When something nasty gets on your computer, it probably will try to contact a computer over the Internet. You can use a handy security file to keep it from going anywhere.
First, you need to understand how a browser works. When you enter a site name (such as www.komando.com) in the browser, it has to convert that to a true Web address. These addresses are numerical, in the form of xxx.xxx.xxx.xxx. They're called Internet Protocol numbers.
To find the number, the browser first goes to a file on your computer. That's called the HOSTS file. Assuming the number is not there, it goes to a domain name server on the Internet. All this happens very quickly.
A custom HOSTS file can be used to ground unwelcome programs. Malicious programs also go first to the HOSTS file. If the site name is listed there, the HOSTS file sends it to 127.0.0.1. That is your computer. That kills the request.
Take this link to find an excellent HOSTS file. Read the copious instructions, so you know what you're doing. This HOSTS file is updated twice a month.