remote computer tune-up to speed-up overall computer memory for better performance like a new computer

We offer computer & laptop repairs for much of NEPA Including Lake Ariel, PA Lakeville, PA Hawley, PA Hamlin,PA Honesdale, PA Greentown, PA Newfoundland, PA The Hideout Waymart, PA

We can fix and replace broken laptop screens

We fix and remove virus and malware from computers

We can provide remote computer support and troubleshooting help

We can remotely remove virus and most root kits from your home saving you money and time.

 

We Fix Macs & Remove apple virus and malware

DON’T PANIC!  But be aware that the Internet is riddled with potential threats to the security infrastructure  and well-being of your Mac or iOS device being either residential or business makes no difference. No computer system is completely immune from possible attack,ransom and extoration, but Apple’s OS X (being Unix-based) is less vulnerable than most, particularly the latest versions from Lion onwards.

We can remove those pesky mac book, apple & IOS virus & malware creating pop-ups and url redirects

Wise Paupack Computer repair has been repairing broken and slow sluggish mac book pros, imacs and various other apple brand computers, laptops & all-in-one Pc’s. We are able to remove apple mac virus and malware even root kits and ransomware. We offer house calls and remote tech support for any of the 50 states within the united states of America. Often times mac users can become infected with hard to remove virus such as.

MacKeeper Virus & Malware

OSX/Leap Macbook Imac Virus Trojan worm

This nasty virus spreads itself to all your friends within the ichat apple messaging software.

OSX/MacSweeper Malware Scan Repair & Fx

Built to mimic the real mac sweeper and trick unknowing users into downloading a rogue cleaning tool that slowely takes over your entire macbook pro or imac.

the above macbook pro virus would scan and pretended to find problems on users’ systems, then prompted them to pay to fix the problems (aka scareware). Soon after, a nearly identical piece of scareware called Imunizator started making the rounds. Imunizator would claim to find privacy holes in your computer:

 

 

OSX/Krowi Virus Removal & Repair

was packaged in free publicly shared, pirated versions of iWork ’09 and Adobe Photoshop for Mac. It connected computer users to a remote server and waited for commands from a remote control center. In 2010 another backdoor, OSX/Hellrts, appeared in pirated versions of iPhoto. Both pieces of malware planted backdoors into users’ Mac computers, allowing attackers to enter without having to type a password:

 

OSX/OpinionSpy, a variant of Windows spyware from 2008 and the first major piece of spyware discovered on OS X. Users unwittingly installed this spyware by entering their username/password into a prompt disguised as a marketing surveyor. OpinionSpy collected IM conversations, email addresses, browsing history, usernames and passwords, and bank account details:

 

OSX/MacDefender, and similar pieces of malware called OSX/MacProtector and OSX/MacSecurity. MacDefender was especially crafty, releasing new versions as quickly as Apple released patches. The MacDefender phishing attack used poisoned Google Image search results, and was very difficult for Mac users to remove because it attaches itself to a computer’s launch menu and has no dock icon:

OSX/Flashback, discovered in September 2011 by Intego, has 14 variants as of Thursday. The malware uses Java vulnerabilities to enter a user’s computer when he or she clicks into a malicious link. It harvests usernames, passwords, and other data used to authorize banking transactions. The first version was packaged in a malicious Adobe Flash installer, while the latest version looks like a Software Update prompt (note: Software Update will never ask you for your password “to make changes).

How To avoid getting infections on your mac book pro or imac apple computer and laptop

Do not be tricked by ‘scareware’, such as pop-ups on your browser, that tempts computer users to download fake anti-virus software that may itself be malware. These programs will either be a pop-up or flashy banner with sirens making annoying noise and even opening so many pop-ups causing most un-experienced computer users to not even be able to close the pop-up unless they install the faxe cleaner or malware bloated software.

Once installed, the software allows hackers full admin access to data or force people to make a payment to register the fake product.  Examples include MacKeeper and iAntivirus, but there are others. Also, beware of MacSweeper and MACDefender* (also goes under the name of MacProtector, MacGuard, MacSecurity or MacShield): These are malware that mislead & trick users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases will also mess up your system.

Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.

 

Do not install MacKeeper or iAnti-Virus: as these programs will cause serious problems within your apple computer or laptop.

 

MacSweeper is a scam ripoff fake software with malware and trojan virus.

MacKeeper is a fake mac computer tool infecting apple computers and laptops do not install or use this software.

iAnti-Virus for mac book pro, imac and apple computers is a scam software that will infect and corrupt your apple computer files.

*Malicious software dubbed MACDefender  takes aim at users of the Mac OS X operating system by automatically downloading a file through JavaScript. But users must also agree to install the software, leaving the potential threat limited.

 

TROJANS and RE-DIRECTION TO FAKE WEBSITES

The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.

 

If you allow a Trojan to be installed, the user’s DNS records can be modified, redirecting incoming internet traffic through the attacker’s servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim’s  (that’s you!)  DNS records stay modified on a minute-by-minute basis.

 

Mac users should always obtain their copy of Adobe Flash Player directly from Adobe’s official website and to disable the “Open ‘safe’ files after downloading” option in Safari Preferences/General to avoid automatically running files downloaded from the Internet. Also, do not turn on Java in Safari Preferences/Security. Few websites use Java. Javascript is something entirely different and should be left active.

 

(Adobe is aware of malware posing as its Flash Player and warns users to ignore any updates that didn’t originate on its own servers. “Do not download Flash Player from a site other than adobe.com,” said David Lenoe, Adobe’s product security program manager, in an entry on Adobe Product Security Incident Response Team’s PSIRT blog. “This goes for any piece of software (Reader, Windows Media Player, QuickTime, etc). If you get a notice to update, it’s a good idea to go directly to the site of the software vendor and download the update directly from the source. If the download is from an unfamiliar URL or an IP address, you should be suspicious.”)

Last, but by no means least, using Open DNS is the simplest way of preventing infection in the first place. Open DNS also protects against phishing attacks, re-directs, speeds up your internet connection – see below.

Java can present serious security threats: Users with Intel Macs running Snow Leopard OS 10.6 or later versions of OS X should ensure that they have downloaded and installed all the recent Java updates from Apple, which are designed to prevent infection and also remove any infection already present.

From the introduction of Lion onwards, new Macs  do not have either Flash Player nor Java installed.

 

+++ OTHER ISSUES +++

 

 

HOW TO AVOID RE-DIRECTION

 

Adding Open DNS codes to your Network Preferences should give good results in terms of added security (phishing attacks, re-direction etc) as well as speed-up of your internet connection:

 

Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked ‘DNS Servers’ add the following two numbers:

 

208.67.222.222

208.67.220.220

 

(You can also enter them if you click on Advanced and then DNS)

 

Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:

 

http://support.apple.com/kb/TS2296

 

There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!

 

GENERAL ADVICE ON HOW TO AVOID INFECTION IN THE FIRST PLACE:

1. Avoid going to suspect and untrusted Web sites, especially p’orn’ography sites.

 

2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites, i.e. the developers’ own web sites or the Apple App Store.  If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.

 

3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.

 

4. Consider using Mac OS X’s built-in Firewalls and other security features.

 

5.  Avoid Peer-to-peer sharing applications. Download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks may apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking (see below):  http://news.bbc.co.uk/1/hi/technology/8420233.stm

It has been estimated that one in six links posted on Facebook pages are connected to malicious software.http://www.bbc.co.uk/news/technology-12967254

6. Check for security updates from Apple using Software Update and install them!

YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:

 

There is the potential for having your entire email contact list stolen for use for spamming:

 

http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1

 

And if you are using iPhone Apps you are also at risk of losing all privacy:

 

http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/

 

The advent of HTML5  may also be a future threat to internet privacy:

 

http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp

 

NOTE: Apple’s operating systems since Snow Leopard silently update the malware protection built into Mac OS X to protect against a backdoor Trojan Horse that can allow hackers to gain remote control over your treasured iMac or MacBook.

 

+++++ MORE POTENTIAL ISSUES +++++

 

PHISHING AND POTENTIAL IDENTITY THEFT:

“Phishing” (also known as “carding” or “spoofing”) refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it’s not.

As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email, and that includes your bank, credit card company, and Apple.

If you do receive email that you’re not sure is valid, here are some tips that can help you determine its legitimacy:

Learn how to identify fraudulent “phishing” email:

http://support.apple.com/kb/HT4933?viewlocale=en_US

How to report phishing scams to Apple:

via email to:  reportphishing@apple.com

If you discover that emails are being received by your entire address list which you didn’t send, it is possible that you have been infected by a Botnet.  Simply put, a bot – which is short for robot – is an automated computer program that allows outside sources to control computers remotely without the users’ knowledge. A botnet is a network of hundreds or thousands of computers infected with botnet malware that communicates covertly with a command-and-control (CnC) server run by a type of cybercriminal called a botmaster. Unbeknownst to the individual users, their computers are linked in a rogue network which the botmaster can utilize for a variety of nefarious purposes.

Detailed information here:

http://mac-internet-security-software-review.toptenreviews.com/how-do-i-know-if- my-computer-is-a-botnet-zombie-.html

HOW SAFE IS YOUR SMARTPHONE?

Another source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace: more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.

http://www.bbc.co.uk/news/technology-13422308

The data being leaked is typically used to get at web-based services such as Google Calendar.

The open nature of the Android platform is both a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground: http://www.bbc.co.uk/news/technology-12633923

Several pieces of malware have also been found on iPhones, however only devices that had been “jailbroken” to bypass Apple’s security were affected. The company’s process of pre-vetting all new applications is believed to have spared its devices from a major attack.

LAST BUT NOT LEAST: BE GLAD YOU HAVE A MAC!

 

Some Windows PCs can be infected with viruses during the manufacturing process in the factories – in other words they can actually be purchased with viruses bundled with the operating system! Several new computers have been found carrying malware installed in the factory, suggests a Microsoft study. One virus called Nitol found by Microsoft steals personal details to help criminals plunder online bank accounts. Microsoft won permission from a US court to tackle the network of hijacked PCs made from Nitol-infected computers.

http://www.bbc.co.uk/news/technology-19585433

 

This does not happen with Apple computers!

 

OTHER POTENTIAL THREATS YOU MAY BE UNAWARE OF:

 

In reality of course, there is no such thing as total internet privacy: US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails:  http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

 

If you have a Facebook account, Facebook is surveilling every single moment you spend there. Moreover, much more importantly, every web page you touch that has a Facebook “like” button on it which, whether you click the button or not, will report your reading of that page to Facebook.

If the newspaper you read every day has Facebook “like” buttons or similar services’ buttons on those pages, then Facebook or the other service watches you read the newspaper: it knows which stories you read and how long you spent on them.

Every time you tweet a URL, Twitter is shortening the URL for you. But it is also arranging that anybody who clicks on that URL will be monitored by Twitter as they read. You are not only helping people know what’s on the web, but also helping Twitter read over everybody’s shoulder everything you recommend.

And now ‘smart TVs’ are also adding to your loss of privacy:  “Smart TVs” are bringing PC-style spyware and banner ads to the living room, collecting detailed logs of data that include every time the channel is changed and the names of every media file watched. In the case of sets from LG, data is being sent to the factory unencrypted, even after users attempt to turn the data collection off. Source:  http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and. html

 

Either way you are not alone if you have become the victim of any of the above IOS, mac book pro/air & imacs virus, malware, root-kit, scare ware, ransomware or other malicious Trojan you can contact wise paupack computer repair by phone or email 570-766-8299 or Service@wisepaupackcomputerrepair.com     After contacting us we can either schedule for a FREE pickup if you live within Pike or Wayne county PA.Or if you are outside our service area we can connect remotely and offer guidence via phone and tech support to remove even the nastiest virus on your apple devices.

 

 

We travel to the following towns for computer tech support house calls and pick-up for servicing at my computer repair facility in Lake Ariel, PA. Travel Service Locations Lake Ariel,South Canaan,Hamlin,Archbald,Jessup,Sterling,Elmhurst,Scranton,Peckville,Waymart,Lakeville,Olyphant,Moscow,Newfoundland,Paupack,Jermyn,Carbondale,Tafton,Prompton,South Sterling,White Mills,Greentown,Chinchilla,Hawley,Moosic,Gouldsboro

Zip Codes we offer repair services to 18436,18459,18427,18403,18434,18463,18416,18512,18452,18472,18438,18447,18448,18444,18519,18510,18445,18509,18451,18508,18505,18433,18407,18464,18456,18460,18473,18540,18501,18502,18577,18515,18503,18426,18410,18428,18507,18504,18424

 

18436,PA,Wayne,Lake Ariel
18459,PA,Wayne,South Canaan
18427,PA,Wayne,Hamlin
18403,PA,Lackawanna,Archbald,
18434,PA,Lackawanna,Jessup,
18463,PA,Wayne,Sterling,
18416,PA,Lackawanna,Elmhurst,
18512,PA,Lackawanna,Scranton,
18452,PA,Lackawanna,Peckville,
18472,PA,Wayne,Waymart,
18438,PA,Wayne,Lakeville,
18447,PA,Lackawanna,Olyphant,
18448,PA,Lackawanna,Olyphant,
18444,PA,Lackawanna,Moscow,
18519,PA,Lackawanna,Scranton,
18510,PA,Lackawanna,Scranton,
18445,PA,Wayne,Newfoundland,
18509,PA,Lackawanna,Scranton,
18451,PA,Pike,Paupack,
18508,PA,Lackawanna,Scranton,
18505,PA,Lackawanna,Scranton,
18433,PA,Lackawanna,Jermyn,
18407,PA,Lackawanna,Carbondale,
18464,PA,Pike,Tafton,
18456,PA,Wayne,Prompton,
18460,PA,Wayne,South Sterling,
18473,PA,Wayne,White Mills,
18540,PA,Lackawanna,Scranton,
18501,PA,Lackawanna,Scranton,
18502,PA,Lackawanna,Scranton,
18577,PA,Lackawanna,Scranton,
18515,PA,Lackawanna,Scranton,
18503,PA,Lackawanna,Scranton,
18426,PA,Pike,Greentown,
18410,PA,Lackawanna,Chinchilla,
18428,PA,Pike,Hawley,
18507,PA,Lackawanna,Moosic,
18504,PA,Lackawanna,Scranton,
18424,PA,Lackawanna,Gouldsboro,

 

Here at my shop in Lake Ariel, PA Servicing all of the Poconos I have lots of people call with a “slow computer” complaint. Any person who owns a computer knows that the speed often slows over time. While some can easily overcome these problems, many cannot. My computer, because of my heavy use, often requires daily maintenance. Thankfully for me this is almost always only a software issue (I did upgrade my ram when I purchased my laptop and I have upgraded my Internet Service twice). However, hardware can also be causing a problem. Below I have listed some of the reasons your computer might be running slowly and some tips on how to fix it.

Your Computer Is Out of Tune

Computers have a habit of getting “out of tune” I call it as time goes by. By this I mean that your computer becomes bogged down by fragmentation, partial uninstalls, software glitches and conflicts, registry errors, temporary file buildup, toolbars, browser add-ons and other clutter and problems. Windows has built-in utilities to solve some of these problems but others require aftermarket utilities and some computer know-how. For starters, pay attention to your browser and make sure toolbars haven’t been installed inadvertently (I avoid most toolbars altogether). Look in your control panel and uninstall software you’re not using anymore or any that looks suspicious. If you don’t know what a program is “Google” or “Bing It.” Run the free utility CCleaner from Piriform to fix your registry and clean up your temporary files. It’s also a smart idea to take your computer to a qualified repair shop for a tune-up on an annual basis. The computer repair professional should be able to give you insight on how you’re doing with keeping your PC in good running condition and should be able to tell you, based on examining your machine, how often you need to bring it in for a tune-up in the future.

You Don’t Have Enough Mbps (Megabits Per Second) From Your Internet Service Provider

Ever been in a situation when you are trying to catch up on your favorite soap, online documentary or YouTube Video and all you get is “buffering.” It’s frustrating isn’t it? Do you have endless “hour glassing” every time you try to do something on the web? You might not be getting what you’re paying for from your Internet Service Provider. Or you might not have enough service for your computing needs. For example, it takes about 3-6 Mbps service to stream a YouTube Video without buffering. Today’s busy households require, in my opinion, at least 10Mbps Service. Once you upgrade your service you also need to test your Internet Speed to make sure you are getting it. You can do this by going to speedtest.net and using the free on-site utility. And you shouldn’t have to download anything to do it. Simply hit “begin test.”

You Need More Random-Access Memory (RAM)

RAM is a type of data storage in your PC which directly affects speed. When you launch an application or software on your computer, RAM is responsible for running the software. If you do not have RAM your computer might not be able to open and run multiple applications or meet the demands you place on it. This problem can easily remedied by purchasing and installing additional RAM for your computer. When you purchase RAM, it is important to check with the salesperson which type of memory is compatible with your PC. If you don’t know how to upgrade your RAM call a qualified computer repair shop in your area.

Your Processor is Out of Date

Another hardware component closely related to computer performance is the processor. As new programs and software are created and take more and more updates, they requirements to run them increases. Often, people are trying to run newer or resource intensive applications on older machines with a processor that can’t handle the new software efficiently.

You Have Infections

People are often shocked to learn that computer viruses are almost inevitable. And, you can even get them while browsing on sites that you think are safe. I can’t tell you how many times people are stunned when I tell them they have over 100 infections on their machine . . .or I tell them I can see infections from across the room. They have no idea they have computer viruses. The best way to prevent this is to use anti-virus software with “real time” protection and research articles on “How to Prevent Computer Viruses.” There is an article on the blog about this subject and also many articles online about virus prevention. Learning better, safer, web browsing habits on a regular basis is nice addition a computer user’s skillset. And definitely a skill you will want to master if you want your computer to run better . . . and faster.

Nearly 100% of all computer virus infections and scams come from internet activity – nowhere else. Malicious software doesn’t magically install itself on your computer nor does it usually enter though a flash drive or disk. It comes in through the internet. Where else, right? There are many ways that you can improve security when it comes to your online activities. It is imperative to develop these habits now as doing so will help protect you from increasing problems with unsecure utilities, software and viruses that might seriously affect your security and computer health in the future.

Monitor Browser Health

Your web browser is your gateway to the internet world. Therefore its health and security is your first line of defense against threats coming in from the internet. There are three common web browsers that most people use today. MS Internet Explorer (IE), Mozilla Firefox and Google Chrome. IE comes with your OS and can’t be uninstalled. It should be an adequate browser if kept clean and free of corruption and infection. From the menu or command toolbars you can check your add-ons and see if anything unexpected is ominously lurking in your browser. Oftentimes people inadvertently install add-ons (usually toolbars) while downloading utilities they think might be useful. These add-ons can seriously compromise browser security and affect browser performance, as well. To see if you have add-ons go to: Tools >Manage Add-ons >Toolbars and Extensions. Here you can disable the add-ons and then remove them from the control panel. If you see many add-ons that you do not recognize you should reset IE completely. To do this go to: Tools >Internet Options >Advanced >Reset. It is easy to do and you do not lose your bookmarks/favorites. Afterward remove unwanted software from the control panel.

Be Aware of Phishing Scams

Phishing schemes commonly delivered in the form of email is a type of scam where you are potentially tricked into downloading junk utilities or software (which often asks you for money later) a virus, or providing sensitive information. These messages are made to look as though they have originated from your bank, social media or payment sites such as Paypal or other legitimate people or companies. The phishing message often contains a link that will then lead to a counterfeit version of the site or ask you to open an infected attachment or download an infected utility. Or it might contain an attachment that it says you should open to continue. Don’t allow your curiosity to kill your computer. Delete all unsolicited mail. Never click links in emails or open email attachments unless you recognize the sender. And don’t give your credit card information over the internet unless you do it directly on a website (not from your email Inbox or a pop-up message) and you’re sure you trust the company.

Avoid Most Free Utilities

It’s very tempting to install that snazzy fish tank screen saver you see flashing on the sidebar of your favorite social site. DON’T DO IT! These types of free utilities usually come with a catch. In order to use them you give up something . . . usually your browser health or internet security in return for the favor. Video players, music converters, game toolbars, chat applets, screen savers, pc optimizers and cleaners and the like are all very tricky utilities to use without getting toolbars and viral infections. Next time you want to get that utility that makes your Facebook like an Electric Light Orchestra concert . . . .think twice about it. . .

Run a Malware Removal Tool Regularly

Even though you may think you’re protected because you have antivirus software you’re not. It is about as effective as a safety on a gun – not very effective at all. Especially where people are not adequately trained on computer systems or there are multiple users on a single machine. In this case, I often find that the computers have multiple virus infections present. It is important to run a virus removal utility such as AdAware or Malwarebytes (both of which are free) on a regular basis in addition to updating your Antivirus Software. Antivirus software alone is not enough. Yes you read that right. The antivirus software that you are relying on to protect you from virus infections is inadequate to protect you in all circumstances. Therefore I recommend you use separate virus removal software for removal on a regular basis. Caution: Be careful when installing a malware removal tool that you do not install another full antivirus suite. If you have any question uninstall the malware removal utility when finished. For more free information on computer repair topics you can visit my website here.

There are many anti-virus programs that you can download or purchase at BestBuy, Staples, Office Depot, Amazon, Ebay or anywhere else you shop. As with cars or any other personal property there is always a lively debate about which is the best.  And, that is always a matter of opinion, right? Nevertheless, here are five free antivirus programs that are arguably just as good or better than the paid stuff.

Avast is a popular anti-virus program designed for Microsoft Windows, Mac and Linux computer users.  It is available in 41 different languages and has won awards for 100% detection of viruses.  This software specializes in blocking viruses and spyware and has the ability to secure your personal information and all of your stored data as well.

AVG is highly popular software available to download onto your computer. Many people use AVG not only on their PC’s and laptops but also on their mobile phones.  It detects malware, viruses and other infections and attempts to stop them before they populate on your machine or device. An added feature of AVG is that it also claims to keep your banking and shopping records safe and untraceable so no one can get access to your credit card information or banking logins.

Avira is a nationally known and family owned business that specializes in anti-virus software and protecting your computer with its services.  They have over 100 million customers and are ranked at number six on the list of the largest anti-virus vendors worldwide.  The free system runs background checks on each file stored in your computer and updates itself automatically when the system has new updates.

Comodo is an anti-virus protection software that includes anti-malware protection, personal firewall, sandbox and intrusion prevention.  It can be installed on Microsoft computers and Linux systems as well.

Microsoft Security Essentials is perhaps the easiest and best free antivirus solution out there.  It is from Microsoft itself.  Unlike the old, pared-down “Defender” antivirus program this is a fully functional antivirus software suite that provides “real time shields.”  It protects against computer viruses, spyware, Trojan horses and even rootkits. It can be run on Windows XP, Windows Vista and Windows 7.  It is light and does not slow down your computer by draining system resources like some of the other products on this list.  This is my personal favorite as it is light, effective, and does not try to get users to upgrade to the pro-paid version every time they look up.

Installing the above anti virus is perfect solution for a new computer. If you have a computer currently infected with virus I would suggest contact a computer repair tech at Wise Paupack Computer Repair Company First To Assist in the removal of harmful virus first before trying to install a free antivirus software.