Computer Virus Effect Remover is a helpful software program for the Windows operating system that helps you deal with the aftereffects of an infection with a virus, trojan or other malicious code.
It can be used to remove various changes that malicious programs made on the system. These are often done by malware to make it difficult for the user to remove the malicious program that is running on the system. If you cannot use the Task Manager for example, it becomes difficult to kill the malicious process to stop it.
The Open Source software can aid users in the removal of effects on the Windows file system and the Windows Registry. One of the main features of it is that it can re-enable access to the Windows Task Manager, Registry Editor, MSconfig and the Process List.
Other options include process details that can be used to kill any running process including files that are currently in use by it.
These processes and files can be added to a blacklist so that they will not be executed anymore even if another process attempts to relaunch them right after they have been killed.
The program provides additional options to create or restore a Registry backup, check system files and to repair AutoRun options.
Virus Effect Remover can be a helpful program to remove traces of malicious software.
Update: The most recent version of Virus Effect Remover uses a different interface and offers additional functionality on top of what has been mentioned in the review so far.
The interface looks rather messy on first run. You have a bar on the right with access to various tools, and a tabbed interface on the right of it that provides you with access to even more tools.
The tools on the left provide you with direct options. You can use them to scan all startup locations to remove programs from it, to run a new process, get information about files or folders, or to block viruses which allows you to specify files that you don't want executed at any time.
The unlocker is another new tool that you can use to unlock files that you cannot delete or move directly. This is often the case when a file is still in use by a process.
The main issue that you may have with the program is that it is difficult to navigate because it is not immediately clear where you find specific tools. This means that you will have to click through various menus in the beginning to get a feel for the program before you get used to it and start to find tools faster.
With that said, it is an excellent tool that can help you a great deal to recover a system after a successful attack.Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.