Internet full of pop-ups? Computer giving you unusual messages? PC running much slower than usual? Chances are you've picked up a virus somewhere. Maybe your anti-virus software wasn't up-to-date or you accidentally clicked on something you shouldn't have. Don't worry, you're not the first and you certainly won't be the last. Here at mamu we have successfully removed all kinds of infections from PCs, mobile devices and laptops without losing any of the owner's data, and we can give you tips to avoid virus infection in the future. We can even check over your devices to spot weak points and offer our recommendations to keep your files safe and secure in the future.
If you think you might have a virus, just give us a call or email so we can ascertain the type of virus you have and we can get it cleaned up for you in no time.
|Unsure of some of the terms we've used? We've handpicked a few definitions for you below, or you can visit our glossary for a comprehensive list. Click on 'read more' to see the full definition.|
|Antivirus: Antivirus software is used to detect and remove malignant programmes on your PC or mobile device, as well as providing protection against threats. Whilst most people are aware that antivirus protects against computer viruses, it should also... read more|
|Backup: A backup is a copy of one or more files that can be used in case the original files become irreparably damaged or unusable. As hard drives can fail or become corrupted over a period of time for a number of different reasons, it is recommend... read more|
|Bug: A bug in computer terms is any problem or error that occurs, whether caused by software or hardware. The term bug dates back to before the digital era, with Edison referring to bugs in electrical circuitry in the 1870s. However, it is thoug... read more|
|Illegal Operation: Illegal operation error messages sometimes pop up when a program has an unrecoverable error and has to quit. This is usually the result of an error in the program code, and is the fault of the software rather than the machine running it. If... read more|
|Malware: Malware, or malicious software, is a generic name for programs that are designed to do damage, steal personal details or otherwise perform hostile or unwanted actions on a user's system. This includes viruses, worms, trojan horses, spyware ... read more|
|Pop-Up: A pop-up is an advert that appears in a new window whilst users are browsing the internet. The adverts are generally not related to the site that the user is on, and usually appear when users first visit a web page or close a window. Some p... read more|
|Safe Mode: Safe mode is a boot option in most major operating systems (sometimes called safe boot) that disables all non-essential hardware and software components. A computer may boot up in safe mode automatically if it has been failing to boot norma... read more|
|Spam: Originating from a Monty Python sketch, the term spam refers to unsolicited adverts sent to users by email, instant message, text message and other media. Because there is little to no cost incurred for the sender, and no real way to trace ... read more|
|Spyware: Spyware is a type of malware that collects information about users without their knowledge or permission, including personal data, browsing habits and online banking information. Spyware can also install additional software, change computer... read more|
|Trojan: Much like the Greek legend, a trojan is a type of malware that masquerades as a genuine, legitimate program but steals information or causes large amounts of damage once installed. Trojans give hackers remote access to an infected system, ... read more|
|Virus: The term virus is often used to describe all sorts of malware, but the term refers specifically to malicious programs that have the ability to replicate and spread from one system to another. The most common way of spreading a virus is thro... read more|
|Worm: A worm is a type of malware that replicates itself to spread to other computers via a network. Unlike viruses, however, worms tend to attack the network rather than the computer itself, increasing network traffic and overloading the network... read more|