answersLogoWhite

0

📱

Backdoors

In terms of computer security, a backdoor is a hidden method to gain unauthorized access to a computer system. Questions about backdoors belong here.

678 Questions

How can you improve my CPU usage percentage?

The question is not how to lower cpu usage but to either use less cpu (close background processes) or to smooth it out (I cannot find a way to do that no matter how hard i search). I find that it is not always the amount of cpu usage that is the problem but the way it is used. Windows has many pointless services built into every PC that runs it and they are all automatically set to run (such as wmpnetwork, etc.) if you want the best out of your computer i recommend following theese steps:

1. download a registry cleaner (I use CCleaner)

2. clean all temporary files and defrag, obviously :P.

3. disable unused appearance and ui features (you should know how to do this if not google it), i only disabled the shadows and animations because the rest just looks cool.

4. REGISTRY TWEAKS/MODS (google search it and you should come up with tons, they almost all improve performance or ui).

5. delete unused programs (we all have them, you can't deny it).

6.go to %temp% every once and a while and clean out what is left behind by the temporary file cleaners, if any file cannot be deleted then just click skip.

7. if you run firefox then this tip will really speed up your browsing... just as an extra tip. google for about:config mods/tweaks.

8. I reccomend this program by bitstrum called Process Lasso, it monitors every process, how much cpu usage, ram load, and virtual memory your computer is using and allows you to set permanent priority levels and throttles for every one. it also has a process watchdog allowing you to say if _______ is using ______% of ________ then ________. it comes witbh a tool called probalance witch sort of can try to work to balancing your cpu usage and responsiveness too!

9. This tip really helped me make my laptop so much more responsive, but it changes windows default memory usage. go to command prompt and type FSUTIL BEHAVIOR SET MEMORYUSAGE 2 (this will require a restart)

as some extra tips i will say right click your hard drive and go to properties, go to tools and start a disk check. it will prompt you to postpone it to the next startup and on the next startup it will open all MSDOS style and take a bit of time to do a full checkup. I find that this is not often usefull but you can try it if you want. another is to make sure your computer is NOT indexed... indexing may increase speed of searching but it deteriorates speed of the overall pc.

I hope this was helpful and i would like to note that this is my first time using answers.com...

How do you identify which Trojan virus you have?

For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

This is the Microsoft virus line, the call is free if you call them they will walk you though the steps for virus removal

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

How do i get rid of Trojan horse downloader agent BTW?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is the different types of anti-virus?

AntiVir Personal 8.1.00.295

H+BEDV - 21.28MB (Freeware)

The AntiVir Personal Edition offers the effective protection against computer viruses for the individual and private use on a single PC-workstation. I

Avast! Home Edition 4.8.1201

Alwil Software - 21.98MB (Non-Commercial Freeware)

Avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users, non-commercial users. Home Edition is free of charge,

AVG Free Edition 8.0.100

Grisoft Inc - 45.57MB (Freeware)

AVG Free Edition is the well-kn anti-virus protection tool. AVG Free is available free-of-charge to home users for the life of the product! Rapid v

BitDefender 10 Free Edition

BitDefender.com - 21.08MB (Freeware)

BitDefender Free Edition is your chance to use one of the world's most effective antivirus engines for free!

ClamWin 0.93.1

ClamWin - 20.93MB (Open Source)

ClamWin is an Antivirus tool that comes with an easy installer and is open source code at no cost.

Kaspersky Anti-Virus 8.0.0.357

Kaspersky - 27.09MB (Commercial Trial)

Kaspersky Lab has proven expertise in protecting against viruses, Internet worms, email worms, Trojans and other malicious programs.

McAfee VirusScan 10

McAfee - 9.54MB (Commercial Trial)

Proven security that protects against viruses and spyware

NOD32 AntiVirus 3.0.650

ESET - 19.52MB (Commercial Trial)

ESET's NOD32 protects you without requiring you to become an expert in malware. Because everybody deserves the best protection possible against viruse

Norton AntiVirus 15.5.0.23

Symantec - 62.10MB (Commercial Trial)

Stay protected with the world's most trusted antivirus software.

Why are computer viruses so important?

A virus will eventually wreck your operating system files and it will need scrapping ,then you have to format everything and load in all your software,this is sometimes impossible because codes/cases of your software go missing over time,some will definitely be obsolete,its always best to cover all your bases, prevention is best,cant have too much security,if you use your computer for any banking then you leave yourself wide open to fraud if you do not get yourself a good anti virus and malware product, "window washer" combined with "spysweeper" by (webroot ) will cost about £40 a year, a must to wash all previous transactions from your PC,it washes the slack space and permanently erases your deleted files as these can be traced by expert fraudsters who use them for information allowing them to falsify your details and borrowing money in your name,

What is a Trojan horse virus for computers?

When downloading Trojan into your PC, it would be would present itself as a useful software at the start. This will literally damage your computer as soon as it has been installed into the system. Some people would receive and start installing the software; this is tricking the user into opening the program. What this does is, it could automatically change your desktop, putting unnecessary icons up. This software can fatally affect your computer by deleting files and damaging your files and folders on your system.

The term Trojan Horse for malicious software comes from the legend of the Battle of Troy. The city was impenetrable, so the enemy could not get in the conventional way. The gates were guarded and the guards would never knowingly let enemies inside. So the enemies got clever. They created a huge horse statue which they hid inside, and the city thought it was a gift and brought it inside. Then the enemy soldiers climbed out of the statue at the right moment and started killing. Then they probably opened the gates and let the rest of their men inside. So just like this legend, malicious software authors would create something that seems useful or entertaining, and the users would run or install it and either lose files or get infected with a computer virus.

How can you get rid of a computer virus?

Make sure that you have anti-virus software on your computer.

Get the anti-virus software to scan your hard disk.

If a virus is found, the software will either remove it or quarantine it.

How do people acess others computers without permission?

The use of someone's internet service/and or wireless router without the owner's knowledge is called Piggybacking.

Example: I was piggybacking off of Jose's WiFi Router yesterday and i was able to use the internet without any problems. And it's funny because he didn't even know.

Are cookies and Trojan horses examples of malicious codes?

Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.

It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.
Cookies are a important part of the Internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.

How do you prevent your computer from getting the viruses?

Windows Solutions:

Run a good firewall. Windows XP and Vista & windows 7 have a built in firewall. Also, it's a good idea to have a hardware firewall, such as a router.

Run virus protection and keep it updated. Anti-Virus programs are only as good as the last update. (Also update Windows regularly.)

Run a good antispyware program such as Spybot Search & Destroy or SUPERAntiSpyware.

A lot of anti-malware is common sense -- Stay away from porno or warez and scan email attachments and downloads.

If you do get a virus -- Don't panic. That's the worst thing you can do.

Happyhot970:AVG is a good tracker for email virus scan your computer every day now to beware black outs from your computer

Make sure that if you are running in a network environment keep the sharing and permission specific for users , so that viruses will not be able to enter to that share folder.

How do you get rid of windows security virus?

Try this as soon as u log in your run task manager find it under processes. it will be the one with the biggest number of memory usage end its process!! (u have about 10sec--do it with great haste. Because it will terminate task manager. if don't do it fast enough log off and log back in) OR

IT DOES however, LET U OPEN UP YOUR MY COMPUTER (ATLEAST For ME ANYWAYS) RUN A SEARCH FOR SYSTEM SECURITY WHEN U FIND IT

RELEASE ALL HECK ON IT AND DELETE THE CRAP OUT OF IT. (this worked for me anyways)

GUARANTEED TO WORK USE THIS LINK WORKED FOR 5 HOURS STRAIGHT TO GET RID OF THIS MALWARE!!!!

http:/www.bleepingcomputer.com/virus-removal/remove-system-security

i used stubware (Google it) and it worked very well, it took a total of 20 mins (mostly because i didn't know what to do), but it scans your virus' and than you can choose to fix all suspicious virus', once u do that, it will want u to restart your computer (do it), and when your computer returns to your main page it should be gone! Really easy!

How do you remove Trojan horse agent awyw?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What is the name of the virus that steals passwords or destroy data?

Viruses can have many different names or 'types' and can do many different things. A 'Stealer' will steal your saved browser passwords, a 'Trojan' will give a hacker access to all of your personal files and a 'Worm' will embed itself into your system to connect to a network of hacked computers (Usually to perform DDoS attacks).

What are three examples of computer viruses?

There are many different types of computer viruses. The Melissa virus is an example of a macro virus, while the Aircop virus is an example of a boot sector virus. Anna Kournikova is an example of a worm, as is ILOVEYOU.

Are there other programs like Audacity?

To record your voice you can use AV Audio/Sound recorder

To edit audio you can download AV Audio Editor

Two are free, search it up

All of features are into this software: bit.ly/ak0TzU

How do you get rid of a root kit virus on the computer?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

* Trend Micro HouseCall * Kaspersky free online virus scanner * Windows Live OneCare safety scanner * BitDefender Online Scanner * ESET Online Antivirus Scanner * F-Secure Online Virus Scanner * avast! Online Scanner

update your software by running

Secunia Online Software Inspector

How To Get Rid Of A Computer Virus?

To get rid of a computer virus, do a system restore to put computer back to original condition, use a computer scan to find malware or spyware or adware or malicious software. also do a clean install. Computer viruses can be removed manually.

2 examples of way in which computer and people are effected when computer are hacked?

Depends on what kind of hacker you are. There are three types of hackers: white hat, grey hat and black hat.

White hat hackers are hackers you are given permission by people to test the security of their computer systems. For example, the government or some important business might hire a hacker to see how vulnerable their computers are. The hacker is given the permission to run some tests and that is all. These hackers know when to stop and NEVER do anything criminal at all.

Black hat hackers are the hackers who are malicious and evil. They are the people who write viruses and other types of malware to deliberately enter someone's computer system illegally and steal their confidential information like bank account information. Being a black hat hacker can get you into some serious trouble if you are caught. The Computer Fraud and Abuse Act has the authority to prosecute black hat hackers and sentence them to prison. This act not only makes it a crime to attempt to hack into someone's computer without permission, but also to conspire to do so.

Grey hat hackers are a mixture of both a white and black hat hacker. Grey hats are generally good people, but they will also do bad things time to time. They are hired by people to test their computer systems, but will do malicious things to run tests like infecting the system with a virus or such. Sometimes they will deliberately leave the virus there on purpose just so they can monitor the computer even though the client hired them out of trust. Grey hat hackers can be prosecuted just like a black hat hacker.

How does a Trojan horse get into your computer?

A "Trojan Horse" has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, now often associated with "malware" computer programs presented as useful or harmless in order to induce the user to install and run them. To learn more also read http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse

Information use from http://en.wikipedia.org/wiki/Trojan_horse

How do you get rid of a virus on your computer?

If you have internet access, you can run a free online scan, such as on the Trend Micro (Housecall) or Symantecs (Norton) website. The best time to do this is if you have Windows XP is in safe mode with networking (you can get to this by pressing F8 before the windows splash screen, when you first turn on the computer) then navigate in your browser to the site, and follow the instructions. after the virus have been found and clean, you need to purchase a nore permanent solution. there are 1500 new virus variations, and you need updated software on your machine at all times.

Or in simpler terms, download a anti-virus software and use it. If you don't have internet access, find a anti-virus software at a local computer store and install it in your computer.

---

You need to run these 5 essential steps to remove all the spyware on your computer.

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer .

Answer">AnswerYou need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Can you make a scr file from an avi file?

1- install k-lite codec pack in full installation mode.

2- (for movie formats in scr files) open task manager and double click on scr file .now in task manager find rundll32 and end process it.

3- wait until scr file be opened with media player classic. after that pause video ( not stop)

4 - in windows drive and into document and settings folder search name of scr file without extension .for example if name of scr file is movie1.scr you must search movie1 in document and settings folder.

5 - you will find a video format with same name of file. for example movie1.mkv or movie1.avi and . . .

( ussaully you find in this folder " C:\Documents and Settings\davood\Local Settings\Temp "

my email : davood.taba@gmail.com

How do you get rid of a virus?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

How do you remove Trojan horse agent kh and Trojan horse backdoor generic3 rtf from computer?

try one of the free demo versions of virus scan/ firewall software available from Norton, or Zone Alarm or any other one of the companies out there, they are fully functional and up to date versions of their software that you can download and use on a temporary basis, you may even decide to pay for the subscription which is a good idea.