Could reformatting delete a virus?
Yes, the virus could be destroyed, or at least "lost." The worst that will happen is that the virus will be marked as trash, but not deleted. In theory, another bit of malicious code could recover it, and reinfect you, but this is very unlikely. You could "shred" and format your drive to be sure it is destroyed, using something like Darik's Boot and Nuke (found at www.dban.org), but this is usually not needed.
What computer program is used to prevent computer viruses from infecting a computer?
Many programs today have security features built-in which are designed to stop viruses from infecting your computer. The main program that does this though is called an anti-virus program. This type of program removes viruses from your computer and sometimes attempts to stop viruses from being installed or even downloaded. There are many free programs of this type, such as AVG or Microsoft Security Essentials.
Why do you intentional put a virus on your computer?
You don't INTENTIONALLY put a virus on your computer. Viruses are made by hackers to make money and stuff. Its illegal.
Can a computer get the same virus twice?
If you have a decent virus protection program, then it is virtually impossible. However, if it has a different coding but same directive, then it is possible for it to "come back".
Can GPS get infected by virus?
never heard of it but gps uses a different transmission system.Maps use satelites to give google posioning of addresses etc.but internet does not.It uses various types of underground cable systems.
What does it mean by computer viruses and by whom and when this virus introduced produced?
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
Is the Epstein-Barr virus active?
Yes. Children infected with it will typically show no symptoms, but if the infection occurs in early adulthood about one-third to one-half of patients will develop mononucleosis.
Following initial presentation, it continues to exist as a lifelong latent infection, but its ability for transformation is staggering; and recent research seems to implicate it in various pathogeneses in elderly hosts. Associated lymphomas have been known for 20 years or so. It has further consequences for the immune compromised and transplant recipients.
See:
http://www.ncbi.nlm.nih.gov/pubmed/8704180?ordinalpos=1&itool=EntrezSystem2.PEntrez.Pubmed.Pubmed_ResultsPanel.Pubmed_DiscoveryPanel.Pubmed_Discovery_RA&linkpos=2&log$=relatedarticles&logdbfrom=pubmed
http://www.ncbi.nlm.nih.gov/pubmed/7663046?ordinalpos=1&itool=EntrezSystem2.PEntrez.Pubmed.Pubmed_ResultsPanel.Pubmed_DiscoveryPanel.Pubmed_Discovery_RA&linkpos=5&log$=relatedreviews&logdbfrom=pubmed
A bomb hides on the user's hard disk and waits for a specific time or event to occur before running. Some bombs are activated by a date, a change to a file, or a particular action taken by a user or a program.
How do you get rid of a virus called 'downloader crypter c'?
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
How can you delete nebuler virus?
Dear friends:
In my case I had a problem with this file: "winsaj32.dll""nebuler.dll""wvUmmjkh.dll" so I had to do these things to delete it at all. IT worked for me.
1- Download the software "Unlocker" in this link:
http://www.download.com/Unlocker/300...dlPid=10838644
2- Restart the computer in Safe Mode (when restart press F8).
3- Once the computer is ready again I went to the directory:
C:\windows\system32\wvUmmjkh.dll and "put the trash can very close" from the file to be deleted, I did it like this because the infected file was linked with the winlogon.exe and the explorer.exe and I had no option as fast as this.
4- Use the "Unlocker" software with the infected file and unlock all the files linked to the virus or spyware. In this moment you have to be very fast and throw the file into the trash basket, if you don't make it fast, the computer is going to restart (in my case, because I was killing to important processes: winlogon.exe and explorer.exe) and you'll miss the chance to make it in one simple try, I think that you have 2 or 3 seconds to do this action.
5- Once you finished deleting the file I had to download another program called "HijackThis":
http://www.download.com/Trend-Micro-...dlPid=10781312
and began to make a "Do a system scan only" of the disk. When it finished you can see a list of all processes running in your machine, in my case the file "wvUmmjkh.dll" was with an indication of "missing file" so the only thing that I had to do to end all this was to delete the registry who belonged to it, very simply, just check the box and press "fix checked" and the registry will be inmediatly erased.
Just in case, with "HijackThis" you have an option of "Delete on Reboot", in some cases it works and sometimes not.
My best regards, Prabhu
How do you remove a Spooner-a virus and where do you get the software?
you can go to wal-mart best buy or someother electronic store and buy norton anti virus put it in your CD ROM then boot from disc to check and clear viruses
Why was a horse use in the trojen war?
because when the Greeks "fled" they left a large wooden horse because it was a gift to the god Posieden, the god of the sea and horses, asking for a safe journey home. the trojans decided to take the horse to the temple of Poseiden, which let the Greeks gain access to the city of troy.
hope this helped!
<3lm.
What is the positive effect of a virus to a computer?
Most people would say there are none, but my friend knows how to make a virus that KILLS OTHER VIRUSES! It doesn't matter what it is, the good virus kills the bad one! And then it just recedes into itself or something.
I believe that's how anti-virus programs work. But then again, when you get that virus that shuts down the anti-virus programs, my friend can just run his good virus code and poof! Gone!
From which countries do most computer viruses come from except the obvious answer US?
Hi.....friends....I am Sagar here from INDIA....the answer for thhis question is ---->"BULGERIA"!
the reason for this is during the last decade the war between russia, china,us and other europien countries lead to temperorily contracted programmers and Hackers from bulgeria in order to make viruses,trojens and All other types of cyberattacks. now most of the virus writers are from either China and Bulgeria.
What are solutions of killed or weakened viruses?
One such example would be a vaccine for viral illnesses. They can be made from attenuated (weakened) viruses or from inactivated viruses or pieces of them.
What happens to your files when your computer gets a virus?
Depending on what the virus is designed to do, anything could happen. Usually, viruses will not delete your files - people who write viruses are more interested in stealing your information than destroying it. Sometimes, however, viruses will delete your files or even corrupt your hard drive completely.
How can you remove virus called monster?
You need to run these 4 essential steps to remove all the spyware on your computer.
1. Run Malwarebytes Anti-Malware
2. Run the anti spyware removal programs spybot
3 Run Superantispyware
4. Run a complete scan with free curing utility Dr.Web CureIt!
Use Mozilla firefox or the google chrome browser for browsing unsafe websites
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.
How do you get rid of Dropper.delf.G Trojan Virus?
my e-mail address is webmaster@redskiesdesign.com if you want details on the following: disable system restore, then restart the computer in safe mode and run a virus scan. to my knowledge Norton AntiVirus can't do anything about it, but AVG should be able to. while in safe mode just run a full system scan.
the same goes for all Dropper.Delph trojans.
delete it
We can get rid of this Dropper.delf.G Trojan Virus from your compute by following these steps .
1 Download and intall the Malwarebytes on your computer .
2 Update your Malwarebytes .
3 Scan your computer for all the malwares in your computer .
4 Remove all the malwares , found while scanning with the malwarebytes .
5 Restart your computer .
How do you remove brontok virus manually?
Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.
Disable System Restore (for Windows XP/Windows Me only).
For Windows XP:
Click Start.
Right-click My Computer, and then click Properties.
Click the System Restore tab.
Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.
How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_nam
Update your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.
Delete the value from the registry.
You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.
How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_nam
Click Start > Run. Type regedit Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.
Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTML
Other alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28
Navigate to the subkey that was detected by the anti-virus and delete the value.
Exit the Registry Editor.
If you are still unable to open your registry, you may try the following steps.
Boot up the infected computer, but do not login to the server, leave it at the login prompt.
Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.
From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.
Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:
"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"
(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)
After completing the above steps, reboot the infected computer.
Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.
Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.
Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the Internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTML
Delete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.
Enable the System Restore (for Windows XP/Windows Me only).
Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.
Re-connect your computer to the network once confirmed clean.
IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian GardinerBrontok Virus Manual Removal Instructions
For Windows XP:
The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:
With data:
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.
with data: <path to Win32/Brontok worm>
in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.
with data: "explorer.exe " <path to Win32/Brontok worm>
in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.
with data: <Win32/Brontok file name>
in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot
Note: the default setting for this key is "AlternateShell"="cmd.exe"
Win32/Brontok may attempt to lower security settings by making the following changes:
Adds value: DisableRegistryTools
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.
Adds value: Hidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: ShowSuperHidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: HideFileExt
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.
Adds value: NoFolderOptions
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.
How do you remove virus from system 32?
You need to run these 4 essential steps to remove all the spyware on your computer.
1. Run Malwarebytes Anti-Malware
2. Run the anti spyware removal programs spybot
3 Run Superantispyware
4. Run a complete scan with free curing utility Dr.Web CureIt!
Use Mozilla firefox or the google chrome browser for browsing unsafe websites
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.
When is you computer most likely to be infected with a virus?
My computer got a virus in the third year we had it and all the data was lost so you should be prepared and have some kind of memory card to hold all the data.
Can anyone helpme virus win32 autoit gp worm is in my usb?
You can download and install an Anti-virus Program software from below suggested ones:
MacAfee
Trend Micro
Microsoft Security Essentials