- 1). Open a web browser and type in the URL of the scanner site you want to visit. When the home page loads, set your preferences such as operating system, Internet speed, region and language.
- 2). Make sure your system meets the minimum system requirements. If your computer does not have adequate memory or processor speed, or if your Internet connection does not have sufficient speed, you may not be able to use the scanner.
- 3). Initiate the scan process by clicking on the main scanner button embedded in the page, usually labeled "Scan," "Scan Computer" or "Start Scan." Depending on the site, you may have to agree to a license agreement to proceed. Reveal the whole text of the license, using navigational arrows or clicking on the slider bar to read. If you accept the terms of use, click "Accept" or put a check-mark next to "I Accept" and then click "Next."
- 4). Install additional components--web-based scanners usually require one or more browser add-ons to be installed before starting the scan process; what components are required will depend on which browser you use. Most sites will explain why the add-on is required and may also contain instructions on disabling the feature after the scan ends. When prompted, click "Yes" or "OK" on the message to confirm installation. Follow instructions to install the component and restart the browser if prompted.
- 5). Specify the scan type you want, because web-based scanners may offer multiple scan types to choose from. In general, a full system scan is more comprehensive and-time consuming than a basic or standard scan. If you have fast Internet connection, or if you do not have an antivirus program installed, opt for a thorough scan. Click on the appropriate radio button and then click "Next." This will start the scan process.
- 6). Review the scan result after the progress bar reaches 100 percent by clicking on the confirmation message to view the report. Most online scanners will generate a list of identified threats, along with additional details such as threat type, threat level, and location on disk. Use the "Repair," "Fix," "Delete" or "Quarantine" buttons to apply the action to all items, or address each threat individually. When all viruses and malware are eliminated, close the browser and restart your computer.
SHARE