What Is a Computer Virus? 43 Worst Computer Viruses in the 21st Century

12 min read

The slow loading processes. The alerts from your virus protection. The emails from friends telling you something is off. The spam. The strange responses. The blue screen of death. Viruses have been around for about as long as the personal computer and it’s a big nightmare because they disrupt your computer’s performance significantly. The viruses are more advanced than our virus detection and prevention software. Sometimes even the best defense can’t always keep your computer safe when you encounter one of these viruses. Computer viruses have been around for many years and have been a major threat to computer users because they can wipe away your important data at any time and also make your machine function abnormally.

This article is a brief history of all the worst computer viruses, worms, and trojan horses of the 21st century. You have to take some good precautions to avoid any sort of computer viruses, otherwise, you can get into huge trouble. There are different types of PC viruses and you should know about all of them before it’s too late.

What Is A Computer Virus?

A computer virus is a malicious program installed on a computer without the user’s permission and performs spiteful activities that can cause harm to files, data, or other software in the computer. Fred Cohen first defined the term ‘computer virus’ in 1983. PC viruses never occur naturally but they are intentionally spread by hackers. When viruses are made and released, their dispersal is not directly in human control. Once the virus enters a computer, it attaches itself to another program and the host program execution triggers the virus’s action concurrently. PC Virus can also self-replicate itself, by inserting it onto other files or programs and damaging them in the procedure.

Not all PC viruses are meant to harm your computer’s data, software, or hardware. However, most viruses on a computer are in destructive nature and perform malicious actions, such as damaging files and data. Some computer viruses cause havoc when their code is run, while some lie inactive until a specific event gets started, that executes their code in a computer. Viruses propagate when the documents or software they get attached to are moved from one PC to another through a network, file-sharing methods, a disk, or via malicious e-mail attachments.

List Of Computer Viruses

Here is a list of computer viruses that have been causing damage to users’ PCs since 2000.



Allegedly created by a Filipino computer science student in 2000, the ILOVEYOU virus was also known as the Love Letter and the Love Bug worm. This is a dangerous computer virus, that infected millions of Windows computers within a few hours of being released and is still considered one of the most dangerous worms ever released.


Also, in 2000, the first computer virus targeting children was released. The Pikachu virus was designed as an email that included the Pokémon character, Pikachu. The email had the message “Pikachu is your friend”. The attachment claimed to be an image of the Pokémon, but with that image, unsuspecting children released a Visual Basic 6 program called pikachupokemon.exe that removed the contents of directories. Fortunately, a warning message about the deletion helped maintain the potential damage.

Anna Kournikova

In February of 2001, the Anna Kournikova virus attacked email servers. It is the most dangerous virus for PCs that sends emails to the contacts in a user’s Microsoft Outlook address book and spreads. Anna Kournikova forces email users to open mail with an infected program. Unlike many other viruses and worms in the same year, the Dutch developer was caught and sentenced to 150 hours of community service.


Taking advantage of the backdoors left open by the spread of worms like Code Red II, Nimda appeared in the fall of 2001 and spread rapidly through machines that had already been compromised at least once.


In a year known for big viruses, the final big virus to appear in 2001 was the Klez worm. Klez took advantage of vulnerabilities in the Microsoft software – in particular, Internet Explorer, Microsoft Outlook, and Outlook Express.


Later that year, in July of 2001, the Sircam worm was released and spread using emails in Microsoft Windows systems, and the network shared the virus spread across machines. Sircam is a mass-mailing worm that can through Windows Network shares. This worm activates when an EXE extension file runs until it has completed the operation 8000 times.

Code Red Worm

On July 15, 2001, a Code Red worm was detected on the Internet. It attacked Microsoft’s IIS web server’s computers. Immediately on the heels of Sircam, Code Red began attacking the Index Server ISAPI Extension in Microsoft’s Internet Information Services.

Code Red II

Not to be outdone, a few weeks later, someone rewrote the original Code Red worm, and Code Red II was released. The new version was even more aggressive and spread through millions of machines, heavily affecting those in China.


2002 brought in a few heavy hitters including the Beast malware. Beast was a Windows-based Trojan that attacked through the backdoor of Windows software. Also called RAT for Remote Administration Tool, Beast was able to infect virtually all known versions of Windows at the time. The original version was released by its creator Tataye in 2002, but versions of the Trojan were released through 2004.


Another email worm, Mylife appeared in early 2002 and spread itself quickly by sending out emails to all of the contacts in an infected Microsoft Outlook address book. Mylife is destructive a malicious computer worm that can delete important files of the system.

SQL Slammer

January of 2003 brought the SQL Slammer worm, which was also called the Sapphire worm or the Helkern worm. It attacked Microsoft SQL Server and MSDE. The worm was able to work through vulnerabilities so quickly that it became the fastest-spreading worm of all time. After just fifteen minutes, internet access was disturbed worldwide after the first victim was attacked. SQL Slammer can slow down your general internet traffic.


Later that year, the Blaster worm, which was also known as the Lovesan worm, took advantage of a vulnerability in system services in Windows computers to spread rapidly.

Sobig. F

In the summer of 2003, the Sobig worm, or more formally the Sobig. F worm again uses email systems like Outlook and other unprotected file shares to spread quickly through Microsoft systems.

Sober Worm

In the fall of 2003, the Sober worm first appeared, again attacking Microsoft systems. The Sober manages to stick around through at least 2005 using new versions of the original worm. The Sober took advantage of systems already weakened by the SoBig and Blaster viruses and created massive damage to infected machines.


2004 ushered in another mass-mailing worm called Bagle. There were two versions of the worm, Bagle. A and Bagle. B although both affected all versions of Microsoft Windows after spreading through emails.

L10n Worm

Almost simultaneously, the “lion” worm, or L10n worm, appeared. This was a LINUX worm that spread through the BIND DNS server by exploiting a buffer overflow. The L10n was a more advanced version of a previous worm called the Ramen worm. Both were written to attach systems running 6.2 and 7.0 of Red Hat Linux.


The fastest-spreading mass mailer worm of all time also appeared in January of 2004. The MyDoom worked through mail systems and holds the record of the fastest-spreading email worm to this day.


Just a few weeks later in 2004, the Netsky worm was discovered. This worm is also spread by email, but once spread, the worm copies itself to folders on the available drives including network drives. There were eventually many variations on this particular worm.

Witty Worm

Another record-breaking worm, the Witty worm appeared in March of 2004. This worm took advantage of holes in Internet Security Systems products. This was the first internet worm to carry a destructive payload. It spread quickly using a pre-populated set of ground-zero hosts.


Networks were attacked in the spring of 2004 by the Sasser worm. This worm exploited weaknesses in the Windows LSASS service. It was especially potent when the Sasser worm attacked in close company with or right after the MyDoom and Bagle variants. Sasser was even known to have shut down businesses.


The fall of 2004 brought Vundo, which was also known as Virtumonde or Virtumondo. It was also referred to as MS Juan. This Trojan caused pop-ups and other intrusive advertising for fake antispyware programs. The Trojan was also known to degrade machine performance and block certain websites like Facebook and Google.


In the closing weeks of 2004, the first “webworm” was released. Santy used a vulnerability in phbBB and then used Google to find new targets. More than 40,000 websites were infected before Google was able to block the worm by filtering the search query, effectively stopping it.


In early 2006, the Nyxem worm began to spread through mass mailing. The payload of the worm was activated on the third of each month, with the first detonation on February 3. The goal of the worm was to disable security features and destroy certain files, including Microsoft Office files.

Storm Is A Backdoor Trojan Horse That Affects Computers Using Microsoft Operating Systems

Storm Worm

The fastest-spreading email spam appeared in early 2007. The Storm Worm created a significant threat to Microsoft systems. Infected computers were grouped into the Storm botnet and after six months more than 1.7 million computers had been infected. 10 percent of computers worldwide have been compromised. Storm is a backdoor trojan horse that affects computers using Microsoft operating systems. It is thought to have started in Russia and tricked users into downloading the worm by claiming it was a video of a news event referenced in the original email.


One year later in 2008, Torpig, which was also known as Sinowal and Mebroot attacked Windows machines. The Trojan turns off anti-virus applications which leaves portals open for others to access the user’s computer to steal information, install additional malware, and modify files and data.

Torpig is the trojan-type malware that attacks Microsoft Windows users. It is shown in the research that this malicious program inoculates a component that operates as a keystroke logger. Moreover, it can be used to execute and download many files that contaminate computers with types of malware.


Another massive infestation of machines occurred in the fall of 2008. Conflicker eventually affected up to 15 million Microsoft servers. The worm affected large systems including the French Navy, the UK Ministry of Defence, and the Norwegian Police. There were five known variants of the worm discovered over two years. Microsoft eventually set a bounty of $250,000 for information to catch the author of the worm and released a patch to stop the spread of the worm.


On July 4, 2009, Independence Day in the United States, a series of cyber-attacks occurred targeting the United States and its ally, South Korea. The attacks released W32.Dozer as part of the attack.

Daprosy Worm

In that same month, the Daprosy Worm was discovered by Symantec. The Trojan was designed to steal online game passwords by recording keystrokes in internet cafes. This worm was especially dangerous when it spread out of gaming and into business-to-business systems.


In 2010, the first worm to attack SCADA systems appeared. The Stuxnet was a Windows Trojan that may have been originally designed to target nuclear facilities in Iran. The Trojan used a valid certificate, which made it even more dangerous.

Anti-Spyware 2011

As the name indicates, the Anti-Spyware 2011 Trojan began to attack versions of Windows by posing as an anti-spyware program. The Trojan disabled the security process for other, real anti-virus programs while blocking internet access. Without internet access, updates could not be downloaded, compounding the problem.


In the summer of 2011, the more sophisticated Morto worm used Microsoft’s Remove Desktop Protocol to spread. The Morto forces infected computers to scan for Windows servers allowing RDP login. Once an appropriate system is located, the worm attempts to log in using generic passwords generated by a large dictionary.


In late 2011, a new worm appeared that appears to be related to the previously released Stuxnet. The Duqu created files on the infected computer, giving them the prefix “~DQ”, which led to the eventual name of the worm.


Released in the spring of 2012, Flame was created and released for targeted espionage in Middle Eastern countries. Also known as Flamer, Skywiper, and sKyWiper, the malware attacked computers running Microsoft Windows. Flame was arguably the most sophisticated piece of malware created up to that point.


Later in 2012, the energy sector was attacked by the Shamoon virus. The computer virus was designed specifically for Microsoft Windows machines running energy software. This malware can overwrite and delete files on an infected computer. Shamoon can also erase the computer’s master boot record.


In the fall of 2012, the NGRBot was discovered. The worm instigates file transfers to send commands between a zombie network and the attacker’s own IRC server. After infecting a machine, the worm uses a rootkit technique to steal information from the victimized machine. The same bot blocked updates from security software killed other forms of antimalware and redirected machines.


About a year later, the CryptoLocker Trojan is named. This Trojan worked as ransomware. After infecting a machine, the malware would encrypt files on a hard drive and then demand payment to release the files back to the original owner. After the original release of CryptoLocker, copycats were released for months that followed the same format.

Gameover Zeus

Despite its clever name, the Gameover ZeuS Trojan was a nasty bug that would steal login details on banking and other monetary websites. Once a popular financial website was detected. The Trojan injected code into the page to log keystrokes. GameOver Zeus is mostly used by cybercriminals to steal the confidential information of users.


The standout malware from 2014 is the Regin Trojan. Operating discreetly, the Regin Trojan was a dropper that spread via copycat web pages. Once the Trojan was downloaded, Regin would download extensions of itself which made it very hard to detect, block, and remove. There are rumors that this particular Trojan may have been created by the United States and the United Kingdom for espionage and surveillance.


In 2015, there was a massive spike in DDoS attacks precipitated by the BASHLITE malware. Originally called Bashdoor, this bit of malware-infected Linux systems to launch denial-of-service attacks.


Another piece of ransomware appeared in early 2016. Locky had more than 60 derivatives, and all spread across Europe to infect millions of computers. At one more there were more than 5,000 computers infected per hour in a single country. The ransomware would lock up files and demand payment to release them again to owners. Locky spread widely in part due to the lack of appropriate security available, as the ransomware was more sophisticated than current versions of security software.

Tiny Banker

The banking industry was attacked directly by the Tiny Banker Trojan in early 2016. More than twenty-four major banks in the United States were infected by the Trojan. The Trojan would use HTTP code to mimic the bank’s homepage. After entering login data, the spoof page would return the “incorrect login” page and redirect the user to the real page. The incorrect login was simply a cleverly hidden theft of information that was sent along to the Trojan’s host. Among the infected were big names like Wells Fargo, Chase, HSBC, and Bank of America.


One of the most powerful and disruptive DDoS attacks occurred in September of 2016. The Internet of Things is one of the first to be attacked followed by Krebs of Security site. Eventually, several big websites were attacked by Mirai including GitHub, Twitter, Reddit, Netflix, and Airbnb.

Wanna Cry Used by Cybercriminals to Extort Money

Wanna Cry

Another bit of aptly named software appeared in May of 2017. The WannaCry ransomware is the latest computer virus. The ransomware is found to use information revealed in the NSA hacking toolkit leak from 2016. Fortunately, soon after the ransomware began to spread, a security firm in the UK found a “kill switch” in the ransomware and stopped the initial spread. Unfortunately, new variants immediately began to spread that did not contain the kill switch.

Viruses are a fact of life that comes with PC use. You can’t escape the possibility of the virus, so you must always be cautious online and practice safe computing. And if a virus slips by your best defenses, be ready to do war – and keep your most important files backed up, just in case.

Wrapping Up!

In this article, I have shared with you a PC virus list that is known to be one of the worst computer viruses since 2000. There are different types of PC viruses and worms and you can get SSL certificate services (Symantec, GeoTrust, RapidSSL, Thawte, Comodo ) to avoid these viruses. You need to take some good precautions to avoid any computer viruses, or else you can get into a huge problem. There are many questions asked by PC users regarding viruses such as, how to detect viruses in pc?, how to keep your computer virus-free?, how to delete viruses from pc?, etc.

The information I have shared in this article would help you to detect viruses on your PC, so you can eliminate them before they cause any major harm to your data or device. If you still have any questions regarding computer viruses, you can ask us in the comments section.

82 thoughts on

What Is a Computer Virus? 43 Worst Computer Viruses in the 21st Century

  • Prosper Noah

    Hello @Oleg

    This is a wide list 😮

    Just hope we could get a good antivirus that would help in preventing these viruses.
    Thanks for the info

    • Oleg Calugher

      Hey Prosper,

      Thank you for the comment,
      Yeah, a good anti-virus on our computers, safe web-browsing habits and a decent web hosting company like Temok is all we need to keep us safe,

      – Oleg

  • pranav phogat

    yup these are the dangerous viruses available , btw thanks for this amazing blog.

  • Joy Healey

    As with all wickedness, I wish the scum who design these viruses would apply their “talents” for good instead of inflicting misery and financial loss on faceless victims. Failing that, let someone lock them up and throw away the key.
    Joy – Blogging After Dark

    • Oleg Calugher

      Hey Joy,
      Thank you for the comment,

      Yeah, totally agree with you, and for us – the internet entrepreneurs, it is not just financial losses but also emotional pain that we have to go through. These sites and blogs are not just income channels but they are our 2nd homes and when someone breaks-and-enters, the feeling isn’t good.

      – Oleg

  • Venu

    Hello Oleg,

    I agree with your points on how virus effects your works by making slow and becomes very irritating process in doing any work on your PC. And the list of viruses you mentioned are the great knowledge.

    • Oleg Calugher

      Hey Venu,

      thank you for the comment,
      Yeah, totally agree with you – it is a pain to work on a slow computer, it totally kills our productivity,

      – Oleg

  • Suraj Padmasali

    I think these were most known viruses, not most dangerous. I didn’t know the names of some of the virus. But respect anyway. Glad to found your post. Keep writing such an informative post.

    • Oleg Calugher

      Hey Suraj,

      Welcome to Temok and thank you for the comment,
      Yeah, they are surely most known due to all the publicity they received but surely no-less dangerous! Feel free to let us know other viruses that you believe were more dangerous and will include them in the future lists,

      – Oleg

  • Arvind

    Hi Oleg,

    great list of dangerous viruses…my PC is harmed regularly with viruses and it really affects my work…….anyway great information..please do post an article next time on how to deal with these viruses as well…!!

  • Muthukrishnan

    Thanks for sharing the information about the huge list of viruses.

    • Oleg Calugher

      Hey Muthukrishnan,

      Welcome to Temok and thank you for the comment,
      always good to hear positive feedback,

      – Oleg

  • Durga

    Hello Oleg,
    The virus on PC is the dangerous thing in digital world. It corrupts your complete data and makes the PC very slow. These big list of viruses act different on the content.

  • Prosperity Kenneth

    A good list of anti-virus will wipe all this out. I experienced browser hijacking few months back and 7 anti-virus softwares did the job.

    • Oleg Calugher

      Hey Kenneth,

      Welcome to Temok and thank you for the comment,

      Yeah, a good anti-virus can surely help, or a better webhost like Temok which is known for its security.

      However, most of these virus have already done their work and costed losses in millions …

      – Oleg

  • Donna Merrill

    Hi Oleg,

    My gosh, this list is quite scary. Imagine if all those people could have turned things into positive ones. Instead of viruses, they could have created something useful for our world society.


    • Oleg Calugher

      Hey Donna,

      Thank you for the comment,
      Yeah, very scary indeed,

      Totally agree with you,
      People waste their talents in ways that they might not even realize – by creating virus they secure their names in the history in a negative way, if they had done something constructive – they would be remembered for good!

      – Oleg


    Great info! thanks..

    • Oleg Calugher

      Hey BISWAJIT,

      Welcome to Temok and thank you for the comment,
      Good to know that you have liked the article,

      – Oleg

  • Junaid

    This is the very informative post, I love to read more about this.
    I appreciate your effort.


    • Oleg Kaluger

      Hey Junaid,

      Welcome to Temok and thank you for the comment,
      Good to know that you have found this post informative,

      – Oleg

  • Mi Muba

    Hi Oleg

    List is quite dangerous for miscreants but quite informative for cyber peace loving people.
    I read somewhere that Michael Angelo and Stone2 are equally lethal viruses that I could not have found here. Maybe you mentioned them with some other technical names. Do correct me if I am wrong.

    Thanks for sharing such amazing list.

    • Oleg Kaluger

      Hi Mi Muba,

      Surely, this list is indeed dangerous and all the viruses mentioned in it have already proved how much harm they can bring.

      I will look into these 2 names that you have brought up, perhaps I have missed them or like you said – they are under a different name. Most of these viruses have multiple names for various reasons …

      – Oleg

  • Raj Mahi

    my pc in paid anti virus then always showing Viruses can you tell me how to remove this type Viruses

    • Oleg Kaluger

      Hey Raj,

      Welcome to Temok and thank you for the comment,
      You should call your anti-viruses support, they all have a toll-free phone number where you can call and get support,

      – Oleg

  • farooq

    i have a free anti virus then always showing Viruses can you tell me how to remove this type Viruses and thanks a lot for this useful post, keep posting bro you have a awesome skills

  • Adeel Sami

    Hey, Oleg!

    You made me scare!…!

    I am a little lucky that I use different software to keep some distance from getting affected.

    Yeah, I am also very skeptical of the programs used and do not let any USB or CDs enter my work machines.

    So, thank you for revealing these bad viruses!

    ~ Adeel

    • Oleg Kaluger

      Hey Adeel,

      Welcome to Temok and thank you for the comment,

      No worries! As long as you keep security a top priority and host your websites on servers as secure as those of Temok’s – there’s nothing to worry about.

      Yes, I too make sure that no USB or DVDs enters our work PCs that aren’t scanned and secured already,

      – Oleg

  • Sandeep

    This is the Excellent post with Great quality and all above mentioned viruses types are very scary infect………No Doubt this information really helpful for our computer safety!

    • Oleg Kaluger

      Hey Sandeep,

      Welcome to Temok and thank you for the comment,
      Yeah, they are indeed very scary. I guess your best defense is your own safe browsing habits along with anti-virus softwares that you should scan and update regularly,

      – Oleg

  • Monika Sharma

    OMG these are such dangerous viruses & I never hear names of these viruses but they are such dangerous for PC.

    This post is really valuable for for readers they will know about dangerous viruses.

    • Oleg Kaluger

      Hey Monika,

      Welcome to Temok and thank you for the comment,
      Yeah, totally agree with you – those are very dangerous viruses,

      – Oleg

  • Dharmikkumar Bhatt

    nice information thanks

    • Oleg Kaluger

      Hey Dharmik,

      Welcome to Temok and thank you for the comment,
      Good to know that you have liked it,

      – Oleg

  • evangilina

    oleg kaluger thanks for sharing wounderful article and known about viruses how it effects thank you so much keep the spirit

    • Oleg Kaluger

      Hey Evangilina,

      Welcome to Temok and thank you for the comment,

      – Oleg

  • Rakesh Birchi

    Thanks for writing such a wonderful tips for secure my PC.

  • Rakesh

    Never heard of most of the viruses. Last one was Ransomware i think which was popular across the globe. Thanks for sharing wonderful tips and their threats !

    • Oleg Kaluger

      Hey Rakesh,

      Welcome to Temok and thank you for the comment,
      Ransomeware was surely popular and since it was the latest – people recall it a lot more,

      – Oleg

  • anoosh ali

    i think The Trojan turns off anti-virus applications which left portals open for others to access the user computer.

  • Tunde

    Thanks for the list! Lol! So there is a virus called ‘ILOVEYOU’……

    • Oleg Kaluger

      Hey Tunde,

      Welcome to Temok and thank you for the comment,
      Yeah, the hackers like their Irony well!

      – Oleg

  • Philip Wagner

    You Provide Very Good Information and your Article And Way of Explaining have no competitor. Thanks Keep it Up.

  • Timothy Finbarr

    This is a very enlightening post, it really made my day… I hope we get real solutions and preventions to these viruses.

    • Oleg Kaluger

      Hey Timothy,

      Welcome to Temok and thank you for the comment,
      It is almost impossible to have a solution that will save us from any future virus – but the best prevention still lies in our own hands – which is staying careful online!

      – Oleg

  • Tony

    Super awesome post. In the article, the author has given amazing solutions to protect your computer from virus.


  • Rohan

    I got one of them in my PC, but Kaspersky did the wonderful job to remove it. But I lost many files sadly.

    Thanks for awareness.

  • Zahidul Islam

    I have read the article. Everything was represented in a pretty good way.
    I regularly use to visit your site to collect some new information from your topic and usually found it here.

  • carolinew

    Hello, thanks for posting a great blog with us.

  • Kamil Riaz Kara

    This article helps me a lot. Thanks for sharing this awesome article. I easily solved my PC problem related to the duplicated folder virus.

  • Neha Kakkar

    My god! There are lots of viruses. Thanks for sharing.

  • Nick

    You guys really help me out . I really need this information.

  • Kabir Singh

    Wow!! thank you for your efforts. I learn about many viruses from here.

  • pawan kumar

    Nice article thank u so much for sharing

  • aryan

    Nice article

  • sakir hussain

    Please keep us informed like this. Thank you for sharing

  • Naseeb

    Nowadays there are many kinds of viruses coming on internet and affecting our PCs. This is one of them. Thank you for informing us.

  • Arijit

    Thanks for this valuable information. Now no virus on the computer.

  • Chirag sharma

    Good morning and i read this article and thanks for sharing this useful information with us

  • Jassi gill

    Thank for sharing this kind of informative article.i really appreciate your efforts

  • Ravi Kumaar

    Nice and informative article. Really liked it.

  • John

    Have you heard for virus called MAAS. It has infected my computer and crypted all my files. Can you help me, is there any solution to this, i have lost all my photos, games, music!

  • Shelly A Garcia

    Thank you Oleg for this information. I am suspicious that a return of Tiny Bank reappeared in New York at the merger of Chase and T D Bank in New York . Hopefully we will not go into bad debt again!

  • Prince

    Thank you for this important information

  • Arijit Singh

    Thanks For Sharing Useful Information About huge list of viruses.

  • Roshan

    This article helps me a lot. Thanks for sharing this awesome article.

  • Alax

    Great article. Thus article is really informative and helpful. Thanks for sharing.

  • Zayn

    Very helpful article

  • ilyas

    thanks for this great information about different types of viruses

  • Humayoun Mussawar

    Nice article

  • Navir

    Great and Very Helpful Article

  • Rexxha

    Great Post. It was worth reading…..

  • Rahul Gaur

    Great and Informative Article

  • John Melan

    Amazing website. Thanks for amazing articles.

  • maya ashutosh kc

    OMG… Thanks For Sharing Useful Information About huge list of viruses.

  • sagar

    i just want to say, Great and Very Helpful Article

  • Rahul

    Very Informative Article.

  • Vishal Ranganathan

    Awesome artice I really loved it.

  • Roddy Ricch

    This article us literally saves us Thanks.

  • Matthew

    Its been long I last read Temok somewhere around 2015-2017. Its great to see that a google search brought me back here again. I was hit by one of the bad malware or ransomware which demanded $780 to remove it but some sources shared I should ignore the fee. All files encrypted.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Make Your Website Live Today!

Choose Your Desired Web Hosting Plan Now

Temok IT Services
© Copyright TEMOK 2024. All Rights Reserved.