answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What arwe the most popular methods of getting rid of computer viruses?

Well their are many different kinds of viruses but most all go down by AVG- anti virus

What computers will be like?

This question is rather vague, but I'll do my best here.

The next generation of computers will likely be faster and better, as they have been getting more and more so without slowing down since their creation.

Instead of making a single processor be faster and faster (as nowadays most increases in speed are less and less noticable), computers may have two or three (or more) processors that divide the work in order to process more information at the same time, however this would require quite an overhaul in a lot of programming, so it's not something that'll just spring up.

"Cloud" programming is an idea that is having a lot of stock placed in it. It is the idea that instead of holding most of your information on your personal hardware, the companies that produce it will instead hold the vast majority of the info on their hard drives and servers and such. This will allow incredibly smaller computers to do the exact same things a large one could do, just be downloading all the processed information from the internet, rather than processing itself.

Imagine a watch-sized computer that is essentially a port to the rest of the actual computer that functions just as well!

This, of coarse, is all speculation and nothing can truly be known about the future. Did anyone in the 1900s dream about something like the Tv? Did people in the 1950s, completely comfortable with the tv, imagine something like the internet? Will people in the 2000s, completely at home with the internet, be able to think of what amazing thing will emerge for the next generation? Not a chance.

Does perfect world international slow down your computer?

computers more than 4 years old seem to have a bit of trouble running the game, but as long as you have the recommended requirements its runs pretty well. Alt-tabbing while playing screws the game over and freezes up ur computer though. Also, sometimes it will slow ur computer down for a hile after you exited the program. Overall no hassles though :) great gme.

How long can you drive with a bad headgasket?

The primary response is: Stop driving the car and have the head gasket replaced. You are risking extensive engine damage and increased cost. One of the damaging leaks is internal: oil in the water, water in the oil. Even if you have an external leak, you risk running out of water or oil and causing engine failure. An external oil leak may cause an engine fire. So, unfortunately, I can not recommend you continue to drive the car. Without knowing more and just guessing at costs, you might pay $500 now or pay $3000 later for a complete engine replacement. The work can be extensive and I would recommend having it done by a mechanic qualified to do the job. When the gasket is replaced, the HEAD should be checked at a machine shop and repaired as necessary.

Is loaris Trojan remover a scam ... when you first scan your computer a number of false positives appear ... it seems that perhaps this happens so you are forced into buying the program?

Yes.

I represent Billings Information Technology Service. We have run a thorough test on this software and determined it to be a "Scam" and more importantly, a program that give false positives as well as injects code into the computer, so that it can then detect it as a Trojan.

TEST COMPUTER

New Toshiba Tecra A11 S3510

Symantec Internet Security 2010

Results: Symantec did not detect the download itself as a threat. However after installing, I ran the "Scan" from within Loaris which produced some interesting results. First, it detected safe files such as Autorun.inf in the Windows directory as a threat and systray.exe, 000StTHK.exe. More importantly, it introduced tmp.edb and log.txt, threats it detected as Trojans. Interesting enough, log.txt, a file that is locked and created by Loaris Trojan Remover.

Reminds me of the car mechanic that was hired to fix the engine and introduced other problems to ensure the client would pay for services that weren't needed. Also reminds me when BB got slammed for diagnosing a computer problem as a motherboard replacement when all that was needed to be done was to plug in the IDE cable.

Scam is too nice of a word.

Is it possible for a recipient to ask Mailer-Daemon to block an incoming email and return it to sender unopened?

It is possible for a recipient to block an email but it does not take a Mailer-Daemon program to block it. A person can simply put the blocked party on a list of persons not allowed to send email and the program will block them from sending to the 'Inbox' of the recipient. There is no guarantee, however, that this will stop all email. It might be sent to the Spam folder instead.

How do you attach a file with password to an email?

If you have Microsoft Word,

Select [FILE]

Select [SAVE AS]

Select the [TOOLS] drop down

Select [GENERAL OPTIONS]

In the "Password to open" box, type the password you want to use, you'll be asked to repeat it later.

If you don't want to buy Microsoft Word, you can get Open Office:

Select [SAVE AS]

Then check the "Save with password " option.

Open office is free, you can download it at "openoffice.org"

Is there a virus that makes a computer beep on loading?

Most computers beep on loading just as they're powering up. If you find it bothersome, turning down the volume before rebooting should help.

additional information:

Something such as that would require a change of the computer bios settings. Most malware would not change something like that. If your computer use to not do that it is possible (however unlikely) that your computer was attacked. What would be more likely is that someone you know and trust thought it would be funny to do this to you. If this is the case than it is nothing but an announce.

What was Technology like in 1960?

technology has changed because they used slate and not computers

no calculators they used abacus's

How did the trojans interpret the death of laocoon?

Laocoön, chosen by lot as priest of Neptune,

was sacrificing a huge bull at the customary altar.

Behold! A pair of serpents appeared, with huge coils, snaking over the sea

from Tenedos through the tranquil deep (I shudder to tell it),

and heading for the shore side by side: their fronts lift high

over the tide, and their blood-red crests top the waves,

the rest of their body slides through the ocean behind,

and their huge backs arch in voluminous folds.

There's a roar from the foaming sea: now they reach the shore,

and with burning eyes suffused with blood and fire,

lick at their hissing jaws with flickering tongues.

Blanching at the sight we scatter.

How do you remove the Trojan horse Dropper small gf virus?

I had a Trojan dropper virus and got rid of it. I first had to remove 2 programs out of my add/remove programs. Once I uninstalled those I deleted the Trojan from my AVG program. I put it in the Vault then deleted. You can also use spyware doctor, which can be downloaded at www.pctools.com. 1st install anti virus on your computer.if you have already then update antivirus definition. Run full scan on your system and delete all virus which you find. but before this make a restore point. it will help you to get restore if you get any kind of trouble after scan the computer. after complition of scan manually delete the Trojan horse virus from registry.Delete all temp,cookies, prefetch .Now reboot your system. Now you will get virus free computer.

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the Google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Why do people exist?

Many people have different views on why people exist. Each religion has a different story of how the earth came to be and how God/the gods created humans. Atheists don't believe in God at all. They believe that the universe and Earth was created by the Big Bang.

There are plenty of Atheists who think the big bang theory is complete bull. Some believe in it. Atheists as a whole(group) don't have a specific thing they believe in. Just a specific thing they don't.

Answer 2

God made the Earth for people: "He did not create [the earth] simply for nothing," but "formed it to be inhabited" (Isaiah 45:18). He wanted people to exist in order to have someone to love, and to give us an opportunity to achieve godliness. All people are tested concerning their use of free-will. We possess a soul which lives on after the body dies and is held responsible for the person's actions. Anyone who is worthy can merit reward in the afterlife. When the righteous use their free-will to obey God despite His being hidden, they have shown that they deserve His love. Their reward will never cease. But even the undeserving are given the kindness of life in this world, and the lifelong ability to draw near to Him.

Why do humans respond emotionally to beautiful sights? And why are painters, sculptors, or musicians motivated emotionally (even beyond monetary need) - to create works of beauty? We are created in the image of God (Genesis ch.5), and God himself is a master artist, who (we intuit) enjoys beauty and has made this beautiful world (see Genesis 1:31). The best human efforts to create beauty are a pale reflection of God's own designs. We respond to them because we are made in the Creator's image.

What is a keylogger?

Keylogger (also called keystroke logger) is a program on your computer or mobile that logs the keystrokes you type.

There are two types: hardware keyloggers and software keyloggers. When we talk about keyloggers, we usually refer to software keylogger.

Some software keyloggers are bundled with other programs, which can help themselves be installed to the computer without people knowing. They are spyware and dangerous for online personal information.

Some other software keyloggers are independent applications which need manually installation and even admin password to install onto your computer. They are normally used as parental monitoring software or employee monitoring software.

How do you scan mobile with antivirus?

http://securitydroid.crowcom.net

Has a list of top free and pro Antivirus apps for your Android if that's what you have.

What is the empscape web address?

The address bar is........... emps-scape.ucoz.org

What are the examples of global company?

Nike sports company is a global company/transnational corporation

How do you remove Trojan Horse Downloader YE?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

How do you wire a boost transformer for 240v to give a 32v boost and what are x1 x4 h1 h4?

LIFE SAFETY WARNING! [disclaimer] Electricity is dangerous! You can be injured or killed! Improper installations can cause fire, injury and death! The H1 and H4 are the primary connection terminals on a transformer and the X1 and X4 are the secondary connection terminals. This transformer is a dual voltage primary and a dual voltage secondary. Full terminals will be H1,H3,H2,H4 and X1,X3,X2,X4. Jumpers between H3 and H2 for high voltage primary, jumpers between X3 and X2 for high voltage secondary. For low voltage primary, jumpers across H1 and H3 and H2 and H4. For low voltage secondary, jumpers across X1 and X3 and X2 and X4. See related links for connections. National Electrical Code definition, NFPA 70 2005 Article 100 I: Qualified Person. "One who has skills and knowledge related to the construction and operation of the electrical equipment and installations and has received safety training on the hazards involved." <><><> This is not an amateur level project. Call a professional electrician. <><><>

As always, if you are in doubt about what to do, the best advice anyone should give you is to call a licensed electrician to advise what work is needed. Before you do any work yourself,

on electrical circuits, equipment or appliances,

always use a test meter to ensure the circuit is, in fact, de-energized.

IF YOU ARE NOT ALREADY SURE YOU CAN DO THIS JOB

SAFELY AND COMPETENTLY

REFER THIS WORK TO QUALIFIED PROFESSIONALS.