Virus Removal

Getting a computer virus is arguably one of the worst things that can happen to your PC Computer, Laptop or Mac.

Approximately 6,000 new viruses are released every month, so it’s no wonder some of them slip through the net of your anti-virus software.

When a virus does attack, we know how tempting it can be to search online for software to remove the virus manually. But this is not completely fool-proof.

Viruses are crafty, and can often leave remnants hidden away where you or your virus removal software may not have looked.

At Nexus, we have the knowledge and experience to remove viruses quickly and effectively, and aim to have you back up-and-running with as little disruption to your daily routine as possible.

As standard practice we back up all of your data before performing any work, so rest assured that we will do our best to make sure your information, documents and precious memories are safe.

Not only this, but we always endeavour to make sure your PC Computer, Laptop or Mac system is virus free and properly protected before we send you on your way – the last thing we want is for you to come back with the same proble


Always make sure you have downloaded and installed all of your Microsoft or Apple updates
Always make sure your Antivirus protection is turned on and up to date
Check to see if your Antivirus software also protects you from spyware


  • The safest thing to do is to disconnect from the internet immediately, to prevent information from being sent via your network
  • DO NOT perform any online banking or online purchases
  • Bring your computer into us in Gerrards Cross, and we’ll get it booked in and treated as a priority
  • With viruses its strongly advised that you get it seen to straight away, so what are you waiting for, drop your computer into us today and leave the rest to us!

More information on virus types:

Trojan Horses

Broadly speaking, a “Trojan” is any malicious or harmful program that disguises itself as a normal program and asks the user to run it. A Trojan is not actually the same as a virus as it does not spread itself but waits to be downloaded; however, it can be just as damaging, if not more.

Often, a Trojan will masquerade as something desirable or useful on the internet, such as an application, therefore tricking the user and gaining access to otherwise secured networks. Unsurprisingly then, Trojans take their name from the Greek Myth of the “Trojan Horse” that was used to infiltrate and destroy the city of Troy.

Trojan Horses are an extremely developed form of virus. As such, there are many types of Trojan which have different consequences for your computer.

Remote Access Trojans
The most frequently available. Allows the attacker to gain complete control of your computer to access files and personal information.

Key Loggers
Logs your keystrokes and sends information back to the attacker. This means your passwords and any other sensitive data can be extracted from a log of the buttons you have pressed.

Destructive Trojans
Has only one purpose: TO DESTROY AND DELETE YOUR DATA! This can be done remotely by the attacker, or be programmed to wait until a specific time or day before launching a destructive bomb into your files.

Password Sending Trojans
Intended to discover (as with key loggers) and copy all cached passwords to send to particular email address.

FTP Trojans
Out-dated, but still in circulation. These open a Files Transfer Protocol port which allows anyone to connect to the user’s computer via a network to access files and personal information.

DoS (Denial of Service) Attack Trojans
Overloads the user’s computer or server with internet traffic, therefore making the Internet Connection too congested to allow access to websites or downloads.


A computer worm is a malicious program that replicates itself and spreads via computer networks. It is not technically a ‘virus’ in that it may not necessarily cause damage to or modify program files and does not need to attach itself to an existing program. But it can still cause your machine lots of problems.

Many worms are created to be payload free, and spread to create security holes in networks and systems or to generally flood a network with DOS errors.

However, some worms are created to install backdoors which allow unauthorised access to the infected computer by the worm’s writer.

Worms can be sent via emails as attachments, or even just in emails with executable scripts, which means you may not have to open attachments but simply view an email to trigger its release. It can also be replicated across a shared network.

Boot Sector Viruses

The boot sector of your computer is the part of the hard drive that is accessed when you turn on your computer. A boot sector virus affects this part of your machine. The virus is stored in the memory to be triggered upon start up and can prevent the computer from starting or the operating system from booting.

These viruses are usually spread by infected floppy disks, although these are somewhat out-dated with more advanced data storage devices.

Similarly, the boot sector of a floppy or hard disk or other data storage device is the section that is automatically executed when inserted into a computer by the machine’s firmware.

Boot sector viruses are malicious codes placed into this sector, meaning the virus is set into action when the disk is run. The virus can gain control of a computer’s basic functions and cause damage to the system via this method.