The article ‘Protect yourself from the Conficker computer worm’ published by Microsoft gives practical information about how this worm enter into a computer? What does the Conficker worm do? And how do we remove this worm?
Security researchers have discovered certain variants of Conficker worms (a, b, c, d) to date and as I said above these are spread through file sharing, removable devices (Conficker B) and via built-in peer-to-peer (P2P) communication (Conficker D). The Conficker worm can also disable important services on your computer such as Windows security updates.
Is my computer infected by Conficker? If you have updated your Windows and security programs, you are at a much lower risk of being infected by the Conficker worm. Most of the antivirus software developers have already developed standalone tools for scanning and removing Conficker worm. Some of them are following: Conficker Remover from ESET, Kaspersky, F-Secure, Microsoft, Bitdefender and McAfee Stinger