answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What is a coumputer virus?

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the ability to replicate themselves. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

What is stealth computer virus?

A virus that runs in the backround and installs itself without a warning.

Can narutospot put a virus on your computer?

Affirmative. Something connected with NarutoSpot has occasionally been shown to download a false Security Center. This looks nearly identical to the security center window that is part of Windows Vista and Windows 7. If you do not get this closed out IMMEDIATELY, it will automatically start "scanning" your computer. In reality what it is doing is infecting your computer with several copies of a nasty virus and adding root kits to your computer. Then it will inform you that virii have been detected and try to get you to pay for a "service" that supposedly removes the inffection, but which in reality does not. It is associated with a program called security which loads on startup and shows up on program manager. The virus will not allow you to shut it down or remove it through standard means one you have been infected.

What happens if you delete a virus from quarantine?

It will be deleted from the system in which it was found, unless it has infected a important file. Then the file will be healed.

How can Trojan Horse Dropper.small.7.j be removed?

The free downloadable AVG anti virus software gets rid of this one just fine. Just download the free software and run it!

You can remove this Trojan Horse Dropper.small.7.j be , by following these steps .

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer .

This will remove this virus from your computer .

What is coxsackie b virus?

The Coxsackie B viruses are members of the enterovirus genus and are the most common agent for myocarditis and dilated cardiomyopathy constituting 50% of infections. The group coxsackievirus was named because these viruses were pathogenic for infant mice and because the first virus of this type was isolated from a patient from the town of Coxsackie New York. Coxsackie B infection is characterized by fever, fatigue, malaise and chest pains. Infection of the heart by a coxsackie B virus can lead to viral myocarditis. Viral myocarditis is a inflammatory disease of the heart which can result in heart failure. Although the disease does not usually cause death, there is a 20% incidence of reoccurrence and permanent heart damage typically results.

Why would a red X in the taskbar at the bottom right of the screen be telling you your computer is infected with a virus even after you scanned your PC with antivirus software?

This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

How do you remove Backdoor-BDD virus?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is dropper small?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs

http://securitynewsfromthenet.blogspot.com/2007/05/spyware-fighter-essentials.html

2. Run the vundo and combo fix http://securitynewsfromthenet.blogspot.com/2007/05/vundofix-and-combo-fix.html

3. Run Malwarebytes Anti-Malware

http://securitynewsfromthenet.blogspot.com/2008/03/malwarebytes-anti-malware-105.html

4. Run the anti spyware remove programs spybot http://securitynewsfromthenet.blogspot.com/2007/03/spybot-search-and-destroy-spyware-and.html and superantispyware http://securitynewsfromthenet.blogspot.com/2007/04/superantispyware-home-edition-free.html to get rid of the nasties

5. Run a complete scan with free curing utility Dr.Web CureIt!

http://securitynewsfromthenet.blogspot.com/2008/05/dr-web-cureit.html

Can a computer virus lie dormant?

An infection can occasionally lie dormant in the system information files used for system restore. Following removal of an infection, system restore should be disabled, thereby removing all of the files, and a new system restore point added manually.

How the salami virus attack?

Salami Attacks

A salami attack is a programmed attack which is implemented in small (meant to be unnoticeable) increments. Because it is occurring in small increments it is easily concealed.

Rounding down interest calculations and placing the difference in your account is an example of a salami attack.

What do you do when your computer is infected with a virus and the spyware program wasn't able to help and you can't open any files on your computer or access the Internet because of the virus?

Click start>click run type in msconfig and then press enter. Goto the start up tab and uncheck everything except your anti virus.click ok and reboot. When you come back to the desktop check the box 'do not show this message again" and click ok .

Run Malwarebytes Anti-Malware

Run Superantispyware

Run a complete scan with free curing utility Dr.Web CureIt!

Install ThreatFire

Run an online virus scan to be sure your computer is spyware,rougueware and virus free

* Trend Micro HouseCall * Kaspersky free online virus scanner * Windows Live OneCare safety scanner * BitDefender Online Scanner * ESET Online Antivirus Scanner * F-Secure Online Virus Scanner * avast! Online Scanner

Can you get viruses from msn?

Yes actually you can. Today is March 02, 2016. Just 2 days ago I open my MSN home page, and saw one of their articles I had not seen earlier that day. It was an article on Ted Cruz, it had a really funny picture of him, and said something about some big scandal or something silly. So I went ahead and clicked it to see what it was about, it seemed kind of odd to me. As soon as I clicked it, I got a bunch of full screen pop ups and had to open task manager just to shut them all down. So I guess I will have to run virus scans now. Funny thing is, after all that I went back to my MSN home page to try and find that same article and it was gone. MSN is well known to have a strong left leaning bias, and also known to block people through FB etc if they make anti-left comments. So it doesn't surprise me this "safe" MSN site is no longer safe. UPDATE It turns out after a full scan of windows defender I had a browser hijacking virus, and I didn't have it before I clicked that funny ad on MSN. Be careful what you click on when viewing MSN...

How do websites get infected with a virus?

There are many sources that can implement a virus onto the Internet, but one thing is definite, someone or something must've uploaded the virus onto a public area of the Internet and the virus is intelligent enough to install itself to your computer (whether it was intentional or not). Most of the time, the virus has the ability to duplicate itself onto several webpages. Once it gets onto a computer, it can attempt to spread itself throughout the local network and/or through removable data storage (eg. flash drives).

How can the threat of a computer virus be minimised?

Have a Firewall, Have 1 virus scanner, only go on sites you know are safe, never download anything unless you're 100% sure you know what it is

Is atomic gamer virus free?

Yes it is, I've downloaded AVA awhile back and never did I see a virus.

Also, http://siteadvisor.us/sites/atomicgamer.com/summary/

Can computer desktop be affected by computer virus?

Absolutely yes..as long as it gets in contact with an infected device like flash disk, its on the internet.

Who makes spybot?

Answer by Techsupport

SpyBot is used to detect and remove spyware from your computer. It has been rated as a good antiSpyware program by Consumer Reports.The scripts make the program easier to use with JAWS.

What does a Trojan horse attack?

A Trojan Horse program is designed to masquerade as a legit program in order to trick a user into downloading and running it. Most of the time, the Trojan Horse will provide the desired program, such as a game or music file, so as to avoid suspicion, but it runs malicious processes in the background. A Trojan Horse can do a number of things. Some come with a built-in keylogger so it can record keystrokes that allows a hacker to steal usernames and passwords. Others usually open a backdoor on the computer so it can download more malware off of the Internet.