A Three-Step Approach to Secure Your personal computer From Viral Threats