answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What is the purpose of hepatitis virus tests?

There are five major types of viral hepatitis. The diseases, along with the antigen-antibody tests available to aid in diagnosis, are described

What is Trojan defense?

The Trojans had great walls and the advantage of their homeland against the Greeks.

Why your hp laptop dont want to detect any device?

The following might work: unplug all of your usb ports, restart your computer in safe mode by repeadatly tapping F8 when its booting until you get a screen, choose safe mode and boot up, see if it works then, if it does, boot up normally and it should works, called a "USB RESET" If im not mistaken. Thankyou for your interest

Is pinnacle video editor a virus?

No, Pinnacle Video Editor is not a virus. If it registers as a virus on your PC, just proceed with the installation.

Why does a computer suddenly restart or freeze or cause an error message blue screen when you just start it?

This problem can have several causes. Most often it is a memory error. If you have several sticks of ram try removing one at a time. If the problem goes a way you have a faulty ram module. Make sure your CMOS battery has enough juice. If your computer was loosing time before the errors started occuring you may need to replace your CMOS battery. System files can sometimes be corupted. Try booting off of the installation disks. If you can boot off the installation disks, try reinstalling your operating system. If all of this is to complicated, get a book to learn how to fix it yourself. Or hire someone to fix it for you. If you take off your start-up programs, it may help. On windows XP go to the start button, run and type in msconfig. At the top of the window there are tabs choose the tab that says start-up. Uncheck everything it will not harm your computer. Click apply then ok. It will tell you to reboot your computer when it reboots a window will appear that states "You are using selective start-up" there is a box in the middle of the window that says "Do not show this messge again" click that. ok! my experience is memory module is defective or intermittent please try to replace If you take off your start-up programs, it may help. On windows XP go to the start button, run and type in msconfig. At the top of the window there are tabs choose the tab that says start-up. Uncheck everything it will not harm your computer. Click apply then ok. It will tell you to reboot your computer when it reboots a window will appear that states "You are using selective start-up" there is a box in the middle of the window that says "Do not show this messge again" click that.

How do you remove a Trojan virus in C WINNIT hosts if Norton is unable to repair it?

This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

Is it possible for people to hack into private windows messenger conversation and type under your name because it happened to me?

Any account can be hacked. I would suggest creating a stronger password. Wikipedia does not allow anyone to give information on how to hack, though.

What do computers currently help us to do?

The developing world's ever-growing demand for computers, particularly in the BRIC (Brazil, Russia, India, and China) countries, has been a major factor in the steady growth of US OEMs and the IT industry. As the market for new PCs has expanded in developing nations, there has been a corresponding increase in the demand for recycled systems (also called "secondary" PCs). Theoretically, this secondary market should be adequately supplied, given that there's no shortage of used PCs, but research suggests that this is not the case.

According to new research from Gartner, only 44 percent of the PCs that enter the secondary market are actually redeployed in a new setting. That figure doesn't apply to all the various computers that are trashed or end up in landfills; it's strictly defined as a measurement of how many of the systems meant for repurposing actually end up repurposed.

Gartner defines a secondary/recycled PC as any system that was purchased and used for at least three months before being passed on to someone else. Despite the relatively low redeployment rate, so-called secondary PCs account for a significant percentage (possibly up to 20 percent) of the computers currently in use worldwide. Gartner doesn't mention it in today's report, but the current 44 percent redeployment rate is up 22 percent from the 36 percent reuse rate the firm measured in 2005. Question is, what's keeping the percentage of redeployed systems so low?

As it turns out, a lot of things, most of which haven't changed from 2005 to 2008. Profitability isn't a problem; Gartner estimates an average profit margin of $10-$50 on repurposed systems. Unfortunately, take one step past the question of whether or not the repurporsed PC business is viable and almost everything becomes a mess. The rules and regulations on the distribution and sale of such systems vary from country to country, as do the terms and conditions companies are required to sell the systems under.

Not all recycled PCs are equally valuable or equally desired. Businesses purchasing a significant number of secondary systems prefer to buy a bulk quantity of the same system model, just as companies do when buying new. OEM-branded PCs are also more valuable if they still carry a licensing sticker affixed by the original reseller; Gartner states that these stickers provide a certain claim to legitimacy in the event of a Redmond-sponsored audit.

Rising transportation costs and laws requiring additional vendor responsibility have eliminated some of the smaller companies reselling these systems, but Gartner notes that the market is still extremely fragmented, with "tens of thousands of players." The chief exporters of said PCs are North America, Western Europe, Japan, and Australia, while the primary importers are the MEA countries (Middle East and Africa) and the Asia/Pacific markets-China, in particular.

Gartner's report highlights how vital secondary systems are to bringing countries online and providing basic computer services, but there's an elephant in the living room that the company doesn't mention. If just 44 percent of the systems entering the market are reused, and we know that number is higher (in both real and percentage terms) than it was three years ago, what's happening to the majority of the systems that don't make it to secondary deployment? Obviously they fall out of the chain at some point, but where and why is this occurring?

I think we can make a few assumptions. Not every PC that enters the secondary supply chain is going to be suitable for reuse, due to age, hardware failure, or licensing issues that give a conscientious vendor pause. It seems likely that some of the PCs designated for reuse actually end up being broken down and used for parts. Alternatively, the various components of a system may end up resold individually through eBay or another auction site. If you've got enough of them, even cases might be worth something-I don't know what metal recyclers are paying for scrap aluminum and steel these days, but a few hundred (or a few thousand) individual systems is an awful lot of metal.

The breakdown process doesn't stop once the secondary systems hit their destination countries; local resellers presumably break down system models that don't sell well in order to repair those that do. It seems reasonable to assume that these processes could account for a significant number of secondary systems not reaching the redeployment phase, but not 56 percent of them. Whatever computers aren't accounted for as sold or scrapped are apparently lost to theft, the black market, or the chop shops of China, where circuit boards are melted down for scrap metal.

How do you remove Backdoor Sdbot?

  • This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps.
  • In my opinion, a professional antivirus program is the best way to remove any virus. I guess your antivirus could detect the virus but could not remove it. Have you tried to run a scan in safe mode? When we enter safe mode, only necessary processes will be loaded in, which increases the possibility to get rid of Backdoor.Sdbot.

How do you remove Trojan horse Startpage 9 bl?

1. Disable System Restore "how to disable system restore" on google 2. Run AVG (grisoft.com) its free 3. Reboot 4. Renable System Restore

Check your AVG vault for any viruses and delete them.

How can you add a computer program that has a timer to cut off in 45 days it you have received payment for the program you designed for sale?

Well, there is one cheap way of doing that is no one had ever thought of. hahhha. If you are using Windows XP, use your program to create a batch file in C:\Windows and make it run. In the batch file, use the commands

echo << [HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Run] file.reg echo <<\yourfile.bat file.reg echo << . file.reg (not sure of this one, its supposed to make an empty line) regedit /s file.reg set /a datenum = 0 set /a datenum =+ 1 if datenum == 30 (or however many days the program should last) ( CD C:\Progra~1\YourProgram del yourprogram.exe ) exit

this will make the file run everytime the comptuer is started and increases a counter everytime that counts how many days the program has been in use and deletes the software after a specified number of days.

its a non-professional way, but it still works.

AnswerKeep in mind that the above batch file counts the number of times Windows starts up, not the number of days that has elapsed. 30 reboots might be the same as 2 days for some people! For other people 30 reboots could be up to 60 days. To be more effective you would need to check the actual date, which can be easily changed backward by the user to extend the amount of time they can use your program.

Will LimeWire give your iPhone a virus?

Only if you had it plugged in and you downladed a file that contained a virus, and it somehow managed to get in. But if that happens, just use something like malwarebytes antimalware, and scan the drive you plugged it in at. This will remove any virus you have picked up.

What are silverfish bugs?

A primitive, wingless insect with an elongated, silvery-grey body. I think its diet is mostly organic detritus.

Ok to remove temperary internet files?

Your question isn't extremely clear, but here are a few things that might help you.

You can do the following:

Start > All Programs> Accessories > System Tools > Disk Cleanup

This will clean up your (C:) drive, including temporary Internet files.

You can also download CCleaner at www.ccleaner.com, which will also cleanup your files.

Sorry if this wasn't what you are looking for as the answer to your question, you can private message me if you like if you need further information.

Why can't viruses be removed from the host?

They can be: when dead, they are passed from the body as faecal matter.

How do you remove the downloader viruses WC2195136exe TT 2846583exe and Kodak foto01JPG they were found in my eudora email program as attachments?

There are many sites that can guide you on this. One of my recommendations; http://wiki.castlecops.com/Malware_Removal_and_Prevention:_Introduction

Where is svchostexe NOT supposed to be in System NetworkService or LocalService?

svchost.exe is the host process for windows services. By default it can be executed from any account including all three built-in accounts: System, NetworkService and LocalService. There are no accounts where it is not supposed to execute unless the system administrator has specifically denied access to it from specified accounts. However, it's the services themselves that should be restricted (where necessary), never the host process.

How do you name a file?

Click on the part where it has the name. When the flashing curser apears, name it whatever you would like!

How do you solve hidden files does not appear After effected by virus?

Type the following line in the notepad: attrib -h -s -r /s /d *.*

then 1 - save the file with "bat" extension

2 - copy the file onto your flash drive

After, you just execute the new created file (on the flash drive), and your hidden folders will appear.

What does WebPage has expired mean?

Every webpage has a time of inactivity preset. If one of this kind a webpage is opened but with no activity from user longer than that "inactivity time", the page can close by itself. Else when you try to do something on that page, you will receive something like "This page has expired..."

How can you kill the virous MS32DLLdllvbs?

I would try installing AOL's free version of kaspersky AV software and seeing if that could do the trick. http://www.activevirusshield.com/antivirus/freeav/index.adp?