Depending upon what your goal is, it's possible, though not advisable. In the early days of simple viruses, most...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
remediation was performed manually, by removing the hidden and infected systems files, cleaning your registry, etc. Now, with the advent of advanced viruses, spyware and other malware, protected computing requires much more than just manual processes, as new code requires complicated removal routines.
But that doesn't mean you can rely solely on automated processes, and sometimes zero-day exploits require a level of hands-on involvement that hearkens back to those early days. There is the occasional exploit that could benefit from manual intervention, before the antivirus vendors have built a response, but the antivirus companies have shortened that time to such a small window that unless you're in the antivirus business yourself, the learning curve for manual removal is unusually not worth the effort.
Dig Deeper on Threat management and prevention
Related Q&A from Russell Dean Vines
While some SMBs are not securing their mobile broadband, there is good reason to do so, even if a customer has only a small amount of data to protect.continue reading
A smurf attack can slow down a network to the point of shutting it down completely. Learn how to understand a full-scale smurf attack and how to ...continue reading
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.