If you are reading this in case you get hacked, then first of all back up your important data like photos and documents on to a USB stick or DVD. It will save you a headache in the long run. Have a check at “have I been pwned?” https://haveibeenpwned.com to see if your email or username has been compromised. Thanks to Troy Hunt for a great service.
As switching on your device and a black window is saying you have to cough up money or else your data is lost. Or an infinite amount of windows popped up when you clicked your browser. Or any of the numerous amounts of hacks that are out there are affecting you. Then you will wish you were the lot I referenced in the paragraph above. Because 9 out 10 times the solution is a sledge hammer called re-installation of the operating System.
If you have access to your system and can get to McAfee Stinger page. Download the latest Stingers (A standalone virus destroyer) and run the program. Unfortunately the viruses normally target your anti-virus program first, so using an antivirus on a USB stick normally does the trick.
When access is denied to your operating system then more drastic measures have to be taken. You will need 2 USB sticks, one for the system access and one for the data to be stored on it.
UNetbootin allows you to create bootable Live USB drives. Once you have finished the installation on your USB stick then on to the next step.
Once your data is safe then it is on to re installing your system. On windows you can hit F10 or F8 to start your factory installation, please refer to your OS instructions on how.
Here are the best for windows, Avast Free Antivirus 2017, AVG Antivirus Free (2017), Bitdefender Antivirus Free Edition (2017), Check Point ZoneAlarm Free Antivirus+ 2017, Kaspersky Free Antivirus, Sophos Home, Avira Antivirus (2017), Adaware antivirus free 12, Comodo Antivirus 10, Panda Free Antivirus (2017).
Virus programs have been active for over 30 years. Viruses in the 80’s, were distributed by CDs given away by magazines
You see, this is not some snotty teenager with bad acne wanting revenge for the demise of marathon chocolate bar. Nor is it a mad professor plotting the end of the world. This is some very clever people exploiting vulnerabilities of complex programs the original creators had somehow missed. Or even worse, the programs have deliberate back doors built in so any one with the power or money can access your data.