answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What is virus vault?

A virus vault is where viruses found by an Anti-Virus are stored so they can not do damage.

Does redtubecom give viruses?

yes you do redtube.com had so many viruses on it it crashed my laptop

Why do you think some computer viruses are known as Trojan horses?

It may show Trojan horse characteristics like pretending to be legitimate software and once installed download spyware and infect the computer. Or steal passwords

What are harmless computer viruses?

A harmless computer virus is really, just a virus that can not do any harm to your computer. It cannot access any files in your computer an cannot activate anything. All it really does is just sit there.

What makes computer viruses happen?

Computer viruses exist because malicious "hackers" write them and disseminate them. Then other people download infected files or find infected computer media, and they run them. They are not the same as biological viruses. So if a computer virus or popup tells you someone dropped a disk in the toilet, you can rest assured that this is not how you got the virus. Computer viruses are just self-replicating computer code that often do malicious things to your computer.

In the 1980's and 1990's, computer labs were popular, and public libraries have computers available to the public even now. So if you used a public computer, you'd have a chance of getting a computer virus if you brought diskettes with you and inserted them in an infected computer or brought them home with you.

Nowadays, people are more likely to get viruses from going to bad websites, opening email attachments, using programs obtained through file-sharing or torrents, or using any program that comes from a questionable source.

How can you protect your computer from viruses and other malware?

Use a Anti-Virus such as AVG internet secuirty, or malwarebytes. It is easy to find free anti virus programs too. It's just that the paid ones are usually the better way to go if it is a well-trusted company.

Could you Name fifty computer viruses?

# Email-Worm.Win32.Warezov.mx # Email-Worm.Win32.Zhelatin # Email-Worm.Win32.Warezov # Virus.Win32.GpCode.ae # Net-Worm.Win32.Mytob.eg # Email-Worm.Win32.Nyxem.e # Net-Worm.Win32.Kido # Email-Worm.Win32.Warezov.nf # Virus.Win32.Sality.aa # Net-Worm.Win32.Kido.ih # Packed.Win32.Krap.b # Packed.Win32.Black.a # Trojan.Win32.Autoit.ci # Worm.Win32.AutoRun.dui # Packed.Win32.Krap.g # Trojan-Downloader.Win32.VB.eql # Packed.Win32.Klone.bj # Virus.Win32.Alman.b # Trojan-Downloader.WMA.GetCodec.c # Worm.Win32.Mabezat.b # Trojan-Downloader.JS.SWFlash.ak # Worm.Win32.AutoIt.ar # Virus.Win32.Sality.z # Trojan-Downloader.JS.SWFlash.aj # Email-Worm.Win32.Brontok.q # Packed.Win32.Tdss.c # Worm.Win32.AutoIt.i # Trojan-Downloader.WMA.GetCodec.u #

How do you find out a date's name if you forgot?

Start up a conversation about driver's licenses, then ask to see theirs.

or you could call them yo example " yo do you like this restaraunt"

Is spiral frog virus?

YES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Spiral Frog is a VIRUS It is Trojan that slowly eats away at a lot of files on your computer. It does a little at a time and you need to reboot your entire system from scratch in order to get rid of it!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1

What are the disadvantages of computer worms?

First of all think if there actually is an advantage in a computer worm. Computer worms, however, are self-replicating programs which take advantage of security holes in networking software and hardware.

What is the difference between a virus and an infection?

A virus causes an infection. It is the actual file that causes the infection. An infection itself is the action or state of the computer's security being compromised by a virus or other malware.

What programs was likely effected by a macro virus?

  1. Although many of early macros viruses affected Microsoft Office applications (Word, Excel and others), these viruses can strike any application with a macro language including some operating systems.

What happens in your head when you have a headache?

When a migraine happens - there are a host of changes across the entire body. Migraines cause a "spreading cortical depression," which is just a way of saying that a wave of lowered activity spreads across a certain area of your brain. When it reboots, nerves go haywire, blood vessels dilate in the brain. For some people, the digestion halts to a slow or stop - called gastroparesis. This is what is to blame for the cyclical vomiting people will have.

Some people will notice a day or two before their migraine hits that they are experiencing mood changes, or urinating more. This is a sign of that cortical depression in effect.

Does screen-o-matic have a virus or worms?

Thank you for asking this question. From what I have researched, it depends on what kind of computer or laptop you have. It can perform a worm or a virus if you use it incorrect. Many screen recording cameras are online but some are just fake. Many do not tell you but you would find out later. Viruses are very harmful to the computer and could erase all of your important files and destinations.

Your computer is infected by fuckerfilevbs?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suite and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What protects a computer against viruses by identifying and removing any computer viruses found in memoryon storage media or on incoming files?

Antivirus software protect computers from viruses and other general malware. There are two types of antivirus programs: manual and real-time. Manual antivirus programs have to be executed by the user in order to scan the computer. Real-time antivirus programs are of better use and provide more security due to the fact that they continously scan programs, memory in the RAM and any other programs that the user might execute during the time that it is active without having to be executed by the user.

Antivirus programs use a specific algorithm called heuristics. When an antivirus program scans a computer, it checks the code or text in a file and then cross-matches the code with known viruses in a database. If an antivirus finds a match or a potential match, it flags that file as a virus/potential threat and notifies the user of the results.

Antivirus software only protect the user from self-replicating programs like viruses or worms and do not remove Trojans, rootkits, spyware, keyloggers, etc (although newer antivirus programs now detect almost any threat).

Get a good quality antivirus program like Norton 360, McAfee Antivirus Plus, or Comodo. Now get an anti-spyware program like Spyware Blaster or SpyBot: Search and Destroy. For further protection, get an anti-malware program like MalwareBytes.

If you have a virus in Winlogon what can you do?

I hate winlogonBoot into safe mode with CMD, since windows isn't running you can delete the .dll that's running on winlogon. If you know the path to the file that you need to delete, good - if not, you should be able to get that info from your HJT scan.

Also you can use Knoppix, a distribution that boots and runs completely from CD and can read/write to ntfs.

Also you can try killing the winlogon process and delete the worm, without usig any boot disk or recovery console.

Read step by step istructions here:

http://snsays.com/26/removing-winlogon-virus/

or use malwarebytes antimalware to remove the winlogon

http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.HTML?tag=mncol

Edit: Or download anti virus called "avast anti virus" doesn't matter pro version or the free version hes good at free almost as the pro one.

when you finished downloading and installing.. just time a boot scan then it will restart your computer and start scaning for viruses and malwares from boot before windows starts which means no dlls loaded and no proccess started then the anti virus will remove the intruder.

It worked for me perfectly my anti virus always saves my me.

What are 5 types of Trojan horse viruses?

he six main types of Trojan horse payloads are: * Remote Access * Data Destruction * Downloader * Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) * Security software disabler * Denial-of-service attack (DoS) http://en.wikipedia.org/wiki/Trojan_horse_(computing)

Which was the first computer virus found in India?

'Happy Birthday Joshi', the virus was firstdiscovered in India in June 1990,

How do you remove a stealth virus?

Stealth viruses are designed to hide on disks to avoid being detected by virus scanners. You must block stealth viruses from hiding, so your scanner can find and remove them.

Steps to remove stealth viruses

  1. Update your anti-virus software.
  2. Save a copy of your virus scanner onto a clean floppy disk. (You might need this backup file if the scanner on your hard drive is infected.)
  3. Insert the floppy disk into the drive in a locked position; this should block a virus from hiding within the floppy drive.
  4. Run your anti-virus software. If the clean, locked floppy is in the drive, you should be able to detect and remove a stealth virus.
  5. Check if your scanner program is infected. And if it is, use the backup program on the floppy to scan for viruses.
  6. Shut down your computer to clear the memory, and then reboot. Now that the virus is out of the memory, your computer should be safe.