answersLogoWhite

0

📱

Backdoors

In terms of computer security, a backdoor is a hidden method to gain unauthorized access to a computer system. Questions about backdoors belong here.

678 Questions

How do you get rid of the frost wire adds?

Get rid of Frost Wire. When you download it it's free, so the company needs some sort of income. So they spam you with ads.

Why is computer crime harmful?

Computer crime can destroy valuable data, steal funds, steal identity information for illegal purposes or block use of the computer and computer networks. All these are harmful

Where do the most hackers come from?

Considering hacking as a high tech crime, where you need up to date and top skills to hack into firewalled, encrypted, antivirus and security guarded systems first you have to look to countries where great computer engineering talent is produced or historically country has been a high tech nation such us: USA, Russia, Scandinavia (Norway, Sweden, Finland, Denmark), Eastern European Block countries, Germany and recently China.

By the way if we had a World War in cyberspace between countries - India would wipe the rest of the world away.

To answer your question it is from mostly upper and middle class US homes (lot of young talent and computer prevalence).

Can fishes see demons?

Well, no. But as many other animals, they might be able to sense them.

How many pictures can you store on a 16-MB disk?

It depends on the resolution of the picture - the number of pixels. At fairly high resolution only about 10 pictures.

Where can you download a new system32 folder?

You shouldn't get a new folder, System32 is a virus and you should delete it instantly.

What is the best acer desktop computer?

Acer introduce many desktop computers which is best and give you full value of money. Here we select some best acer desktop computers by prices, specifications, hardware, performance.

1. Acer Predator AG3620-UR20P

2. Acer AZ3771-UR20P

3. Acer AZ3731-UR21P

4. Acer Revo RL100-UR20P

5. Acer AM3970-UR10P

6. Acer AX1470-UR11P

Why would your computer restart after load the OS?

Rule of thumb, start with the Obvious. Sequence of Events as Described : 1.System will boot. 2.System turns off, randomly. 3.Antivirus software, Up to Date? 4.New Hardware installed, Memory module, or new Harddrive ,etc.? 5. Updates applied to system ? 6 Next Options> a. If Antivirus is run, no virus proclaimed, go to b] Hardware failure any screens with error messages ? if not, overheating of the power supply is possible, or fan failure, causing the processor or hard-drive to be automatically cutoff as a safety mechanism. Try cleaning out dust from your computer first, then listen carefully after bootup for fans kicking in. if no fan, it may be your problem. Replace it. Also, check your screensaver and hibernation settings in control panel, they could be initiating what appears to be a shutdown. Hope this helps. Answer insufficient power supply try to check ..? grounded mother board try to losen up your screw or putting a masking tape.....

What are saver-lenders?

Individuals who have excess funds, but are insufficient for profitable investments

How does a virus affect your email?

it effects your email because there are certain types of virus' and one is a Trojan horse. its most likely in emails and it looks like its good and then it will give you one, and could destroy your computer. also, sometimes if your friends send you random pictures, it may be a virus and it could attack your computer and spread it to everyone in your email contacts. Its best to open emails you know who they are from and hope that its not a virus coming from one of your friends.

What book has a hand on the cover?

There are lots of books with hands on their covers. The cover of John Dies At the End has a hand across its cover pulling pages. Twilight has a pair of hands catching an apple. You'll have to be more specific.

Are there Trojans for Linux?

Yes. Trojans are possible for every type of operating system that allows the end user to install programs. In practice, however, trojans are almost non-existent in Linux, because most distros provide a repository of safe and inspected binaries compiled from source by developers of the distro. If someone tried to sneak something in, it would be very easy to point the finger at who was responsible, since the developers of each program are known. Another benefit of the repository is that users will likely not install programs from another, potentially unsafe, location.

Is there a website like Movie6net?

Yes, there is a website like Movie6.net.It is www.momomesh.com.Any questions send me a question to my profile JNelson586.

How many different types of computers are there?

AnswerThis question is far too broad:In chip architectures: There are several in current use, but there are 3 that are most common. Intel's x86 and AMD's x64 are used in almost all modern PCs. There are IBM's PowerPC chips such as the ones in use in old Macintoshes, Playstations and other consoles. Then there are ARM processors used on mobile devices such as the iPhone and iPod Touch, and most smartphones and handhelds.In hardware configurations: There are almost unlimited combinations of hardware that would work together.In basic designs: There are desktops, servers, integrated machines, notebooks, tablet computers and subnotebooks and miscellaneous devices such as .In brands: There are around 200 main brands that sell computers, though they mainly buy parts from other manufacturers, assemble them and install an poerating system on them.

Minicomputer, Laptop... and others!!!

contact me if there's any problem. my email: catina03@live.com


four type of computer are
there are a lot basic models windows 98, xp, vista, mac, macpro, vista home basic, vista ultimate windows xp pro, xp 2000,
okp+{
285
There are four basic types of computer

1.pc(personal computer)

2.work station

3.laptop

4.server


Micro computer, Mainframe & Super computer.
There are different types of computers, such as Desktop computers, notebooks, laptops, netbooks, tablets, and even mobiles with Internet connection. There are many main brands of computers like Dell, Hewllet Packard, Sony, etc. The most advanced computers today are equipped with multi-core processors, powerful video cards, DDD3 RAM memories, large LED monitors, wireless keyboard and mouse, High performance motherboard, and many other important features.

  • analog
  • digital
  • hybrid (part digital, part analog)
  • mechanical
  • electromechanical
  • vacuum tube
  • transistor
  • integrated circuit
  • microprocessor
  • etc.

What do you do if you think your boss is trying to get rid of you?

Get a different job. Really, why would you want to stay if the boss is trying to push you out? Just move on, don't take it personal and don't let him/her see that it bothers you.

How do you get rid of a dat file in computer?

It would depend on the name of the dat file. If it is used by the operating system then you will not be able to delete that file.

How do you change PC desktop battery?

go to an electronic store like best buy and ask about PC batteries

How do you get rid of a new upgrade on a blackberry?

You will have to pay the cost of the phone to your network you bought the phone from. Or ask for a different phone if they will let you.

How Trojan horse virus occurs?

A Trojan horse virus occurs in infected documents, programs and executable files. They appear as something you would be familiar with so as to trick you into opening the file.

How do you remove w32blocker-based maximus virus?

Follow the instructions here; http://www.goitexpert.com/entry.cfm?entry=Make-SpyBot-run-automatically It isn't a virus, it is spyware. Remove the infection using the scanner.

How many files are in a system32 folder?

It really depends on your OS, and how much apps you use.


Antiviruses, for example, place files in system32. So there is no definitive 'amount of files' in system32.

How do you get rid of the virus ''taskeng.exe from your computer?

Generally, taskeng.exe is not a virus. It's a component of the Windows Task Scheduler subsystem. If the file is located in the system32 directory it's a legitimate part of the OS. If it's elsewhere on your system, it could be malware masquerading as a legitimate Windows component.