In the book Odyessey who was related to the Trojan Horse?
The idea for the Trojan horse was created by Odysseus himself. Men who are said to be in the horse include Odysseus, Ajax the Lesser, Eurymachus, Menelaus, Theresander, and many others who are not mentioned in the epic.
How do you put virus on a computer?
It self-downloads.
(Edit: If you surf the web looking for porn sites, you're bound to end up with a virus pretty quickly!)
If a virus has been removed by your antivirus program all traces of it are gone from your computer?
False
What is a computer virus normally attaches itself to another computer program is known as?
Host Program
How can you avoid the pen drive from viruses?
Scan the pen drive before using it
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Where do computer viruses and worms come from?
They can be made by pranksters that just want a laugh. Sometimes they can be made for more malicious reasons like hacking and identity theft.
They end up being spread through the internet through file sharing and sometimes even visiting a website can lodge one in your computer.
What is an Example of a computer Worm virus?
[img]http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG[/img]
From my experiences from playing Onverse for almost two year, I can safely say that Onverse has no viruses, spyware or adware. In other words, Onverse is completely safe.
How does a computer virus attack and what is its use?
They attack in many different wayz
and hey moll !!
How can you remove widgets from PC?
You should be able to just drag and drop them into the recycle bin.
In windows 7 you Right click desktop and click Gadgets then Select the gadget and right click, Remove
An antimacassar is a covering for the arms or back of a chair or couch designed to protect the fabric from soiling and staining. They are often hand made by crochet or can also be made from the same fabric as the couch/ chair, or contrasting fabric. Antimacassars generally come in a set for the head rest and the two arms. Historically were very popular in the over-dressed Victorian era of design.
This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
Different phases of life cycle of a computer virus?
->Dormant phase
->Propagation phase
->Triggering phase
->Execution phase
Dormant Phase àThis virus is idle one and activated by some event such as a file.
Propagation Phas:Virus places an identical copy of itself
Triggering Phase :Virus is activated to perform the functions
Execution Phase :Virus is performed!
Does carbohydrates help virus or hurt virus?
Normaly neither. A virus is an infectious agent that needs a living cell to make more viruses. Otherwise, a virus just floats around. Some viruses do need carbohydrates to be made, but without a cell a carbohyrate is useless. To some extent, though, certain carbohydrates help a virus by powering the cell that builds viruses.
Putting it simply, a lone carbohydrate will most likely do nothing to a lone virus.
Is Trojan Horse part of Iliad?
The main source of the story is Virgil's Iliad, a Latin epic poem from the time of Augustus
protein, nucleic acid /\
All viruses are made up of a core of genetic material ... nucleic acid, which is either DNA or RNA. This is surrounded by a protein coat.
Can the rewritable optical disc be infected by virus?
If you burn infected files onto an optical disc then those files remain infected and would remain on the optical disc permanently.
The computer can get infected by malware from malicious sites if you visit the site will old outdate browsers and without the latest antivirus ,anti spyware and firewall on your computer. Yes, a computer can get infected by simply visiting a malicious website. It it has embedded iFrames that do redirects or other malicious activity in the background this is what can compromise your system.
How do you fix your registry after downloading a virus called housecall?
Housecall is not a virus but an online virus scanner
What is an 'obfuscated virus'?
"obfuscated" just means "hidden". The virus was written in a way that makes it difficult to find, allowing it to hide in your computer. Detecting those types of viruses can be difficult.
How do you remove brontok virus?
Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.
Disable System Restore (for Windows XP/Windows Me only).
For Windows XP:
Click Start.
Right-click My Computer, and then click Properties.
Click the System Restore tab.
Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.
How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_nam
Update your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.
Delete the value from the registry.
You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.
How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_nam
Click Start > Run. Type regedit Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.
Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTML
Other alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28
Navigate to the subkey that was detected by the anti-virus and delete the value.
Exit the Registry Editor.
If you are still unable to open your registry, you may try the following steps.
Boot up the infected computer, but do not login to the server, leave it at the login prompt.
Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.
From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.
Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:
"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"
(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)
After completing the above steps, reboot the infected computer.
Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.
Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.
Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTML
Delete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.
Enable the System Restore (for Windows XP/Windows Me only).
Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.
Re-connect your computer to the network once confirmed clean.
IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian GardinerBrontok Virus Manual Removal Instructions
For Windows XP:
The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:
With data:
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.
with data: <path to Win32/Brontok worm>
in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.
with data: "explorer.exe " <path to Win32/Brontok worm>
in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.
with data: <Win32/Brontok file name>
in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot
Note: the default setting for this key is "AlternateShell"="cmd.exe"
Win32/Brontok may attempt to lower security settings by making the following changes:
Adds value: DisableRegistryTools
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.
Adds value: Hidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: ShowSuperHidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: HideFileExt
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.
Adds value: NoFolderOptions
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.