answersLogoWhite

0

Searchpage Viruses

Searchpage viruses force the web browser to display only a particular web page. Manually heading to another website will not work as the browser will only go back to the same page.

500 Questions

How do you get the search bar back?

User Avatar

Asked by Wiki User

It might be the case that you simply hid it behind other stuff on the bar in which case expand the area. Or you might need to go to Tools>Toolbars and check the search bar so you can view it again. Hope this helps.

How do you get rid of bad websites?

User Avatar

Asked by Wiki User

You must own the domain name associated with the website. If you own the domain, contact the domain registration service you used to register the domain.

If you do not own the domain, the most you can do is block the domain name from your computer. If you are not comfortable editing your hosts file, you will need a third party program to perform the filtering.

What damage does a Trojan horse do?

User Avatar

Asked by Wiki User

It depends...either they will most likey prevent pregnancy and STDs, you might be able to conquer an empire using one, or if your unlucky enough to get one on your computer your in for at least a couple days of cleaning, defraging, and pissing off anyone you (or the virus) sent email too while infected, or you might just find yourself buying a new computer. A updated anti-virus program will prevent you from ever meeting one.

Where do you get help if you don't know what to do for a virus?

User Avatar

Asked by Wiki User

Probably just call your Local Doctor/GP and see what they sugest. You may need to book an appoitment...

Does Google give you free stuff?

User Avatar

Asked by Wiki User

Google.com is only for looking up pictures, information, and important things.

But if you go on google.com then you can type in stuff for sell, and maybe something will pop up for sell. Hope you find something you like !

Is gogglecom a virus?

User Avatar

Asked by Wiki User

It used to have viruses, but the website was shut down.

What is a virus only goal?

User Avatar

Asked by Wiki User

A virus is going to try and slow your computer down and get personal information of the peoples account on the computer with the virus.So they can scam you and use your personal information (Like bank numbers , important messages sent in messages)

How did the Trojan horse work?

User Avatar

Asked by Wiki User

Trojan horses are made as destructive software. they usually get download in some way or another then just sit and do nothing until a certain date. after that it run it's program(s) and messes-up your computer.The Trojan horse of Sparta was to secretly sneak soldiers into Troy Turkey in the Greek war against Troy.

What is salami attacks?

User Avatar

Asked by Wiki User

Salami attack

In the salami technique, cyber criminals steal money or resources a bit at a time. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the cyber criminal will make a sizable amount of money every month.

The classic story about a salami attack is the old " collect-the-roundoff " trick. In this scam, a programmer modifies arithmetic routines, such as interest computations. Typically, the calculations are carried out to several decimal places beyond the customary two or three kept for financial records. For example, when currency is in dollars, the round off goes up to the nearest penny about half the time and down the rest of the time. If a programmer arranges to collect these fractions of pennies in a separate account, a sizable fund can grow with no warning to the financial institution.

To quote an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.

Logic bombs are programmers, which are activated on the occurrence of a particular predefined event. The logic bomb was programmed to take ten cents from all the accounts in the bank and put them into the account of the person whose name was alphabetically the last in the bank's rosters. Then he went and opened an account in the name of Ziegler. The amount being withdrawn from each of the accounts in the bank was so insignificant that neither any of the account holders nor the bank officials noticed the fault.

It was brought to their notice when a person by the name of Zygler opened his account in that bank. He was surprised to find a sizable amount of money being transferred into his account every Saturday.

How do you protect from a salami attacks?

User Avatar

Asked by Wiki User

There is nothing you can do to protect yourself from it. You can only prepare for the inevitable and hope that your painful salami death will be quick.

How do you get rid of searchpage cc 1525?

User Avatar

Asked by Wiki User

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

First download a copy of cwshredder.exe. This is freeware and worked excellent for me.

cwshredder suggests that you uninstall the Java VM to prevent this from coming back. The instructions for doing this are at: http://www.winnetmag.com/Article/ArticleID/38206/38206.html

To get rid of searchpage 1524 problem

Go to internet site: http://searchpage.cc/1524/

Scroll to bottom of page and click on this if problem: click here

Yes you want to download uninstaller and save to your desktop.

You must reboot, but then problem will be gone.

You'll probably have to reset your homepage and search defaults.

If you don't want to continue using this page, follow instruction below:

1. Download uninstaller (right click and choose "Save target as.." from pulldown menu

2. Run it

3. Reboot your PC

4. Run it second time

5. Change your start page to "about:blank" in the IE settings (Tools -> Internet Options)

6. Click "Start" -> "Run" -> regedit

7. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\

8. Select key {FF1BF4C7-4E08-4A28-A43F-9D60A9F7A880} and delete it

This is what they at searchpage.cc. I tried and it works. No more problems width downloads.

Do vertebrates reproduce asexually?

User Avatar

Asked by Wiki User

Some do and some don't. It just depends on what kind of animal it is...

What game sites have viruses?

User Avatar

Asked by Wiki User

it really depends on which one. like ones that make you download/install their programs. But if you can you can use a virus scan daily.

What is a trojan-type virus?

User Avatar

Asked by Wiki User

It is a virus that is buried inside another program. SO when the program is run the virus does its thing. That is why a good virus detection software package is important and it is kept up to date.

How do you know if you have a computer virus?

User Avatar

Asked by Lovealwayskaty

you can know by:

  1. your computer shuts down by itself
  2. Sites keep opening realy fast by it self
  3. you keep getting annoying messages
  4. your computer gets really slow
  5. if you have a anti virus dececter it might find one
  6. YOU SHOULD KEEP AN ANTIVIRUS DECTETOR e.x NOTRON .
  7. Your computer keeps restarting it self
  8. If you open a website it closes by itself

What part of a virus contains the instructions for making new viruses?

User Avatar

Asked by Wiki User

They are in their genetic materials. They have either DNA or RNA

Viruses can be classifies by all of these methods except?

User Avatar

Asked by Wiki User

List the features you think they are not.
Viruses are classified mainly on their genetic material, such as DNA or RNA with its strand specificity single stranded or double stranded.

Did the Trojan horse really happen?

User Avatar

Asked by Wiki User

The Trojan horse story is told to be a myth. This means that it is a made up story, possibly loosely based on some facts from long ago.

What are three ways viruses are classified?

User Avatar

Asked by Wiki User

Resident Virus

This type of virus is a permanent as it dwells in the RAM. From there it can overcome and interrupt all the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed etc.

Examples: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in as well as directories that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Examples: Vienna virus.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples: Way, Trj.Reboot, Trivial.88.D.

Boot Sector Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot sector viruses is to ensure that floppy disks are write-protected and never starting your computer with an unknown floppy disk in the disk drive.

Examples: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the path that indicate the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected it becomes impossible to locate the original files.

Examples: Dir-2 virus.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies.

Examples: Elkern, Marburg, Satan Bug and Tuareg.

File Infector Virus

This type of virus infects programs or executable files (files with .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Examples: Cleevix and Cascade.

Companion Viruses

Companion viruses can be considered as a type of file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus) or act immediately by making copies of themselves (direct action virus).

Some examples include: Stator, Asimov.1539 and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to store all the information about the location of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Examples:

Multipartite Virus

These viruses spread in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files.

Examples: Invader, Flip and Tequila

Web Scripting Virus

Many web pages include complex code in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by anti-viruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is program which disguises itself as a useful program or application.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched and the results can be destructive.

Besides, there are many other computer viruses that have a potential to infect your digital data. Hence, it is a must that you protect your data by installing a genuine quality anti-virus software.

Name of some viruses?

User Avatar

Asked by Wiki User

The storm virus wom

nimda

elkern

What are the necessary hardware and software requirements to connect your computer to the local isp and the local isp to other isps to create form international network?

User Avatar

Asked by Wiki User

a modem that connects to your PC either directly or through a router/switch/hub, windows.

The modem must be connected to the internet, either through Coax', phone-line or other.