Steps have been infected when

Detection and specify where about whether the source of the virus on the diskette,
network, email etc.. If you are connected to the network then it's good you isolate your computer first (either the cable or remove the mendisable
Internet connection from the control panel)
Identification and classifying the type of virus that attack your PC, by:
Menganali symptoms that arise, eg messages, files, a corrupt or missing etc.
Scan with your antivirus, if you are affected when running the auto-protect means
virus definition in your computer does not have a virus of this data, try
update manually or download a virus and then to definitionnya
you install. If the virus to block your efforts to update, then
strived to use other media (computer) with the anti -
have the latest update.
Clean virus. After you successfully detects and recognizes
then try to find the immediate removal or how to
destroy the sites that provide information development
virus. This needs to be done when the antivirus with the latest update
you do not succeed destroy it.
The worst. If all the above is not successful format
back to your computer

OVERCOME

Steps for Prevention
For prevention you can do some of the following steps:
1) Use anti-virus that you believe the latest update. No matter
provided that any merknya always updated, and auto-protect enabled the
your computer protected.
2) Always scanning all external storage media that will be used,
This may be making a bit but if the auto-protect your antivirus
work then this procedure can be missed.
3) If you are directly connected to the Internet try to combine
your antivirus with Firewall, Anti-spamming, etc..
4) Always be wary of the FLE-file suspicious, for example: a file with 2
exstension fruit or executable file that looks suspicious.
5) To + shareware software freeware, it's good to take from you
authorized site.
6) Semampunya avoid buying pirated goods, use a software-software
open source.

SOME HOW spreading of virus

The withdrawal of virus biological virus must have spread to the media,
computer viruses can spread to a variety of computer / machine also through other
various media, including:

1. Floppy disks, storage media R / W, flash disk
External storage media can be a soft target for the virus to
be the media. Well as a place to live or as a media distribution.
Media bias operation R / W (Read and Write) is possible
infected for the virus and serve as the distribution media.

2. Network (LAN, WAN, etc.)
Relationships between some computer directly is very feasible
virus took a move occurs when the exchange / pengeksekusian file that
contain viruses.

3. Internet
Site may be a very deliberate planted a "virus" that will
infectedcomputers that access it.

4. Software Freeware, Shareware or even pirated
Many viruses are deliberately planted in a program that
distributed either free, or trial version.

5. Attachment on the email, Transferring files
Almost all of the spread of the virus, the use email
attachment because of all Internet users use email surely
to communicate, these files are made intentionally light / attract attention, even
double often have the extension on the file naming.

Multi Partition Virus

This virus is a combination of boot sector viruses and file viruses. This means working
the result in two, namely he can infected files or *. EXE
*. COM and infected boot sector.

Virus File / Program

This virus menginfeksi files that can be executed directly from the system
operation, whether the files *. EXE, *. COM and also usually results from infection of this virus
may be changing with the size of the file that attack.

Polymorphic Virus

This virus is designed for lead on antivirus program, it means the virus is always 
trying to avoid being identified by antivirus is always changing with the change 
structure each time the file is complete menginfeksi / other programs. 
Examples of viruses: 
- Necropolis A / B, 
infect file *. EXE and *. COM; 
The length of the file 1963 bytes; 
Characteristics: live in the memory, the size and hidden virus, encrypted, and can 
changed the structure change 
- Nightfall,Menginfeksi file *. EXE; 
The length of the file 4554 bytes; 
Characteristics: live in the memory, the size and hidden virus, has triggered, 
encrypted and can change the structure

Stealth Virus

This virus will be the table on the DOS interrupt that often we know 
with the "interrupt interceptor". capable this virus to control 
instructions DOS level and are usually hidden according to their good name 
or full size. 
Examples of viruses: 
- Yankee.XPEH.4928, 
infect file *. COM and *. EXE; 
Length of 4298 bytes; 
Characteristics: live in the memory, the size of hidden, have triggered 
- WXYC (a category including the boot record is also due to enter stealth kategri 
also included here), an infect Floopy motherboot record; 
Length of 520 bytes; 
Characteristics: live in the memory; size and hidden viruses. 
- Vmem (s): 
Menginfeksi files *. EXE, *. SYS and *. COM; 
Fie 3275 bytes long; 
Characteristics: live in the memory, the size of hidden, in the encryption.