Latest News

Did you know your computer is most Vulnerable to Viruses and Malware through your browser and their plug-ins...

Read More

Call us today (905) 841-0266

Virus Removal

Microsoft Windows or MAC OSX Systems

The best defense, even in virus protection, is a good offense. The first step is to ensure your operating system is up-to-date. This is essential if you are running Microsoft Windows operating system. Secondly, you need to have an anti-virus software installed on your system and update frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Thirdly, you should have a good firewall installed on your computer. A good firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms.

MR PC DOCTOR specializes in removing malware, trojans, backdoor viruses, conflicker viruses, contra viruses, darksma viruses, and defender viruses.

If you have viruses, malware or spyware problems or suspect your system has been compromised call (905) 841-0266 or use our contact page.


A computer virus is a malicious piece of code that can replicate itself and infect your computer. Most viruses attach to executable files - programs. Therefore, when you open the malicious program (executable file), the virus is activated and quite often replicates itself and attaches to another executable file. Computer viruses can range in severity. Some may cause only mildly annoying effects while others can be quite destructive to your operating system and software programs. Computer viruses continue to spread through sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

Trojan Horses

A Trojan Horse is quite sophisticated and full of trickery as the mythological Trojan Horse it was named after. The Trojan Horse will appear to be useful software but will become malicious and damaging once installed on your computer. When a Trojan is activated on your computer, the results can vary, possibly allowing confidential or personal information to be compromised.


A computer worm is also a sophisticated malicious piece of code that is designed to copy itself from one computer to another. Unlike a computer virus, a worm can copy itself automatically without human interaction. Worms can replicate in great volume. For example, worms can copy itself to every contact in your e-mail address book, and then send emails to all your contacts. A common payload for worms is to install a backdoor in the infected computer to create a zombie computer that becomes part of a networks often referred to as botnets. Botnets are very commonly used by spammers sending junk email or those of ill repute to disguise their website's address.