answersLogoWhite

0


Best Answer

No, there is not.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Someone has been talking to you online for 7 months you recently found out they are not really the person in the pictureTo make it shortis there a service or way to find someone online with only a pic?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Who does ricky shortis love?

he wants to Mary hayley vakirevic


What has the author Trudi A Shortis written?

Trudi A. Shortis has written: 'On the nonlinear stability of the unsteady, viscous flow of an incompressible fluid in a curved pipe' -- subject(s): Viscous flow, Nonlinear systems, Unsteady flow, Stability tests, Pipes (Tubes), Incompressible fluids, Flow stability


What is sars flu?

Severe Acute Respiratory Syndrome SARS for shortis a respiratory disease in humans which is caused by the SARS coronavirus (SARS-CoV). You can get it from birds.http://en.wikipedia.org/wiki/Severe_acute_respiratory_syndrome


Lyrics to you are a Green Pea by John Shortis?

The celery's in the salad, the mint is in the punch, but I'm in the freezer 'til Sunday's lunch. I'm a green pea, freeze freeze, I'm a green pea, freeze freeze, I'm a green pea, won't you thaw my frozen heart.


What actors and actresses appeared in 31 Questions - 2012?

The cast of 31 Questions - 2012 includes: Yusef Ali Dauhoo as Himself - Contestant Elyce Behrsin as Herself - Contestant Kelsey Berry as Herself - Contestant Emily Brownstein as Herself - Contestant Tamzin Byrne as Herself - Contestant Naomi Chainey as Herself - Contestant Nicholas Denner as Himself - Contestant Lisa Dib as Herself - Contestant Lucy Downs as Dickie Handler Josephine Forrest as Herself - Contestant Lisa Gillard as Herself - Contestant Moe Hammoud as Himself - Contestant Jesse Heath as Himself - Contestant Rex Hunt as himself Dan Ilic as himself Gerard Kotlowy as himself Dani Leever as Herself - Contestant Sophie Loughran as Herself - Scorekeeper Bee Marffy as Herself - Contestant Daniel McCaughey as Himself - Contestant Anthony McCormack as Himself - Moderator Rohan Mirchandaney as Himself - Contestant Kat Muscat as Herself - Contestant Simon Owens as Himself - Contestant Alexander Pugh as Himself - Contestant Glenn Ridge as himself Ashlee Shortis as Herself - Contestant Jane Szokolik as Herself - Contestant Rhys Tate as himself Simon Toppin as Himself - Contestant Melanie Valantine as Herself - Scorekeeper Erin Vivian as Herself - Contestant


What is virus adware spyware rootkit and other malware?

virusesvirus vital information resource under seige (VIRUS) ( its self replicating )is small program written to alter the way a computer operates WITHOUT PERMISIION OR KNOWLEDGE OF THE USERfor a program to be considered a virus it must be able to execute and replicate itself without intervention of the user .*a virus is spread by inserting copies of itlself into other executable code or documentas with or without the knowledgeof the user by PIGGYBACKING with legimate application*the insertion of the virus into a program is known as INFECTION the infected file or executable code-------------------------------------------------------------------------------------------------------------------------REPLICATION - A VIRUS INFECT A HOST FILE WHICH IS A FILE THAT CONTAINS EXECUTABLE CODEthis stage is very difficult to detect . this file will attach to empty space inside an existing file .*ACTIVATION - the virus delivers its playload*PROGRAM INFECTORS - it infects .EXE OR .COM FILES*BOOOT SECTOR INFECTOR (BSI) - its passed at the time of disk accesss , its simple as DIR cmmnd-------------------------------------------------------------------------------------------------------------------------WORMS are self contained and do not need to be part of another program (host) to spreadit uses email or another transport mechanism (it dosent need user interaction for activation ) from one disk driveto another .some worms install BACKDOOR in an infected computer a backdoor is used to gain unauthorized access to a computerEXAMPLE OF WORMSMYDOOM -fastest spreading mass mailerSOBIG WORM--------------------------------------------------------------------------------------------------------------------------TROGAN HORSE OR TROJAN FOR SHORTIS A HARMFUL PROGRAM THAT IS DISGUIED as legitimate software ( like a rouge sequrity software)it dosent look harmful intresting & useful they are quite damaging when they run*they r not self-replicating which distinguished them from viruses ond worms*additonally they require interaction with a hacker to fullfil their purpose the hacker need not be the individualresponsible for disturbing the Trojan horse--------------------------------------------------------------------------------------------------------------------------SPYWAREits a generic term for a class off software designed to either gather information for marketing purpose or to deliveradvertisement to webpagesaltough software of this type is legimate it can be installed on ur computer without the user's knowledge---------------------------------------------------------------------------------------------------adwarethe term adware refers to any software which displays advertisement whether the user agreed to the advertisement or notadware is a computer program where advertisement are automatically loaded by the software and displayed after instalationadware is usually responsible for pop-ups that occur on an computer for no reason even when the computer is dissconnected from the internetadware is often refferd to simply as spyware the main difference between spyware and adware is that adware programs do notinvisibilly collect and upload activity records or personal information to third parties*************************************************************ROOTKITa rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer networktypically a cracker installs a rootkit on a computer after first obtaining user level access either by exploiting a knownvulnerability or cracking a passwordonce the rootkit is installed . it allows the attacker to mask intrustion and gain root or privleded access to the computer and posibbily other machiens***************************************************************phishingit is an act of sending an email to a user falsely claiming to be established legitamate enterprise in attempt to scamuser into surrendering private information that will be used for identity theftthe email directs the user to visit a web site where they r asked to update personal information such as passwords andcredit card social security and bank account numbers that the legimate organization already has**************************************************************************************************************************key loggera computer program that captures keystrokes of a computer user and stores them keyloggers spreads via email*************************************************************************************************************************pharming is a hackers attack aiming to riderct website traffic to another bogus websiteit can be conducted either by changing the host file on a victims computer or by exploitation of a vulnerables dns server softwareit has become a major concern to buisness hosting e- commerce & online banking websitesevry host on the internet has an ip address these 32-bitaddress are usually re-presented as a dotted codes 4 number seprated by dot for eg.192.152.2.245*************************************************************************************************************************IP ADDRESS SPOOFINGin computer networking . IP ADDRESS SPOOFING OR IP SPOOFING reffers to the creation of internet protocol (IP)packets with a forged source ip address called spoofing with the purpose of concealing the identity of the senderor impersonating another computing system*************************************************************************************************************************questionMANUAL THREAT REMOVALFILE REMOVALENABLE FIREWALLPROGRAM REMOVAL****************************************************************BOTSbot is derived from the word "robot" and is an automated process that interacts with other network services bots often automate tasksand provide information or services that would otherwise be coundected by a human beingbots can be used for either good or malicious intent a malicious bot is self-propagating malware desinged to infect a hostsand connect back to a centeral server or servers that attack************************************************************************************************************************************************SYMPTONS OF INFECTIONyou recived an email message that has a strange attachment . when you open the attachment dailog boxes appear or a sudden degradation in systemperformance occursan antivirus programs is disabled for no reason an it cannot be restartedan antivirus program cannot be installed on the computer or it will not runstrange dailog boxes or messages boxes appear on the computer or it will not runstrange dialog boxes or message boxes appear onscreensomeone tells you that they have recently recived e-mail message from you containing attached files ( especially with .exe .bat .scr and .vbs extentions ) that you did not sendwindows will not start because certain critical system files are missing and then you receive an error message that list those filesthe computer runs very slowly and it takes a long time . to startwindows spontaneously restarts unexpectedlya partition completely dissapearsa disk utility such as scandisk reports multiple serious disk errorsTHE INFECTED FILE REPLICATES and multiples itself and fills up the space on the hard diska virus can attacthes itself to an email and sends itself to the contact lists in an email accountthe virus may reformat your disk drive and delete your files and programsthe virus may install hidden programs such as pirated software this pirated software may then be disturbed and sold from your computerthe virus may reduce security this could allow intruders to remotely access your computer or network*************************************************************************************************************************************************************************************************************************************threat identification -a list of some of the more frequently used AUTO START ENTRY POINTS (ASEP) IN WINDOWS INCLUDING STARTUP FOLDER REGISTRY KEYS AN INIFILES AREWIN,INISYSTEM.INISTARTUPFOLDERREGISTRYINTERNET EXPLORER***************************************************************************************************************************************************System registry run keysCertain registry keys may contain values used to load appliocations when windows is started like run and run onceStart up folderThe windows start up folder can include shortcuts, documents, executables or other types of files and programs to be launced when Windows is started. The current logged on user can view start up filder inclusions through the start menu:Start/Programs/startupThe common startup folder, applicable to all users, correlates to:/Start Menu/Programs/StartupASEP specific to ME, 2000, XPAlso check the following keys for unexpected values:HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RunHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RunASEP Laoding SequenceThe order in which Windows processes the autostart entry points is as follows:1. RunServices/RunServicesOnce-HKEY_LoOCAL_MACHINE andHKEY_CURRENT_USERRunServices/RunServicesOnce will be launced concurrently. In the event of a conflict, precedent is given to HKEY_LoOCAL_MACHINE. These ASEPs may continue loading during and after the login dialog.2. Login Dialog (Winlogon)3. RunOnce/Run for HKEY_CURRENT_USER hive4. Run key in HKEY_CURRENT_USER hive5. Startup Folder6. RunOnce in HKEY_CURRENT_USER hive----------------------------------------------------------------------------------------------------------------------COMMON LOCATIONS AND AUTO START ENTRY POINTS(ASEP) OF VIRUSSystem Registry Run Keys• System Registry Run Keys - Certain registry keys may contain values used to load applications (including malware) when Windows is started. The values to examine are located in subkeys Run, RunOnce, RunServices, and RunServicesOnce, located in either of the following registry keys:• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup Folder• The Windows Startup folder can include shortcuts, documents, executables, or other types of files and programs to be launched when Windows is started. The current logged on user can view startup folder inclusions through the Start menu:• Start | Programs | Startup• The common startup folder, applicable to all users, correlates to:• \Start Menu\Programs\StartupWinlogon• Winlogon is responsible for supporting the DLL responsible for managing the interactive logon when Windows starts. Pre-Vista, that DLL provides a customizable user interface and authentication process.• Malware that hooks into Winlogon can be particularly difficult to remove, as even booting into Safe Mode will not deactivate it. The string values that customize the Winlogon process are located in the following registry key:• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonASEP Loading SequenceThe order in which Windows processes the autostart entry points is as follows:• RunServices / RunServicesOnce - HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER RunServices/RunServicesOnce will be launched concurrently. In the event of a conflict, precedent is given to HKEY_LOCAL_MACHINE. These ASEPS may continue loading during and after the login dialog.• Login Dialog (Winlogon)• RunOnce / Run for HKEY_LOCAL_MACHINE hive• Run key in HKEY_CURRENT_USER hive• Startup Folder• RunOnce in HKEY_CURRENT_USER hiveSome Advanced Loading points which are identified recently with rootkit enabled malwares• C:\Documents and Settings\• C:\Documents and Settings\\Application Data\• C:\Documents and Settings\• C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5• C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5• C:\Windows\Temp• C:\WINDOWS\system32\config\ systemprofileStartup and Winlogon• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler• HKEY_CLASSES_ROOT\comfile\shell\open\command• HKEY_CLASSES_ROOT\piffile\shell\open\command• HKEY_CLASSES_ROOT\exefile\shell\open\command• HKEY_CLASSES_ROOT\txtfile\shell\open\commandServices• HKLM\SYSTEM\CurrentControlSet\Services\• Active Setup Stub Keys (These are disabled if there is a twin in HKCU)• HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\• ICQ Agent Autostart• HKCU\Software\Mirabilis\ICQ\Agent\Apps• If you suspect that a system is infected, then examine each of these keys. Determine whether Value Name or Value Data, including the (Default) value, refers to a suspicious file.Internet Explorer (To check for IE threats)• HKLM\Software\Microsoft\Internet Explorer\Main, Start Page• HKCU\Software\Microsoft\Internet Explorer\Main: Start Page• HKLM\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKCU\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKLM\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\SearchURL: (Default)• HKCU\Software\Microsoft\Internet Explorer\Main: Window Title• HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: ProxyOverride• HKCU\Software\Microsoft\Internet Connection Wizard: ShellNext• HKCU\Software\Microsoft\Internet Explorer\Main: Search Bar• HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks• HKLM\Software\Microsoft\Internet Explorer\Search, CustomizeSearch =• HKCU\Software\Microsoft\Internet Explorer\Search, CustomizeSearchIdentify Rootkit Infections1. MSconfig -> Boot.ini tab -> Check /BOOTLOG2. Restart the computer.3. Go to c:\windows and open the file c:\windows\ntbtlog.txtCheck for any suspicious entries.Program Removal• Click on start->control panel->add/remove programs icon.• Discuss with customer about any new program which is installed. If customer does not know about a particular program, follow the steps below -o Click on start->My computer->Local drive C:-> Program files.o Right click on the particular program folder-click on properties and check date created. Repeat the same to all new programs and close the program window.Physical Location• c:\program files• c:\program files\common files• C:\documents & Settings\User\Application DataRegistry• H_Key_Local_Machine\Software• H_Key_Current_User\Software• H_Key_Local_Machine\Software\Microsoft\Windows\Current Version\UninstallFile Removal GUI Mode• Delete - Right click -> Delete or Higlight the file and hit the Delete button on the keyboard• Rename - Right click -> Rename or Highlight the file -> Press F2 -> Type a new name -> Hit enter• Move - Right click->Cut->Right click and paste it on the desire location• Removing Permissions - Right click on file ->Go to properties ->Click on Security Tab ->Click Advanced -> Uncheck the box "Inherit from parent control…." -> Click Remove ->Click OK