answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What are the different memory management techniques used in different operating systems?

Unix system memory management based on swapping . swappin is the process of transferring a block of data from secondary sorage to main memory and vice versa. This done to accommodate larger size of the program, to be executed, in a small sized main memory of the computer. Movement between memory and disk was handled by the upper level of the two-level scheduler, known as the swapper. Swapping from memory to disk was initiated when the kernel ran out of free memory on account of one of the following events :

1. a fork system call needed memory for a child process.

2. A brk system call needed to expand a data segment.

3. A stack became larger and ran out of the space allocated to it.

Why weren't viruses discovered until about 1935?

The very small size of virus particles was a major limiting factor of the discovery of viruses.

How can you use avast to remove Trojan virus autorunexe from your computer?

You can get firewall protection, and install norton 360, update your computer to the max, and it should get killed away

Does pokesav have a virus?

== == well no it only has spyware all you have to do is run a spyscan and your good to go

How do you protect your privacy by preventing your personal information from being disseminated and discovered by other people or the government or corporations?

1 way to keep your privet life privet is to password protect everything and never tell any one the password to any thing. Another way is to never save anything on a work computer or laptop.

The ability to run more than one program on a computer at a time?

By two ways you can acheive the concurrency.

1. More processors

2. Time sharing.

Time sharing can be acheived using threads.

Why does the system idle process use a lot of CPU time?

The system idle process does not actually use any CPU time. It just merely calculates what percentage of the CPU is being used by your processes at any given time.

What does Trojan brisv ainf do to your computer?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Advantages of anti breaking system?

Being able to steer and control vehicle while panic braking. Being able to steer and control vehicle when braking on ice/snow.

How do you remove the generic startpage Trojan from d stdnet updater exe?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suite and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers
Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

  • Trend Micro HouseCall
  • Kaspersky free online virus scanner
  • Windows Live OneCare safety scanner
  • BitDefender Online Scanner
  • ESET Online Antivirus Scanner
  • F-Secure Online Virus Scanner
  • avast! Online Scanner

update your software by running
Secunia Online Software Inspector

Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.

Why can't files containing viruses be deleted manually since it gives the message that the files cannot be deleted because they are in use?

Any file being used cannot be deleted. Start the computer in safe mode and make sure there are no programs running. Use task manager to determine this. Stop all running processes. You then may be able to delete the virus. I would suggest you go to www.panda.com and get a free virus scan and removal.

How can you rid XP Professional of a Download Trojan virus Norton identifies as 'BEHKNQTW dll' but which it is helpless to remove?

Here is the solution.

http://www.bleepingcomputer.com/forums/topict3104.html

You need to run these 6 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run the vundo and combo fix

3. Run Malwarebytes Anti-Malware

4. Run the anti spyware removal programs spybot

5 Run Superantispyware

6. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is the content of amendment 2-10?

2 - Right to keep and bear arms, 3 - conditions for quartering of soldiers in a house, 4 - protection from unreasonable searches and seizures, 5 - protection from self incrimination, 6 - right to a jury trial in criminal cases, 7 - right to jury trial in civil cases where the dispute is over $20, 8 - protection against cruel and unusual punishments, 9 - rights can't be denied just because they're not in the Constitution, 10 - states can make state laws

How do you know if your gun rights have been removed?

If you're a felon in the U.S. you have lost your gun rights, however, if you think you have lost your gun rights for some reason, you should consult a local attorney familiar with gun laws.

How do you remove a Trojan horse Startpage 8 A virus found in c windows system32 system32 DLL file?

Tired of the startpage.8.A virus then check the website for removal instruction

http://www.sarc.com/avcenter/venc/data/trojan.startpage.html

This is security response website of symantec antivirus group.

Why is it hard to detect and remove a Trojan?

A Trojan Horse is so hard to detect because of the way that many Trojan horses are written. Much like the Trojan horse presented to the Greeks by the Trojans, this deadly piece of programming poses itself like a popular game or a music or something that people want. When it is downloaded, it can become memory resident, meaning that it loads itself into the registry and hard drive and stuff like that.

Reason why its so hard to detect is because when a Trojan Horse it written, it usually is designed to kill and processes that are antivirus software processes. For example, Avira Personal Antivirus is called avguard.exe. A simple Trojan horse can automatically detect your antivirus and disable it. If you don't have antivirus to begin with, then that's even worse. Without updatedantivirus software, it is near impossible to detect the latest Trojan Horses, although it can be done.

Now onto the reason why its so hard to remove the darn things. When Trojan Horses load themselves into the registry, they are near impossible to find without time and patience. The problems double when you have 20 million things installed on your computer. Everyone of those programs have a registry key, which allow them to be executed. Delete the key, and the program cannot run. A Trojan horse also works in this manner. The huge problem is finding the registry key in between all of the other hundreds of registry keys.

If you suspect a registry key might be the Trojan Horse's registry key, then i suggest consulting a professional, or if you can't get a hold of one, send me a message @

kyuubi623@live.com

Who is the first filipino who discovered the computer virus?

A computer virus is not something necessarily something you discover like human viruses. It is actually a small computer program one takes the time to create and design in order to penetrate the normal functionality of another computer program.

The idea of developing a virus usually doesn't surface until a large number of computers become available to people. The first computer available to consumers was in 1974 in the U.S. by IBM. Philippines was still a developing country and the understanding, need, and cost for computers were not very popular during this time.

However, some Filipinos working for IBM or institutions that had the budget for computers in the U.S. may have had an opportunity to recognize the vulnerability in computers through the development of a virus or a computer program designed to bypass a computer's security functions.

The first Filipino who discovers a computer virus is most likely the first Filipino who created it - and because of the malicious intent and risky consequences for building any virus, it is unlikely that any creator will ever reveal themselves including a Filipino computer programmer.

So an answer to your question will never be accurate.

http://www.MeetFilipinoFriends.com chat with Filipino Friends

What is an augean task?

it's a task that seems impossible but can be done. or heroic efforts taken to overcome a task sometimes regarding the task of concentration from Hercules fifth labour when he had to clean the Augean stables in one day

What are the advantages and disadvantages of a junk mail?

Disadvantages: Take up space if your mailbox has limited space.

Sometimes mixes in with important mail, causing it to get lost.

Gets annoying after a while.

Advantages: You may find some helpful ads, like with coupons or free offers.

Gives you something to do when you're bored.

Lets you know if your e-mail address has been distributed by a 3rd party site, so you can take action and stop it from getting into bad hands.

Does realworld cursor editor have a virus?

definitely yes. My ESET NOD32 Antvirus program, while I was creating the cursor one day, "The threat was removed. A threat named trojandownloader.ani was removed." he gave a warning. not very reliable, be careful.