answersLogoWhite

0

there are many sources you can report them to. I would suggest www.grisoft.com (avg antivirus co.) or windows live update center

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Is a hack or a crack illegal?

A Hacker is good, he hacks websites to find weaknesses-which he will report (he is a white hat hacker) and a cracker is a malicious user who wants to break into websites for personal gain or to vandalise it (black hat)


Which Net giant called for its users to report malicious sites?

Google


What To prevent viruses and the download of malicious code should not be done?

Access websites in e-mail/popups


What is the computer cookies mean?

Cookies are files the websites save locally on your computer.They can have non malicious uses like keeping the time if the last visit to malicious uses like tracking your browsing on the net.


Are cookies examples of malicious codes?

Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.Cookies are a important part of the internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.


Are cookies and Trojan horses examples of malicious codes?

Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.Cookies are a important part of the Internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.


How do you use the word malicious in a sentence?

The Internet is now a store of malicious softwares rather than the original ones. The local market had its windows broken by malicious delinquents.


How are Trojan horses worms and malicious scripts spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.


How Trojan horses worm and malicious script spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.


Where can the Bruin Report be viewed online?

You can watch it online on websites like YouTube or MyVideo. Furthermore you view it on other stream websites or on the official Bruin Report website.


Where can you get a free personal credit report?

There are several websites where you can get a free credit report. You can also get your credit report from your local credit card company or your accountant can give you a report.


What type of device is used to detect malicious network activity and report only those issues to the admin?

A firewall router