answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

How to remove winlogon exe?

I'm not sure if this will help but: Go to My Computer Under 'Hard Drives', find and click on C: Then click on WINDOWS Then system32 You should be able to find winlogon.exe here and hopefully remove it. It is important for your computer though, so be careful with what you delete!

Why does your air conditioner freeze up?

There are a couple of things that cause your AC to freeze up.

If your indoor coil is icing up you:

1. Have a dirty filter

2. Have a system low on refrigerant

3. You have a blower that is not providing enough air across the coil

4. You have set the thermostat too low (below 70 degrees Fahrenheit, setting the AC lower does NOT cool the room down faster)

How serious are viruses?

Yes, viruses are real. There are two types of viruses; the type that affects organisms and the type that affects computers.

A virus is a small infectious agent that can replicate only inside the living cells of organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea. Since the initial discovery of tobacco mosaic virus by Martinus Beijerinck in 1898, about 5,000 viruses have been described in detail, although there are millions of different types. Viruses are found in almost every ecosystem on Earth and are the most abundant type of biological entity. The study of viruses is known as virology, a sub-specialty of microbiology.

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

How can you verify if your PC is infection free?

Using a virus scanner alone does n't guarantee you as immune, because antivirus detects only the symptoms not the underlying causes. Apart from your anti-virus you need to monitor your system activities, especially when you are connected with internet. Try to monitor your network using netstat or other DNS tools, and identify what ports are open and what functions it is doing. The normal system should have 5 TCP connections and 10 UDP connections.

What damage does a Trojan horse do?

It depends...either they will most likey prevent pregnancy and STDs, you might be able to conquer an empire using one, or if your unlucky enough to get one on your computer your in for at least a couple days of cleaning, defraging, and pissing off anyone you (or the virus) sent email too while infected, or you might just find yourself buying a new computer. A updated anti-virus program will prevent you from ever meeting one.

How do people keep getting infected what the common cold virus?

because virus's are not living organisms so there is no logical way to 'kill' them, and a virus is constantly changing to there is no way to protect for all kinds of the 'common cold', its always different, YA BIG DUMMY!!!

Because...you ALL WILL DIE

LOL

What virus has infected the most computers?

Trojan viruses, named after the Trojan horse that was gifted to the ancient city of Troy by the Greeks. The Greek warriors hid themselves in a giant wooden horse that was left outside the gates of Troy. The people of Troy brought the horse inside the gates, thinking it was a gift. Late that night the warriors broke out of the horse, killed the Trojan guards and opened the gate allowing the rest of the Greek army in to take the city. A Trojan virus works the same way. It is written within a usable application. The user installs the program thinking it will do something useful for their computer, but after it is installed the viral part of the program lets loose with whatever the intended damage is.

A Worm is another common virus, in fact it is probably the closest thing to a real virus. It is self-replicating, meaning that, other than its specific goal of damage to the target system, its other main goal is to copy itself and spread to any systems in direct connection with the original. For instance an email virus that, once it installs in its target and does its damage, finds the target's address book and attempts to copy itself out to all the entries in the book.

These two viruses are the most common, but there are many other kinds, and almost infinite versions of each type.

What to do if your PC has a virus?

Antivirus installation can help with protecting your computer from virus. It is better to avoid opening any kind of unknown email with attachment. if the sender is unknown. Downloading from unsecured websites can also cause system issues.

bradselectronics . com / prevent-a-computer-virus-infection

What is the most powerful virus?

The latest and most dangerous virus is the "downadup"worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.

What can viruses not infect?

Proteins,carbohydrates,nucleic acid and some have Lipids.Virus are also made up of those as other animals.

Viruses are composed of two main parts: an outer protein covering called a capsid and an inside core of either DNA or RNA. Not both DNA and RNA. Some of these have an envelope over the capsid. The ones that do not are said to be naked. The proteins in the capsid allow the virus to attach to the "docking stations" proteins of the host cell. The naked viruses are more resistant to changes in the environment.

Some naked viruses include poliomyelitis, warts, the common cold, chickenpox, shingles, mononucleosis, herpes simplex (cold sores), influenza, herpes viruses and HIV (AIDS).

Some enveloped viruses include norovirus (stomach bug), rotavirus and human papillomavirus (HPV).

The envelope can be damaged by freezing temperatures, chlorine, and phenol. If damaged the virus cannot infect.

Viruses are not an organism at all. They are not alive. They are nonliving. They are like cockle burrs that "grab" hold of your clothing or a dog's coat. They are hijackers. Once they get attached to the cell of a living cell, they can take it over and "make" the living cell produce virus particles instead of cell parts. These particles can assemble into more viruses and then they break out of the cell (killing it) and begin the process again. They cannot make more viruses on their own.

They are very small and can be considered ultramicroscopic. We were not able to see them with the best light microscopes as we could bacteria (prokaryotes). We have to use an electron microscope to see them as they are that small. This was not available until recently.

What happened when the smallpox virus escaped?

They lived, but usually with bad facial scars and scaring in other affected body areas.

How did the Trojan horse work?

Trojan horses are made as destructive software. they usually get download in some way or another then just sit and do nothing until a certain date. after that it run it's program(s) and messes-up your computer.The Trojan horse of Sparta was to secretly sneak soldiers into Troy Turkey in the Greek war against Troy.

What is salami attacks?

Salami attack

In the salami technique, cyber criminals steal money or resources a bit at a time. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the cyber criminal will make a sizable amount of money every month.

The classic story about a salami attack is the old " collect-the-roundoff " trick. In this scam, a programmer modifies arithmetic routines, such as interest computations. Typically, the calculations are carried out to several decimal places beyond the customary two or three kept for financial records. For example, when currency is in dollars, the round off goes up to the nearest penny about half the time and down the rest of the time. If a programmer arranges to collect these fractions of pennies in a separate account, a sizable fund can grow with no warning to the financial institution.

To quote an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.

Logic bombs are programmers, which are activated on the occurrence of a particular predefined event. The logic bomb was programmed to take ten cents from all the accounts in the bank and put them into the account of the person whose name was alphabetically the last in the bank's rosters. Then he went and opened an account in the name of Ziegler. The amount being withdrawn from each of the accounts in the bank was so insignificant that neither any of the account holders nor the bank officials noticed the fault.

It was brought to their notice when a person by the name of Zygler opened his account in that bank. He was surprised to find a sizable amount of money being transferred into his account every Saturday.

How do you protect from a salami attacks?

There is nothing you can do to protect yourself from it. You can only prepare for the inevitable and hope that your painful salami death will be quick.

How can i delete the scanned virus in computer?

Visit a special awarded company and scan your PC live online

www.housecall.antivirus.com

OR

C:\ > C:\windows > C:\windows\system 32 and delete all files.

After done you restart your computer right after you delete them all

then it will have some updates when you restarted your computer.

And let it update\download some files that you deleted. after that the virus should be gone.

Why do you think that pirated software is far more likely to be infected with viruses than original software distributed by manufacturers?

If by "who" you actually mean"why" then my answer would be the following:
Because pirated software is known to be used by hackers to spread their viruses through the download of said software. Where as original software distributed by manufacturers is unlikely to contain viruses as (one would hope) the manufacturers would avoid infecting their customers computers as they probably want you to buy more software from them in future.
However, original, licensed software is all too often susceptible to infection by viruses (even Microsoft's software). It is also true that large corporations will do anything within the law to increase revenues and this may include bundling "Malware" such as Adware with their original licensed software or introducing said Malware at ISP level to avoid detection by Anti Virus software (PLEASE SEE http://www.telegraph.co.uk/technology/news/4974695/Online-privacy-demanded-by-web-founders.html). In summary I would say that Pirated Software is more likely to contain Malware but this is becoming less true as big business begins to cash in on what "Hackers" have been doing since the dawn of the age of computers. The proliferation of Malware by big business is inevitable as they follow our governments in forcing us to (in the unlikely event that they give us a choice) "opt-out" of being spied upon in all aspects of our every day lives in the pursuit of profits.

What is the function of virus?

There are virusses for multiple purposes:

*Virusses who want to destroy your computer

*Virusses who send random documents of your computer to your e-mail contacts

*Virusses who want to send spam-mails from your computer to a big number of mail-accounts

*Virusses who just wants to slow down your computer

*Virusses who try to log the bank-login you type or the credit-card numbers

*... The function of a biological virus is to reproduce itself, as it is for any living organism.

How do i get remove recycler virus on my flash drive?

the recycler virus particularly come from pendrives,ipods,mp3 players etc.....which effects our folder's hidden and read only options....so to remove this virus I've got a lengthy,yet a very effective process..

1>restart your PC in safe mode {by pressing the F8 key constantly when the PC is restarted}

2>then run an anti-spyware check...for eg.download MALWAREBYTES ANTIMALWARE [its free]

3>run a complete anti-virus scan

4>clean up your system registry by downloading-- REG SEEKER

5>restart.....

[NOTE]:AFTER THIS PROCESS NEVER OPEN YOUR PENDRIVES OR ANY REMOVAL DRIVE,INSTEAD FORMAT THEM AND THEN OPEN......

Removing the Recycler.exe virus please follow the steps below…

Reboot your computer into Safe Mode, this is important as this is a memory resident virus. Do this by pressing F8 as the machine boots up and select safe mode from the DOS menu.

Once in Safe Mode, press enter to stay in safe mode, you don't want to go to Recovery.

1. Open up windows explorer, Start>Programs>Accessories>Explorer

2. Go to (In Vista press ALT to display menus) Tools>Folder Options>View>uncheck the items below:

1>display the contents of system folders

2>hide extensions for known file types

3>hide protected operating system files(Recommended)

Leave the other items as they are.

3. Press Apply>OK.

4. Leaving windows explorer open, navigate to the root of the C:\ drive and remove AUTORUN.INF and any files that end in *.CMD and *.BAT excepting for AUTORUN.BAT and COMMAND.COM which are legacy files you may or may not have. Now go to C:\Recycler and remove anything located in the folders that look like recycle bins, if you are on a network there will be more than one.

5. Delete all instances of the virus on your disk.

There are two or three variants of this virus, some put a file in the windows directory named SVHOSTE which is a hidden file - search for this and delete it.

6. Remove from Registry.

Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.

In the left panel, double-click the following:

HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Active Setup>Installed Components

In the left panel, locate and delete the key:

{08B0E5C0-4FCB-11CF-AAX5-90401C608512}

Close REGEDIT and click on Start>Run or on Vista just type in the search box MSCONFIG and press enter.

Click the startup tab and uncheck any misspelt entries such as Microssoft and Norrton, also take into account the command of this startup entry, navigate to where these files are located and delete them from your disk.

Format any memory sticks you have used with this machine by going into explorer, right click on the disk and clicking format. Once Formatted reboot your virus free machine.

What game sites have viruses?

it really depends on which one. like ones that make you download/install their programs. But if you can you can use a virus scan daily.

How do you stop spreading viruses?

The best simple way to prevent viral disease is washing hands with soap and water and staying clean. See related questions below.

What is a trojan-type virus?

It is a virus that is buried inside another program. SO when the program is run the virus does its thing. That is why a good virus detection software package is important and it is kept up to date.

How do you know if you have a computer virus?

you can know by:

  1. your computer shuts down by itself
  2. Sites keep opening realy fast by it self
  3. you keep getting annoying messages
  4. your computer gets really slow
  5. if you have a anti virus dececter it might find one
  6. YOU SHOULD KEEP AN ANTIVIRUS DECTETOR e.x NOTRON .
  7. Your computer keeps restarting it self
  8. If you open a website it closes by itself

How do computers get infected with viruses malware and spyware?

People examine the code of the virus or spyware and they try to alter it to make it harmless to your computer. They run anti spyware and anti virus tools .

like the ones listed below

1. Run Deckard's System Scanner (DSS) 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware 4. Run the anti spyware removal programs spybot 5 Run Superantispyware 6. Run a complete scan with free curing utility Dr.Web CureIt! By using anti-virus software, or possibly having to format your hard drive. Try the anti-virus option first.