Detect and Remove Hidden Viruses, Trojans

Viruses are one of the worst problems we face on our computer systems. They infect our files so that our PCs can become unusable sometimes because they crash or are unable to function properly. We need to detect and remove these hidden viruses especially the Trojan virus. However, even some anti-virus software programs can not detect Trojan viruses.


Trojan horse viruses are very tricky. They try to remain undetected as they alter the operation of the computer system and later on they slowly delete programs and files. How does our PC get infected with these? Most of the time, it enters the computer system in the form of an email attachment. Once this is opened, the virus infiltrates the hard drive and starts doing damage to the system in a slow manner. They are really difficult to detect but removing it is not that hard.


Every Trojan virus has its own certain routine of removal but they conform to one basic pattern. Usually, these viruses insert a line in the run utilities in the Windows registry. Most Trojans use this as their principal startup step. With this, you just have to remove the Trojan line and reboot from the database to stop the loading of the virus. Sometimes, the virus alters system.ini or Win.ini and puts itself in the startup folder. So, following the same procedure, you need to remove the lines to stop it from running. However, the bad thing with these viruses is when they replace or alter a file. If the file is very important, then the removal of the virus should be done by automated tools or by specialists.


To remove a Trojan horse virus, you may need to do the following:

  1. Check if you have a file infected with Trojan virus in your hard disk.
  2. Discover how it starts so that you will know what to do to prevent it from restarting after you reboot your system.
  3. Make a backup of your files to avoid further problems regarding your files.
  4. Now that you know its weakness, you may now reboot your computer and remove the Trojan horse virus.
  5. For further details, you may look and read more from the Recovering from a System Compromise pages. This will help you more on what to do.

You may use the task list method, which is similar to the process of the command CTRL+ALT+DEL; Netstat method, which breaks the communication of the Trojan virus; or TCPView, which is a free utility.


Aside from doing the removal of virus manually, you may download anti-virus software from the Internet. If you do so, be sure that you are downloading from an authentic Web site. A tip for you, always update your anti-virus software program for better efficiency of your computer system.


Windows and the Windows logo are trademarks of the Microsoft group of companies.
Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.