Please visit these web pages for tips that can help you avoid further infections on your computer:
http://www.symantec.com/home_homeoffice/security_response/secureemail.jsp
http://www.symantec.com/home_homeoffice/security_response/browsewebsafely.jsp
http://www.symantec.com/home_homeoffice/security_response/safeguardim.jsp
http://www.symantec.com/home_homeoffice/security_response/filesharingprotection.jsp
Do not leave a floppy disk in the floppy disk drive when you shut down or restart the computer.
Be suspicious of email attachments from unknown sources.
Verify that attachments have been sent by the author of the email. Newer viruses can send email messages that appear to be from people you know.
Do not set your email program to "auto-run" attachments.
Obtain all Microsoft security updates.
Back up your data frequently. Keep the write-protected media in a safe place—preferably in a different location than your computer.
Trust only alerts from Norton if it says that your system is infected
If a pop up window opens up, always close it by clicking on the cross mark on the top right corner. Do not use other ways, such as clicking on buttons like 'Cancel' to close the popup.
Always read the License Agreement carefully before installing any software from the internet. Usually free software’s or sharewares are associated with viruses. These software’s appear to be legitimate, but infact they are related to viruses/spywares. Typical examples are 'Winfixer', 'WinAntivirus', 'Error safe', 'Drivecleaner' etc.
Do not open any e-mail that seems suspicious
Always keep your antivirus & windows up to date by downloading the latest updates
Use Norton Internet Security to proactively protect from spyware and other security risks.
Configure the firewall in Norton Internet Security to block unsolicited requests for outbound communication.
Do not accept or open suspicious error dialogs from within the browser
Spyware may come as part of a "free deal" offer - do not accept free deals
Always read carefully the End User License agreement at Install time and cancel if other “programs” are being installed as part of the desired program
Keep software and security patches up to date
Use common sense. It's always better to err on the side of safety. If you're unsure about an attachment, delete it. Especially if it's from a source you don't recognize. If there are tempting animations on a site that look highly unprofessional, don't download them.
Scan files for viruses before using them. This is always important, but especially if you are using a disc or flash memory to carry information between one computer and another. You could easily pick up a virus from a corrupted file and introduce it into your system. Running a virus scan before launching any of new files will prevent infection.
Don't share data CDs. Even a well-meaning friend may unknowingly pass along a virus, Trojan horse, or worm. Label your discs clearly so you know they're yours and don't loan them out. If a friend passes you a foreign disc, suggest an alternative method of file sharing.
Don't boot from an unknown data CD. Data CDs are one of the most common ways viruses are transmitted. If you are using a data CD while working on your computer, remove it when you shut the machine off or the computer may automatically try to boot from the disc, perhaps launching or installing bad programs or files on your computer.
Don't download programs from the Web. Unreliable sources such as Internet newsgroups or Web sites that you haven't heard of may be willing providers of viruses for your computer. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program—any files with an ".exe" or "".com" extension, such as "coolgame.exe." Check to see if the site has anti-virus software running on their side. If you do have to download from the Internet, be sure to scan each program before running it. Save all downloads to one folder, then run virus checks on everything in the folder before using it.
Update your anti-virus software frequently. An anti-virus program is only as good as the frequency with which it is updated. New viruses, worms, and Trojan horses are born daily, and variations of them can slip by software that is not current. Norton Antivirus has a feature that searches for new virus definitions every time you go online, so you are always up to date.
Get immediate protection. Configure your anti-virus software to boot automatically on start-up and run at all times. This will provide you back-up protection in case you forget to scan an attachment, or decide not to. And in case you forget to boot up your anti-virus software, configuring it to start by itself will ensure you get immediate protection anyway.
Scan all incoming email attachments. Be sure to run each attachment you plan to open through the anti-virus check. Do this even if you recognize and trust the sender; malicious code, like Trojan horses, can slip into your system by appearing to be from a friendly source.
Don't automatically open attachments. Be sure your email program doesn't automatically download attachments. This will ensure that you can examine and scan attachments before they run. Refer to your email program's safety options or preferences menu for instructions.
Install reliable anti-virus software. Anti-virus software scans files regularly for unusual changes in file size, programs that match the software's database of known viruses, suspicious email attachments, and other warning signs. It's the most important step you can take towards keeping your computer clean of viruses. Norton AntiVirus is the world's leading anti-virus software. It runs continuously in the background of your computer, providing constant protection from viruses, Trojan horses, worms, and other malicious code. To stay up-to-date on the latest online threats, Norton AntiVirus automatically updates its virus definitions whenever you're online.
Avoid clicking on any Advertisement Popups on the Internet. They are mostly related to Adware & Spware. Trust only alerts from Norton if it says that your system is infected If a pop up window opens up, always close it by clicking on the cross mark on the top right corner. Do not use other ways, such as clicking on buttons like 'Cancel' to close the popup. Always read the License Agreement carefully before installing any software from the internet. Usually free softwares or sharewares are associated with viruses. These softwares appear to be legitimate, but in fact they are related to viruses/spywares. Typical examples are 'Winfixer', 'WinAntivirus' etc. Do not open any e-mail that seems suspicious. Always keep your antivirus & windows up to date by downloading the latest updates.
Keep your system up to date with Microsoft Windows Update to protect your system from viruses and worms that attack known Windows security vulnerabilities. Install Anti-Virus and Anti-Spyware software and keep the virus and Spyware definition files current. Install a hardware or software Firewall to help block unwanted access to your system. Microsoft Windows XP comes with a built-in software Firewall which you can enable. Protect your system against unwanted pop-ups by using Windows XP SP2 featuring Pop-Up Blocker for Internet Explorer. Practice safe computing habits on the web. Read any Pop-up messaging, advertisements, and End User License Agreements (EULA) carefully. Never give out personal information (including e-mail addresses) unless it is required to obtain service or a product from legitimate companies.
Avoid clicking on any links that you are not sure who the sender is and/or if you are not sure where the links may send take you to. This applies to all links including links sent in an e-mail, Instant Messaging (IM), Chat services, unfamiliar web pages, etc. Do not open e-mails with questionable or unexpected subject lines. Strange subject lines usually indicate something suspicious, such as a virus. They use clever titles to mass market their destructive viruses, worms, and Trojan horses. Delete suspicious e-mails immediately, and be sure to delete chain e-mails and junk e-mail (known as Spam) as well. Use hard to guess passwords. Password protecting your computer is the simplest and most common way to ensure that only those with permission can use your computer or certain parts of your computer network. Just be sure to choose a hard-to-guess password.
Make passwords as meaningless as possible. Change passwords regularly. Never divulge passwords to anyone. Never share files with strangers (doing so opens your computer up to potential hacker attacks). Beware of Hoaxes. Virus Hoaxes are false announcements about viruses. Virus Hoaxes occasionally obtain instructions for "cleaning" or deleting a virus from a computer, but the instructions may involve deleting essential Windows files, and have nothing to do with viruses at all. I hope these guidelines would be helpful for you.
Source: www.symantec.com