Where did the Trojans come from?
they came from no where . they were allready there and they were turısh !!!
Does avast free remove viruses?
It will remove viruses if it is updated frequently . But you need another software to protect you from malware .
1. Run Malwarebytes Anti-Malware
2. Run the anti spyware removal programs spybot
3 Run Superantispyware
4. Run a complete scan with free curing utility Dr.Web CureIt!
Use Mozilla firefox or the google chrome browsre for browsing unsafe websites
What is one virus that destroys data on a hard drive?
a virus that destroys the hard drive also know as the (d:) is syphillis
My browser isn't working? How can I fix it?
Computer virus How destructive it is?
They can vary from annoying, to making your computer completely unusable.
How do you remove bloodhound packed virus found in winnt system32 syshost exe?
This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).
Is Internet games have high Internet?
If I understand your question correctly, you are asking if playing games (such as flash games) use a high amount of bandwidth. This depends on what kind of games you are playing. A flash game, Bloons for example, would use considerably less bandwidth than a game like Oblivion.
Are viruses transmitted by music files?
Yes, all music files contain horrible sound viruses. They were put there by the RIAA to track all your personal information and to steal your children.
Are there any free CAD programs available for Windows 98?
Yes. Though note that they may not have all the features you want / need, due to their age / price. Most Windows 98-era computers probably lack the processing power for modern CAD needs, anyway.
In June of 1999, Shawn Fanning created Napster, which was the first "internet service" that allowed people to share music and avoid paying the copyright holders. Controversy flared over this and by July of 2001, Napster was shut down in order to comply with a court injunction.
If you're going to try to win money: your best bet is probably to bet on unpopular sports, say women's basketball or the like. The less popular it is, the less research the betting parlour is probably going to do on it, so with a bit of research you can probably walk away with a good sum of money.
The payload is what the computer virus is programmed to do. Some viruses do nothing more than copy themselves onto another PC, much like a real virus does from host to host. This is the simplest payload that a virus can have. However, just like viruses in nature, some computer viruses have a greater effect - maybe they steal files or data or allow someone else to take control over the PC while some will destroy some or all of the data on the computer. A virus can also have multiple payloads (in fact, any virus that does more than just spread has by default more than one payload) - perhaps it steals data and waits until some date in the future when it activates a new payload and deletes all the data on the drive or something similar.
What might cause a computer to not save pictures?
It depends on what you are trying to do. If you right click on an image and it errors saying the image is protected--that has nothing to do with your computer--the owner of the image is protecting it from being copied. If you can right click on an image and you get the "save as" option, you can usually choose the format (jpg or bmp are the most common). Pay attention to what folder the image is being saved in. It may be as simple as you not being able to find the saved image.
How do you detect monitoring systems on your computer?
You can use the Task Manager to know the monitoring an performance of the software or programs running on your computer.
T3 is the same as DS3 DS3 is a 44.736 Mbps Data Circuit or if channelized 28 T1's. T-carriers are made of multiple plain old telephone lines, but with many more channels (wires for transmission).
An Internet game is a game you are only able to play if you have Internet connected, there is all kinds of Internet games but only a percentage of them are cool. I like this game named Syrnia its great. It's about like mining, fishing, woodcutting, fishing, fighting, ect; there is 15 skills. If you decide to try this game here my referral link:
http://www.syrnia.com/?who=p_sizex
Why would your computer restart after load the OS?
Rule of thumb, start with the Obvious. Sequence of Events as Described : 1.System will boot. 2.System turns off, randomly. 3.Antivirus software, Up to Date? 4.New Hardware installed, Memory module, or new Harddrive ,etc.? 5. Updates applied to system ? 6 Next Options> a. If Antivirus is run, no virus proclaimed, go to b] Hardware failure any screens with error messages ? if not, overheating of the power supply is possible, or fan failure, causing the processor or hard-drive to be automatically cutoff as a safety mechanism. Try cleaning out dust from your computer first, then listen carefully after bootup for fans kicking in. if no fan, it may be your problem. Replace it. Also, check your screensaver and hibernation settings in control panel, they could be initiating what appears to be a shutdown. Hope this helps. Answer insufficient power supply try to check ..? grounded mother board try to losen up your screw or putting a masking tape.....
Try using a hard drive cleaner, last time I had the same problem with my anti-virus and it just flushed away after I use my cleaner!
What is the C:Recycler folder and is there anyway you can remove the files contained in it?
DO NOT TOUCH THE FOLDER! It will break it nearly as much as deleting the system32 will!
Can a PC get a virus from streaming?
No, well not most of the time anyway. Streams are started by a person/company taking audio and video directly from their tv etc. and broadcasting it on the internet. So it would be extremely difficult for a person to get a virus from this. There are some streams though that load up spam on your pc. For example. Sopcast channel 11910. Everytime you load up channels, it loads up spam sites. But overall all MMS/RTSP/HTTP stream are perfectly safe. Hope this helps.
What is bloodhoundexploit.281?
Based on info found from this website:
http://www.symantec.com/security_response/writeup.jsp?docid=2008-082500-0801-99&tabid=3
Discovered: August 24, 2008
Updated: October 13, 2009 7:48:39 AM
Also Known As: Trojan.Giframe [Symantec]
Type: Trojan, Worm
Infection Length: Varies
Systems Affected: Windows XP, Windows Vista, Windows NT, Windows Server 2003, Windows 2000
Bloodhound.Exploit.281 is a heuristic detection for files attempting to exploit the Microsoft GDI+ GIF File Parsing Remote Code Execution Vulnerability (BID 31020).
Files that are detected as Bloodhound.Exploit.281 may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as Bloodhound.Exploit.281. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples.
Recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
For further information on the terms used in this document, please refer to the Security Response glossary.
Hope this helps...have a blessed day. Remember God loves you...see:
John 3:16.
Internet telephony is also called IP telephony. The signal is transmitted in "data packets" through same cables as Internet connection established.
Voip is a new form of data transmission technology. It uses IP networks for transportation of voice from one place to another. There are many names for this type of phones. Voip phone, internet phone, broadband phone etc. all are used for the same technology.
Where to download a virus i need one to clean my laptop of other ones?
You don't download a virus to "clean" a laptop or any other computer. To properly clean it you simply reformat it
If you mean, "What is a wireless LAN?" The answer is simple. A wireless LAN is a network that connects multiple computers, gaming consoles, and gaming devices and allows them to connect to the internet, but only if they are capable of using wireless. Wireless LAN is achieved by using a wireless router. LAN stands for Local Area Network.