You may be in for a bit of trouble, friend. First of all, "virus" is really not the right word, what you are looking at is a computer worm. Computer
worms are not viruses. In fact, there is a big difference between a computer worm and a virus. First, the worm does not need any file to act as its
host. (Like DLL Files) Second, worms have less damaging effects. Most of them simply consume network bandwidth, as opposed to computer viruses that
usually destroy files. There are tens of thousands of computer worms on the Internet, so you can be sure that you have at least one of them hiding in
your file system. A worm will look for passwords, email account information, banking sire information, credit card numbers. When it has collected, it
emails itself back to the owner, plus to everyone on your contact list. Most worms are designed to run on Windows, but some of the newer ones are
designed for Linux, and the OS becomes more and more popular. Contrary to popular belief, porn sites are not usually infected, after all, they want
your business, and they want you to return. Add Companies are good for them though. Another use of the computer worm is to create a backdoor in the
infected computer. The attacker can later use this backdoor to create a “zombie” computer that is under his complete control. Once your computer
becomes a zombie, the attacker can cause it to send spam, to cloak its website’s address, and even to launch Distributed Denial of Service (DoS)
attacks. An infected rig can even start up remotely, and the cracker can alter the Windows Registry. I don't know why Microsoft leaves it's
operating system so open like that.
Today's crackers are sophisticated technicians with MIT credentials and millions of dollars in equipment. If they want to get into your rig, they
will, and not much will stop them. The best way is just to slow them down for 5 or 10 minutes, they will get frustrated and go somewhere else. Also,
avoid naming your computer with a cute family name. Crackers look for Bob's PC, and Sally's Home, and HP3334, and DELL88865. Name it apache, the
name of server equipment. Run with a blank MAC address, if possible, and masquerade your IP address. Disable all Remote Access, and block 3rd Party
Cookies. Don't save Encrypted files to drive, and don't save Temp files to drive.
I get infected computers in here all the time, and most of these worms are very aggressive. They can live through a high level format. I use a DoD
wipe myself, wipes the hard drive 7 times over, nothing can live though that. Then a fresh install.
I use
Avira Free Antivirus, I no longer trust Microsoft Security
Essentials after seeing a worm go right through it one night not long ago. I also install
Comodo Free Firewall, one of the last good software firewalls. Comodo comes with
a program called "Geek Buddy," I don't care for it, and it un-installs easy with the program manager. Good luck to you, OP