This Article is About
virus
fake websites
google
malware
criminals
sorts
appearance
How To Remove A Rediret Virus
Join 1000's of Authors at StreetArticles Today!

The Google Redirect Virus has been around long enough for its effects to be studied, analyzed, and thus come up with methods on how to remove a redirect virus.

The people who created this harmful virus evidently did so to make money from selling bogus software or some other product on fake websites that look very much like the real thing. 

After building a fake website and developing bogus and non working software, these criminals infect a visiting

computer by modifying the search instructions in Google so that the user ends up on bogus site B when he keyed in site A as his intended destination.

The bogus site B is usually a well crafted look-alike site with products of various sorts for sale that these criminals are trying to hawk. 

The average web surfer will probably not even notice the difference in the appearance of the site.  So the product is purchased which is usually infected with more malware and installed right back onto the already infected computer and now the situation becomes chronic.

Finally the user begins to notice that far too often he ends up on sites that don't even resemble what he was searching for and his computer is running slower and slower.  The redirect virus is now in full control and doesn't even try to cover up its presence any more.

At this point the user decides to do something, but the common anti-virus softwares on the market just don't seem to have any effect on this redirect virus.

That's because most anti-virus and spyware products don't look for files that belong on the infected computer. They are looking instead for something that is somewhat foreign to what should be on the computer.

The Google Redirect Virus makes small modifications to files that actually belong on your computer which makes it almost invisible to all but the most sophisticated anti-virus and anti-spyware software.

If the product you are using is not capable of looking for almost imperceptible modifications to the Google family of resident files that actually should be on your computer, you will not be able to get rid of this virus.

That is not to say that your are simply doomed and must  purhase a new computer.  There are a few products on the market that specifically target the Google Redirect Virus.  So what suggestions are there on how to remove a redirect virus ?

The most important measure you can take to protect your computer is to stay away from the most common types of sites where you are most likely to pick up the virus in the first place such as porn sites and free movie and music download sites just to mention a few,

Second, you will need to get a good quality registry cleaner and use it religiously.  It is a good practice to scan and clean your registry before and after downloading any new product.

Third, be sure your anti spy and anti mal-ware programs automatically self-update so that you can at least keep up-to-date with the antidotes for new viruses as they are produced.  If your computer is already infected and you follow these suggestions, you can rid your computer of the virus.

If you are not infected, you can keep your computer virus-free by following the steps outlined above.  In both instances you will have what you need for removing redirect viruses from your computer.


Street Talk

No comments present
You May Also Like
Malware - It’s a Virus!
Have you ever heard of malware? Well I sure wish I had read an article like this before my computer was taken over from it. Malware is a malicious software that is designed to take over your computer. One day when I turned on my computer, up popped an update,…
0
  Likes: 0

Farmville is A Virus!
She sat there for hours planting, harvesting and rearranging her farm. It wasn’t until her mother told her time is up for the internet that she realized she had forgotten about her term paper that was due tomorrow. With no options left, she had no possible way to finish her…
By: Vaygah in  Gaming  >  Online Gaming   May 15, 2012  
0
  Likes: 1

Google Redirect Virus? Redirect Virus Fix Review
Do you come across that your browser simply goes to strange affiliate websites or links that you were not thinking about looking for? While performing on-the-net search will search outcome look as if they are going to suspicious unwanted locations? Your CPU has probably been contaminated with the Windows Redirect…
By: Janice Reemax in  Computers and Technology   Nov 16, 2012  
0
  Likes: 0

How to Remove A Redirect Virus
As we all know viruses can damage your computer. It is important to get rid of these viruses and protect yourself from future infections. In this article I'll teach you how to remove a redirect virus from your computer.A redirect virus is a malware that redirects your webpage to a…
By: Ray's Networks in  Computers and Technology   Oct 26, 2011  
0
  Likes: 0

How Do I Find Facebook Proxy Sites That Work?
Yes, we can all agree that Facebook is one of the greatest inventions of all time. Even those without Facebook accounts can admit that it was a pretty cool idea, and the way they continue to develop it constantly makes it more user friendly, more fun, and more addictive.  The…
By: Rodders Gillam in  Computers and Technology   Sep 29, 2011  
0
  Likes: 1

A Dynamic Photo Editing Service is the Best Cornerstone
Either it can be a basic photo brush or a photo retouching technique the ultimate goal of photo editing is to make some extraordinary visuals. If you need your wedding photos to become more dynamic we are the only one solution naming Clipping Path Source. Digital photos are looking fresh…
By: Tamjid in  Computers and Technology  >  Computer Forensics   Apr 10, 2016  
0
  Likes: 1

Security Concerns On Top Of Agenda In 2016!
In a globalized world the flow of information is magnanimous. Sometimes it may become extremely difficult this flow. More importantly the safety of the data becomes a matter of intense issue. What to do about it? Are the currently embedded protection mechanisms good enough to avert every type of threat?…
By: Jhones Robat in  Computers and Technology  >  Computer Forensics   Apr 08, 2016  
0
  Likes: 0

Online Fax Services: Security Benefits As Well As the Benefits to Employees
Before understanding the benefits of online fax services, it is first essential to understand why faxes are still important in today’s time. Tedious as the task may be, there are many reasons why businesses around the world prefer to use fax for their business communication. For starters, any communication via…
By: williambauman44 in  Computers and Technology  >  Computer Forensics   Mar 29, 2016  
0
  Likes: 0

Take A Closer Look At Your Vulnerabilities, Get A System Audit
The evaluation of the security of the computer system is an absolute necessity. The susceptibilities that a network can come across may be multiple and every component may be extremely complex in nature. Keeping this into perspective, the most advance technology must be utilized to test the weaknesses in a…
By: Jhones Robat in  Computers and Technology  >  Computer Forensics   Mar 16, 2016  
0
  Likes: 2

An Introduction To Koi Ponds
Koi ponds have become a popular hobby in the world, and the reasons are clear as to why. Koi are beautiful, vibrant fish that can literally light your day. Koi come in many colors, varieties, and kinds, so it is likely that everyone in the world can find at least…
  Likes: 0

The Prerequisites for NTS Tests
NTS tests have become a prerequisite for admission in various colleges and universities. It is therefore necessary for students to pass NTS test in order to get admission in their likely disciplines. Many online institutions are providing students the facility of nts preparation. Essentially NTS test consists of four parts,…
By: nerdy in  Computers and Technology  >  Computer Forensics   Feb 27, 2016  
0
  Likes: 0

The Prerequisites for NTS Test
NTS tests have become a prerequisite for admission in various colleges and universities. It is therefore necessary for students to pass NTS test in order to get admission in their likely disciplines. Many online institutions are providing students the facility of nts preparation. Essentially NTS test consists of four parts,…
By: nerdy in  Computers and Technology  >  Computer Forensics   Feb 27, 2016  
0
  Likes: 0

Improve Your Hh0 - 340 Information With Our Preparation Plan
Check-ups Requisites: These attribute of this Hitachi Data Systems Storage Manager-Storage Management certification will disclose to be produced and developed designed for people IT linked individuals who are helping Hitachi Data Systems employees and also partners and are also allowed to architect as well as support HDS storage products within…
By: Joan J. Gardner in  Computers and Technology  >  Computer Forensics   Nov 18, 2015  
0
  Likes: 0

The Process to Solve the 70 - 412 Assessment Problems
Info about Checks: Consultants in addition need to recognize basically with regard to the goals specific for that Additional Sites and Subnets, Deploy a Stand-alone Root CA, Configure Certificate Templates, Configure Key Recovery, Install and Configure AD RM, Implement the AD RMS Trust Policies, Install and Configure AD FS, Configure…
By: Joan J. Gardner in  Computers and Technology  >  Computer Forensics   Oct 29, 2015  
0
  Likes: 0

Essentials Of the Exam Of 400 - 051
Advice: This method 400-051 Certification Content is to get Collaboration Architects, Unified Communications Architects, or simply Voice along with Video Network Managers who will be in charge of the form, execution, and even problem solving associated with challenging collaboration solutions. Cisco certified individuals less difficult ordered to provide in buying…
By: Joan J. Gardner in  Computers and Technology  >  Computer Forensics   Nov 20, 2015  
0
  Likes: 0

Article Views: 2169    Report this Article