. You can create custom security rules, but configuring them requires some detailed information. It is not for the novice user.


  • Pros: The program is fully automatic in updating itself.
  • Cons: It only provides inbound and outbound protection but does it in full stealth mode. It also requires internet access to install.

Let us now look at two free spyware/malware programs. My first choice is Microsoft Safety Scanner. Note that I ranked Microsoft Safety Scanner first because it requires no installation or additional software to run.

Microsoft Safety Scanner

  • Pros: It requires no installation. Just download and run with Administrative privileges.
  • Cons: It is time-stamped and will only run for ten (10) days after downloading it.

Malwarebytes Anti-Malware

  • Pros: It is an excellent malware program. It checks for updates before performing any scans.
  • Cons: It requires Internet access to complete the installation.

A real life virus removal horror story

I hear more and more new computer users are getting severely infected with malware, spyware, Trojans, etc. I am currently working on a system that is, by far, the worst one I have ever seen. I have the system back running and have documented the procedures I followed to clean up this system. I have included a link at the bottom of this article to an article on free Internet security software.

Note: I took on this client as I felt he needed assistance. He’s an older veteran who just graduated from school. He bought a used computer and then connected it to a high-speed connection. Without any knowledge of what he needed for security software, he quickly got infected. The story does end happily (should I tell you now or make you go to the bottom of the page). I built a new system for him from my spare parts and loaded all his old software onto it. System cost: $0. Good feeling: Priceless.

Let me first outline the situation. I got a call from a gentleman who had purchased a used computer, and it got infected. It was so bad that it would not even boot into Safe Mode. When I got it, I immediately went to back it up. It was then that I discovered the system would not boot to a CD-ROM (red flag). This was my first issue.

The system had a floppy drive, so I installed a network card I knew worked and had DOS drivers. I then created network boot disks and was able to back up across the network. The data transmitted from the client was different in size from what the server received (red flag).

I now had a good working image of the hard drive. A system driver was failing to load, which caused the crash. I wanted to check the hard drive for errors first. Since this drive was FAT 32, I used a Windows 98 SE boot disk with support tools and ran Scandisk on it. The surface scan indicated a bad cluster on the drive (drive failure?). A quick download of the diagnostic software from the hard drive manufacturer confirmed the hard drive failure.

Luckily, I had an equal-sized hard drive and cloned the drive image back to a new drive. A quick Scandisk to check for errors, and away I went, but I still got errors when booting. I changed the boot options and was able to get the error screen to stay up. I took a photo to do more research. It turns out the error is coming from the onboard IDE controller (controller failure for sure, possible motherboard failure). This would explain the issue with the CD-ROM.

I happen to have a spare PCI IDE controller card from when I had to have eight drives in one of my systems (as opposed to the standard four at the time). I’ll tell the story of the system I built, where I had to turn off all onboard devices to keep running later. What I did to keep that 486 running was amazing.

I installed the controller card and almost immediately discovered the BIOS was scrambled. I couldn’t bootstrap the BIOS. That was it - motherboard failure. The project now was how to rebuild the computer. The motherboard failure made me suspicious of using any of the old hardware. You don’t know what else may be damaged (we know the hard drive was).

So I went around the office to see what I could find. A Pentium-D 805, ECS P4M800, a 256 MB stick of PC-3200 memory, CD-ROM, floppy drive, hard drive, power supply, and case. A slight modification to the case allowed clearance for the power connector to the motherboard, and I was off and running.

I assembled the system and loaded the original image. I was still getting boot errors, but it did boot. Of course, Windows found all sorts of new hardware. But the pop-ups were coming on hard and fast, and so were the system errors.

So I opened the hard drive image file, and there I found a couple hundred infections. I made a copy of the image and then proceeded to edit its contents manually. I was able to remove about three hundred (300) or so infected files. I then pushed the revised image to the new system. I could get the pop-ups and errors to come down quite a bit. I turned off System Restore, installed Malwarebytes, and started a scan. It found several infections and removed all on reboot.

I installed AVG, updated definitions by file, and ran a complete scan. It was then that I found out that this system was beyond repair. It had an infection that attaches itself to every executable file on the hard drive. AVG found over seven thousand (7,000) of these infections. Now, it is time to completely wipe the hard drive and do a clean install of Windows.

That’s where the story ends. I reloaded all of the applications, user files, etc. The computer is in place and running beautifully. It’s again hooked up to high-speed internet, but this time with protection.

Free Internet Security Software

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube