Security Mecca


Posted in Articles, Tutorials on



MalwareBytes – for basic users

For users that do not have a technical aspect to identify which files are harmful and should be deleted, there is MalwareBytes. MalwareBytes help users delete harmful files from their computer in a matter of two clicks of the mouse.

What is Malware? Malware is short for malicious software. This software is designed to gain unauthorized access to a computer system. Malware includes viruses, Trojan horses, worms, spyware and adware. It can be used to harm, steal or just annoy victims. The first victims were attacked purely to be annoyed and pranked. As the technology grew and the Malware developed, hackers then decided to start using this software for their own good (to steal and harm your information). The main problem today is the many various methods this Malware can be delivered. Email and “free” downloads are a main root for this evil. Never click any unknown links in email and blogs. Also be cautious at websites you are unfamiliar with. A popular delivery method is also free software and games. You may be downloading a popular flash game to your computer but included with the software is some hidden Malware. When you click agree to download and install you may actually be allowing the Malware to be installed and run on your computer. Becoming more popular is the fake “Anti-Virus” malware. Once this is installed it will remove all control from the user and only allow them to purchase the fake software. Once the user purchases it, the software may temporarily allow the user to regain control but after a few days or weeks it may re-activate and request more money. Some users may not realize this and pour massive amounts of money into a terrible cycle. If you notice any pop-ups or unfamiliar software make sure not to enter any personal information and by all means do not enter any payment information.

To combat this Malicious software there are many options. One of the best options available to users right now is MalwareBytes. This is free software available to everyone that updates very frequently. It is very important for these programs to update frequently due to the fact that hackers are creating new versions just as frequent. You can visit and then click “Download Free Version”. The full version you can buy unlocks real-time protection, scheduled scanning and scheduled updating. This is worth the money but not necessary. You can just regularly check for updates and scan your computer on a regular basis. Once you have downloaded the program you will see a similar screen as below.

Any user can download and install the program. Once the program is installed you will then see the screen above. If you believe you have Malware or just want do a regular scan, select Perform Quick Scan and press Scan.

If you in fact do have an infected file you shall see the following screen.


The items in red are the infected files on your computer. Next is the category and location for the infected file. By default all items will be selected. All the user must do now is to click the “Remove Selected” button. This will remove all files selected that were infected on your computer.

NOTE: If your computer is already infected by Malware and has removed control from the user, you will then need to start your computer in “Safe Mode”. If you are unsure about starting in safe mode please refer to our article on “Starting in Safe Mode”. Once the computer is started in safe-mode you should be able to start the MalwareBytes program. Select a “full-scan” and let the program run. This may take up to an hour but may find and help remove the Malware that has taken control of your system.


about the author

More about David Perreault:
David Perreault David's interest in computers is mainly in the security field, and he has network+ and A++ Certifications. He is a Senior and will be graduating next year with a Bachelors in Telecommunications Information Management, with Minors in Management, Computer Science, Graphical Design and International Studies. David is currently the IT Support Director for the History Department at WMU. He plays with computers at work, at class and at home. David is striving to be a network security analyst while working his way into Ethical Hacking.

questions or comments?

If you have any questions or comments about this article, feel free to contact us!

talk back! questions/comments, and feedback. keep it polite, please