answersLogoWhite

0

📱

Backdoors

In terms of computer security, a backdoor is a hidden method to gain unauthorized access to a computer system. Questions about backdoors belong here.

678 Questions

What is a Trojan horse virus for computers?

When downloading Trojan into your PC, it would be would present itself as a useful software at the start. This will literally damage your computer as soon as it has been installed into the system. Some people would receive and start installing the software; this is tricking the user into opening the program. What this does is, it could automatically change your desktop, putting unnecessary icons up. This software can fatally affect your computer by deleting files and damaging your files and folders on your system.

The term Trojan Horse for malicious software comes from the legend of the Battle of Troy. The city was impenetrable, so the enemy could not get in the conventional way. The gates were guarded and the guards would never knowingly let enemies inside. So the enemies got clever. They created a huge horse statue which they hid inside, and the city thought it was a gift and brought it inside. Then the enemy soldiers climbed out of the statue at the right moment and started killing. Then they probably opened the gates and let the rest of their men inside. So just like this legend, malicious software authors would create something that seems useful or entertaining, and the users would run or install it and either lose files or get infected with a computer virus.

How can you get rid of a computer virus?

Make sure that you have anti-virus software on your computer.

Get the anti-virus software to scan your hard disk.

If a virus is found, the software will either remove it or quarantine it.

How do people acess others computers without permission?

The use of someone's internet service/and or wireless router without the owner's knowledge is called Piggybacking.

Example: I was piggybacking off of Jose's WiFi Router yesterday and i was able to use the internet without any problems. And it's funny because he didn't even know.

Are cookies and Trojan horses examples of malicious codes?

Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.

It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.
Cookies are a important part of the Internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.

How do you prevent your computer from getting the viruses?

Windows Solutions:

Run a good firewall. Windows XP and Vista & windows 7 have a built in firewall. Also, it's a good idea to have a hardware firewall, such as a router.

Run virus protection and keep it updated. Anti-Virus programs are only as good as the last update. (Also update Windows regularly.)

Run a good antispyware program such as Spybot Search & Destroy or SUPERAntiSpyware.

A lot of anti-malware is common sense -- Stay away from porno or warez and scan email attachments and downloads.

If you do get a virus -- Don't panic. That's the worst thing you can do.

Happyhot970:AVG is a good tracker for email virus scan your computer every day now to beware black outs from your computer

Make sure that if you are running in a network environment keep the sharing and permission specific for users , so that viruses will not be able to enter to that share folder.

How do you get rid of windows security virus?

Try this as soon as u log in your run task manager find it under processes. it will be the one with the biggest number of memory usage end its process!! (u have about 10sec--do it with great haste. Because it will terminate task manager. if don't do it fast enough log off and log back in) OR

IT DOES however, LET U OPEN UP YOUR MY COMPUTER (ATLEAST For ME ANYWAYS) RUN A SEARCH FOR SYSTEM SECURITY WHEN U FIND IT

RELEASE ALL HECK ON IT AND DELETE THE CRAP OUT OF IT. (this worked for me anyways)

GUARANTEED TO WORK USE THIS LINK WORKED FOR 5 HOURS STRAIGHT TO GET RID OF THIS MALWARE!!!!

http:/www.bleepingcomputer.com/virus-removal/remove-system-security

i used stubware (Google it) and it worked very well, it took a total of 20 mins (mostly because i didn't know what to do), but it scans your virus' and than you can choose to fix all suspicious virus', once u do that, it will want u to restart your computer (do it), and when your computer returns to your main page it should be gone! Really easy!

How do you remove Trojan horse agent awyw?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What is the name of the virus that steals passwords or destroy data?

Viruses can have many different names or 'types' and can do many different things. A 'Stealer' will steal your saved browser passwords, a 'Trojan' will give a hacker access to all of your personal files and a 'Worm' will embed itself into your system to connect to a network of hacked computers (Usually to perform DDoS attacks).

What are three examples of computer viruses?

There are many different types of computer viruses. The Melissa virus is an example of a macro virus, while the Aircop virus is an example of a boot sector virus. Anna Kournikova is an example of a worm, as is ILOVEYOU.

Are there other programs like Audacity?

To record your voice you can use AV Audio/Sound recorder

To edit audio you can download AV Audio Editor

Two are free, search it up

All of features are into this software: bit.ly/ak0TzU

How do you get rid of a root kit virus on the computer?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

* Trend Micro HouseCall * Kaspersky free online virus scanner * Windows Live OneCare safety scanner * BitDefender Online Scanner * ESET Online Antivirus Scanner * F-Secure Online Virus Scanner * avast! Online Scanner

update your software by running

Secunia Online Software Inspector

How To Get Rid Of A Computer Virus?

To get rid of a computer virus, do a system restore to put computer back to original condition, use a computer scan to find malware or spyware or adware or malicious software. also do a clean install. Computer viruses can be removed manually.

2 examples of way in which computer and people are effected when computer are hacked?

Depends on what kind of hacker you are. There are three types of hackers: white hat, grey hat and black hat.

White hat hackers are hackers you are given permission by people to test the security of their computer systems. For example, the government or some important business might hire a hacker to see how vulnerable their computers are. The hacker is given the permission to run some tests and that is all. These hackers know when to stop and NEVER do anything criminal at all.

Black hat hackers are the hackers who are malicious and evil. They are the people who write viruses and other types of malware to deliberately enter someone's computer system illegally and steal their confidential information like bank account information. Being a black hat hacker can get you into some serious trouble if you are caught. The Computer Fraud and Abuse Act has the authority to prosecute black hat hackers and sentence them to prison. This act not only makes it a crime to attempt to hack into someone's computer without permission, but also to conspire to do so.

Grey hat hackers are a mixture of both a white and black hat hacker. Grey hats are generally good people, but they will also do bad things time to time. They are hired by people to test their computer systems, but will do malicious things to run tests like infecting the system with a virus or such. Sometimes they will deliberately leave the virus there on purpose just so they can monitor the computer even though the client hired them out of trust. Grey hat hackers can be prosecuted just like a black hat hacker.

How does a Trojan horse get into your computer?

A "Trojan Horse" has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, now often associated with "malware" computer programs presented as useful or harmless in order to induce the user to install and run them. To learn more also read http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse

Information use from http://en.wikipedia.org/wiki/Trojan_horse

How do you get rid of a virus on your computer?

If you have internet access, you can run a free online scan, such as on the Trend Micro (Housecall) or Symantecs (Norton) website. The best time to do this is if you have Windows XP is in safe mode with networking (you can get to this by pressing F8 before the windows splash screen, when you first turn on the computer) then navigate in your browser to the site, and follow the instructions. after the virus have been found and clean, you need to purchase a nore permanent solution. there are 1500 new virus variations, and you need updated software on your machine at all times.

Or in simpler terms, download a anti-virus software and use it. If you don't have internet access, find a anti-virus software at a local computer store and install it in your computer.

---

You need to run these 5 essential steps to remove all the spyware on your computer.

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer .

Answer">AnswerYou need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Can you make a scr file from an avi file?

1- install k-lite codec pack in full installation mode.

2- (for movie formats in scr files) open task manager and double click on scr file .now in task manager find rundll32 and end process it.

3- wait until scr file be opened with media player classic. after that pause video ( not stop)

4 - in windows drive and into document and settings folder search name of scr file without extension .for example if name of scr file is movie1.scr you must search movie1 in document and settings folder.

5 - you will find a video format with same name of file. for example movie1.mkv or movie1.avi and . . .

( ussaully you find in this folder " C:\Documents and Settings\davood\Local Settings\Temp "

my email : davood.taba@gmail.com

How do you get rid of a virus?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

How do you remove Trojan horse agent kh and Trojan horse backdoor generic3 rtf from computer?

try one of the free demo versions of virus scan/ firewall software available from Norton, or Zone Alarm or any other one of the companies out there, they are fully functional and up to date versions of their software that you can download and use on a temporary basis, you may even decide to pay for the subscription which is a good idea.

What is multi hop?

In multi-hop wireless networks, communication between two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another.

What is backdoor Trojan horses?

A backdoor Trojan horse is a malicious program that allows the hacker to view everything on your computer.

What does a Trojan horse virus do?

A "trojan horse" is not a virus; it's a type of malware that may be spread like a virus.

It hides within other programs, or pretends to be a trusted program, but it is really malicious software. Like the Trojan Horse in the Iliad, it secretly does damage once you mistakenly let it into your computer system. It can be used to steal information from the computer.

Can an MP3 spread a virus to your computer?

Yes, but there have not been any reported mp3 viruses for PCs, Macs, or Linux computers. But there has been one confirmed mp3 virus that attacks ipods.

Somebody thought that files must be executable to infect a machine, but this is not accurate in my opinion. A cleverly crafted data file can take advantage of flaws in existing software to cause unexpected behavior, which may include adding, replacing or deleting files. There have been many reported vulnerabilities reported (and fixed) with the code in web browsers that displays images (jpeg, gif, etc) some of which have allowed execution of arbitrary code. There is no reason that similar vulnerabilities might exist in mp3 player software, as the link above demonstrates.]

Keeping your computer up to date with operating system fixes should help minimize the risk, which is already fairly low, as would not downloading mp3 files from unknown sources. These kind of attacks are also very specific to a particular operating system and software. Virus scanners generally don't even look in image, audio or video files, because there have been few or no examples of this sort of virus.