Schedule an appointment with 3 Geeks and a Mouse
Have a question about 3 Geeks and a Mouse? Ask here.
2
2
1
2
2
1

Do you have a Virus?
Are you infested with pop-up ads, new toolbars in your browser, is your home page changed or are you bombarded with irritating spam? Perhaps your computer is running very slow or worst, you can't get on the internet. If so, your PC is most likely infected with adware, anti adware, spyware, spybot, trojans, viruses or another internet parasite. Viruses won't go away anytime soon! More than 60,000 viruses have been identified, and new viruses are created every day, according to the International Computer Security Association. 

What is a Trojan?
A Trojan is malware that performs unexpected or unauthorized, often malicious, actions. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.  A Trojan, coined from Greek mythology's Trojan horse, typically comes in good packaging but has some hidden malicious intent within its code. When a Trojan is executed users will likely experience unwanted system problems in operation, and sometimes loss of valuable data.

What is a Virus?
A computer virus is a program of executable code that has the ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual. Some computer viruses can also destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance and resources of your computer. Several years ago most viruses spread primarily via floppy disk, but the Internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, viruses are spreading faster than ever. Viruses attached to email messages can infect an network or your computer in minutes, costing companies millions of dollars annually in lost productivity and virus extraction expenses.

What is Malware?
Malware, short for malicious software, refers to any malicious or unexpected program or code such as viruses, and trojans.  What is Spyware? Spyware is short for advertising supported software (Adware). Software that sends information about your internet habits back to the computer from which it's launched. Spyware is often built into free downloads and works in the background without a user's knowledge .Since it doesn't record an individual's personal information, it's often used to create marketing profiles based on surfing habits.  Why is it called "Spyware"? While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously sending your tracking information over the internet. While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.

What is a Wabbit?
Wabbit's are rare. Oddly enough they don't do much unless it's on your computer. They don't try to spread to other computers, but they can be devastating to your computer. What is a Backdoor? Backdoors are a lot like Trojans and worms, except they open a backdoor to your computer allowing hackers into your computer to load viruses or to send spam through your computer.

What is a Rootkit?
A Rootkit is the hardest virus to detect. It is designed to hide in the computers core processes making it difficult to detect. It often requires a complete wiping of the hard drive and reinstalling the original operating system. What is a Dialer? Dialers can be costly. A black hat hacker can use a dialer to dial those expensive telephone numbers in small countries or to transmit stolen data.

What are Exploits?
Exploits are what keeps Bill Gates and Microsoft up late at night. Hackers try to find flaws in Windows to bypass security so they can get access to your computer. Service Pact 2 is an example of a patch that is used to correct a flaw in Windows. Is Spyware illegal? Even though the name may indicate so, spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background. These tools are perfectly legal in most places, but, just like an ordinary tape recorder, if they are abused, they can seriously violate your privacy.

What's the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement, there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics - and this is why many people feel uncomfortable with the idea. When was the last time you read a privacy statement on a web site? Millions of people are using advertising supported "spyware" products and could not care less about the privacy hype, in fact some "Spyware" programs are among the most popular downloads on the Internet. Spyware is often bundled with free software and games. There are also many PC surveillance tools that allow the user to monitor all kinds of activity on a computer, ranging from keystroke capture, keyloggers, snapshots, email logging, chat logging and just about everything else. These tools are often designed for parents, businesses and similar environments, but can be easily abused if they are installed on your computer without your knowledge.

Alabama ( AL ) Virus, Trojan horse, worm and spyware removal
Alaska ( AK ) Virus, Trojan horse, worm and spyware removal
Arizona ( AZ ) Virus, Trojan horse, worm and spyware removal
Arkansas ( AR ) Virus, Trojan horse, worm and spyware removal
California ( CA ) Virus, Trojan horse, worm and spyware removal
Colorado ( CO ) Virus, Trojan horse, worm and spyware removal
Connecticut ( CT ) Virus, Trojan horse, worm and spyware removal
Delaware ( DE ) Virus, Trojan horse,worm and spyware removal
District of Columbia ( DC ) Virus, Trojan horse, worm and spyware removal
Florida ( FL ) Virus, Trojan horse, worm and spyware removal
Georgia ( GA ) Virus, Trojan horse,worm and spyware removal
Hawaii ( HI ) Virus, Trojan horse, worm and spyware removal
Idaho ( ID ) Virus, Trojan horse, worm and spyware removal
Illinois ( IL ) Virus, Trojan horse, worm and spyware removal
Indiana ( IN ) Virus, Trojan horse, worm and spyware removal
Iowa ( IA ) Virus, Trojan horse, worm and spyware removal
Kansas ( KS ) Virus, Trojan horse, worm and spyware removal
Kentucky ( KY ) Virus, Trojan horse, worm and spyware removal
Louisiana ( LA ) Virus, Trojan horse, worm and spyware removal
Maine ( ME ) Virus, Trojan horse, worm and spyware removal
Maryland ( MD ) Virus, Trojan horse, worm and spyware removal
Massachusetts ( MA ) Virus, Trojan horse, worm and spyware removal
Michigan ( MI ) Virus, Trojan horse, worm and spyware removal
Minnesota ( MN ) Virus, Trojan horse, worm and spyware removal
Mississippi ( MS ) Virus, Trojan horse, worm and spyware removal
Missouri ( MO ) Virus, Trojan horse, worm and spyware removal
Montana ( MT ) Virus, Trojan horse, worm and spyware removal
Nebraska ( MT ) Virus, Trojan horse, worm and spyware removal
Nevada ( NV ) Virus, Trojan horse, worm and spyware removal
New Hampshire ( NH ) Virus, Trojan horse, worm and spyware removal
New Jersey ( NJ ) Virus, Trojan horse, worm and spyware removal
New Mexico ( NM ) Virus, Trojan horse, worm and spyware removal
New York ( NY ) Virus, Trojan horse, worm and spyware removal
North Carolina ( NC ) Virus, Trojan horse, worm and spyware removal
North Dakota ( ND ) Virus, Trojan horse, worm and spyware removal
Ohio ( OH ) Virus, Trojan horse, worm and spyware removal
Oklahoma ( OK ) Virus, Trojan horse, worm and spyware removal
Oregon ( OR ) Virus, Trojan horse, worm and spyware removal
Pennsylvania ( PA ) Virus, Trojan horse, worm and spyware removal
Rhode Island ( RI ) Virus, Trojan horse, worm and spyware removal
South Carolina ( SC ) Virus, Trojan horse, worm and spyware removal
South Dakota ( SD ) Virus, Trojan horse, worm and spyware removal
Tennessee ( TN ) Virus, Trojan horse, worm and spyware removal
Texas ( TX ) Virus, Trojan horse, worm and spyware removal
Utah ( UT ) Virus, Trojan horse, worm and spyware removal
Vermont ( UT ) Virus, Trojan horse, worm and spyware removal
Virginia ( VA ) Virus, Trojan horse, worm and spyware removal
Washington ( WA ) Virus, Trojan horse, worm and spyware removal
West Virginia ( WV ) Virus, Trojan horse, worm and spyware removal
Wisconsin ( WI ) Virus, Trojan horse, worm and spyware removal
Wyoming (WY ) Virus, Trojan horse, worm and spyware removal
Washington DC ( DC ) Virus, Trojan horse, worm and spyware removal

S-847
Adware
Alias
Ambler AM Trojan Horse
Anti Virus Pro 2009
Anti-Debug
Anti-debugger
Antivirus
Antivirus 2008
Antivirus Program
AntivirusPro2009 AntiVirus 2009
Armouring
Auraax.C Worm
Autoencryption
AytonScape Trojan Horse
Backdoor Back Door
Backdoor Graybird P Trojan Horse
Backdoor Graybird Trojan Horse
Banbra.GDB Worm
Bandook Trojan Horse
Banker Trojan Horse
Banker.LLN Trojan Horse
BankoLimb.BW Trojan Horse
Bankolimb.BX Trojan
Beast Trojan Horse
Bifrost Trojan Horse
BitTera.C
Boface.G Worm
Bohmini.A Trojan Horse
boot virus
bot
bot herder
botnet
Branch Software
BREACH Trojan Horse
ByteHosting Internet Services
cavity
common name
companion virus
Conficker.A Worm, Conficker A
Conficker C Worm April Fools Day Virus
Confick3r
Country of Origin
Cracker
Crimeware
CVP Content Vectoring Protocal
DDoS Distributed Denial of Service
debugger
dialer
direct action
disinfection
DoS Denial of service
DOWNAD
DOWNAD/Conficker
Download Privacy Protection Software Now
Downloader.Generic.7.AQMI Trojan Horse Fileins
Downloader.Tibs
Downadup/Conficker worm
Drive Auto-Run
DriveCleaner
dropper
Ectan.A Trojan Horse
EICAR
EPO Entry Point Obscuring
Exceptions
Exploit
Exploit:HTML/CVE-2009-3672-A
flood the system
Flooding
Foolsday.exe
Funny.exe
Generic10.AZHU Trojan Horse
Generic8.LDI Trojan Horse
Generic9.ABWM Trojan Horse
Generic9.ZYW Trojan Horse
Gimmiv.C Worm
GhostNet
Globseason
Graybird Trojan Horse
hacker
hacking tool
happy2008.exe
heuristic scan
hijacker
hoax
Identity theft
In The Wild
Infection
Innovative Marketing Belize
Install an antivirus or spyware remover to clean your computer
Insurrection Trojan Horse
IRC Flood Trojan Horse
I-Worm/Nuwar
I-Worm/Nuwar.L
I-Worm/Nuwar.N
I-Worm/Stration downloader
I-worm/Stration.FJA
I-Worm/Stration!CME-416
Keylogger
Kickme.exe
Koobface Social Trojan Horse
LeoSrv Trojan Horse
Link Virus
Logic Bomb
Look2Me Trojan Horse
Macro Viruses
Magic DVD Ripper Trojan Horse
Malware
MBS Trojan Horse
means of infection
means of transmission
mebroot Trojan Horse
Meyrocorp virus
Micro Bill Systems Trojan Horse
MicroBillSys Trojan Horse
Microbillsystems Trojan Horse
MS08-068
MS08-069
MS08067
Multipartite
Musicins
Mutex Mutual Exclusion Object
Nakhater.A Worm
NR Trojan Horse
Nuclear RAT Trojan Horse
NucRat Trojan Horse
Nuke Attack
Nuker
Obfuscated.en Trojan Horse
Optix Pro Trojan Horse
password stealer
payload
Phishing
Pigeon AXLM Trojan Horse
pop up menu
pop up popups
pop up windows
Posion Ivy Trojan Horse
potentiially unwanted program PUP
Premium Search Trojan Horse
prepending virus
proactive protection
process killer
ProRat Trojan Horse
redirect re direct
replica
resident virus
rootkit
Sabath
Sacramento
saplad, Roberto
scanning ports or IP addresses
Scareware
Script virus
security patch
security risk
Shaft Trojan Horse
shareware
sharK Trojan Horse
SHeur.CFQB Trojan Horse
SHeur.CRTP Trojan Horse
SHeur.ZSQ Trojan Horse
Small
Small 129
Small 132B
Small 146
Small 157
Small 178
Small 185
Small 187
Small.T
Small-38
Smily
Smit Fraud
Smithsonian
SMTP Simple Mail Transfer Protocol
Snow White and the Seven Dwarfs
SoftIns
Solano
Something
Soupy
Sov
Soyun
Spam
spammer
Spammer.AKE Trojan Horse
Spanish
Spanish April Fool
Spanz
Spar
Spawning
Spear Phishing
Spyer
Spyforms.BQ Trojan Horse
spyware
Spyware Doctor
SQR
Squawk
Squeaker
Squisher
SRE
Staf
Stahl Platte
Stealth
Stealth_C
Steve Perillo
Stoned
Storm Trojan Trojan Horse
Striker
Stupid
Subliminal
sub-type
Suicidal
Suicide
Sunday
Sunday-2
Sundevil
Suriv 402
Suriv A
Suriv B
Surrender
Susan
SVC 5.0/6.0
Sverdlov
SVir
Swap Boot
Swen - "News" spelled backwards
Swiss 143
Swiss Phoenix
SX
Sylvia
Sys
Syslock/3551
sysmptoms of a Trojan Horse
sysmptoms of a virus
sysmptoms of infection
T-1
T297
T4
Tabulero 2
Taiwan
Taiwan3
Taiwan4
Taocheng
Targeted attack
Techno
Tecla
Telecom Boot
Telecom File
Telekom
Teletype
Teletype-2
Tentacle
Tequila
Terror
Tester
TMTM
TP
Tremor2
TridenT
trigger virus
Triple Shot
Troi Two
Trojan Horse Generic11.CLR
Trojan Horse Generic11.OQJ
Trojan Horse IRC Backdoor.SdBot4.FRV
trojan horse uninstall.exe
Trojan Metamorf.C Trojan Horse
Trojan virtumonde Trojan Horse
Trojan Backdoor.Ntrootkit
Trojan.Banload.74 Trojan Horse
Trojan.Bytesize Trojan Horse
Trojan.Jakposh Trojan Horse
Trojan.Qoologic Key Logger
Trojan.VAnti.gen.a!sys
Trojan.Vundo
Trojan.Vundo Trojan Horse
Trojan.VUNDOA
Trojan.wavBfly Trojan Horse
Trojan.wavVerify Trojan Horse
Trojan.Wimad Trojan Horse
Trojan:Win32/Yabector.B
Trojan.Zlob
Trojan.Zonebac
Trojan.Zonebac Trojan Horse
Trojandownloader
Trojan Downloader.Agent.UZM
Trojan Downloader.Agent.THW
TrojanDownloader:Win32/Deseq.A
TrojanDownloader.xs Trojan Horse
Tschantches
T-series
TU-482
Tuesday
Tula
Tumen
Tumen V0.5
Tumen V2.0
tunneling
Turbo
Turkey
Tver
Twin Peaks
Twin-351
Typo Boot
Ucender
Ugur
Undressed
Unk
UPS Virus
Uriel
Uruk 300
Uruk 361
Uruk-Hai
USSR
USSR 1049
USSR 2144
USSR 256
USSR 257
USSR 3103
USSR 311
USSR 394
USSR 492
USSR 516
USSR 600
USSR 696
USSR 707
USSR 711
USSR 830
USSR 948
USSR-394
V1 0
V1 1
V1028
V125
V1463
V163
V1-Not
V2 0
V2000
V2100
V270X
V299
V2P2
V2P6
V-351
V-388
V400
V483
V5
V600
V800
V801
V82
V914
V961
VA
vacination
Vacsina
valentine.exe
variant
VCL
VCL-HEEvE
Vcomm
VCS
VDV-853
Venge-E
Vera Cruz
VHP
VHP-2
Victor
Vienna/648
Vietnamese
Violator
Viper
Viperizer B
Viral Messiah
Virdem
Virflop
virus
virus constructor
Virus Signature File
virus-101
virus-90
viruses
V-Label
VM
Voco
Vootie
Voronezh
Vote/Vote1000
VP
Vriest
VTS
vulnerability
Vundo
VVF-34
W13
Walkabout
Walker
Warez
Warning! Spyware detected on you computer!
Warrior
Warrior 2
WAVE
Wazoo
WDEF
Weak
Whale
Wharps
WhoCares
Why win
Wilbur 3
Wild Thing A
Wild Trojan
Willistrover III
Willow
Willow 2
WinAble
WinAntivirus
Windows AntiVirus
Windmill
Windows has detected spyware infection!
WinFixer
Win32/Mabezat.A
Winvir
WinWebSecurity2008 Adware
Wisconsin
withlove.exe
Wizard 3.0
Wolfman
Wonder
Word Atom Macro
Word Color Macro
Word Concept Macro
Word Hot Macro
Wordswap
World Peace
Worm
Worm_DOWNAD.E
Worm_DOWNAD.KK
Worm:Win32/Pushbot.NV
Worm:Win32/Refroso.A
Wow.VM Trojan Horse
Wsnpoem
WWT
www.globseason.com steals email contact list Vacation reply
X-1
X-2
X-3A
X-3B
X77
Xabaras
XP-695970A6
XP Antivirus
Xpeh
XTAC
Xuxa
Yale
Yan2505a
Yankee
Yankee – 2
Yap
Year 1993
Your computer is infected
Your Computer Might Be At Risk
Your Privacy is in Danger
Youth
Yukon
Z10
Zak2
Zaragosa
ZBot
Zeppelin
ZEUS V3 Empties your bank account
Zero Bug
Zero Time
ZeroHunt
ZK900
Zlob Trojan Horse
Zlob Trojan Horse
ZMist
Zoda
Zombie
Zoo virus
ZRK
ZU1


 
1

Our national network of IT technicians and engineers can effectively deploy a national rollout or service a distant office.
3 Geeks and a Mouse's National Account Manager is here to assist you! We will provide you with the best technicians for your problem and enable you to limit your number of contacts to one. We can help you effectively control costs, timing and quality of your deployment in one office or nationwide.
How may we assist you?

 
1 3 Geeks and a Mouse eliminates the frustration out of home computer repair. No more unplugging everything and trying to remember which wire goes where. We come to you. On your schedule.
Many of our technicians and engineers have certifications such as MCSE, MCP, CCNA, and A+.
Customer satisfaction is our #1 goal. Let us earn your business and trust.
 
1 Whether your an Fortune 500 company, a small business owner or you have a home office, 3 Geeks and a Mouse has the right solution for you. Call the professionals at 3 Geeks and a Mouse to keep your server, network and computers running at their optimal speed, leaving you to running your business, not an IT department. Our service manager will send the best qualified technician for the job. Many of our technicians and engineers have certifications such as MCSE, MCP, CCNA and A+. Let us earn your business.
 
1
Alabama ( AL ) Computer Repair Louisiana ( LA ) Computer Repair Ohio ( OH ) Computer Repair
Arizona ( AZ ) Computer Repair Maine ( ME ) Computer Repair Oklahoma ( OK ) Computer Repair
Arkansas (AR ) Computer Repair Maryland ( MD ) Computer Repair Oregon ( OR ) Computer Repair
California ( CA ) Computer Repair Massachusetts ( MA ) Computer Repair Pennsylvania ( PA ) Computer Repair
Colorado (CO ) Computer Repair Michigan ( MI ) Computer Repair Rhode Island ( RI ) Computer Repair
Connecticut ( CT ) Computer Repair Minnesota ( MN ) Computer Repair South Carolina ( SC ) Computer Repair
Delaware ( DE ) Computer Repair Mississippi ( MS ) Computer Repair South Dakota ( SD ) Computer Repair
District of Columbia ( DC ) Computer Repair Missouri ( MO ) Computer Repair Tennessee ( TN ) Computer Repair
Florida ( FL ) Computer Repair Montana ( MT ) Computer Repair Texas ( TX ) Computer Repair
Georgia ( GA ) Computer Repair Nebraska ( NE ) Computer Repair Utah ( UT ) Computer Repair
Hawaii ( HI ) Computer Repair Nevada ( NV ) Computer Repair Vermont ( VT ) Computer Repair
Idaho ( ID) Computer Repair New Hampshire ( NH ) Computer Repair Virginia ( VA ) Computer Repair
Illinois ( IL ) Computer Repair New Jersey ( NJ ) Computer Repair Washington ( WA ) Computer Repair
Indiana ( IN ) Computer Repair New Mexico ( NM ) Computer Repair Washington ( DC ) Computer Repair
Iowa ( IA ) Computer Repair New York ( NY ) Computer Repair West Virginia ( WV ) Computer Repair
Kansas ( KS ) Computer Repair North Carolina ( NC ) Computer Repair Wisconsin ( WI ) Computer Repair
Kentucky ( KY ) Computer Repair North Dakota ( ND ) Computer Repair Wyoming ( WY ) Computer Repair