answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

Who has Spyware secure popups?

I do, they are super annoying and wont go away. Spyware secure says its a spyware removel program but i think its adware. i have like 70 infections on my computer and i think they areall from this!

Where is the firewall on a 1999 Camaro?

the firewall is between the passanger compartment, behind the dashboard and the engine compartment.

How can you type a quote on the computer and have the computer tell you who said it?

you can't do it from a Microsoft document but if you have internet and go to www.famousquotes.com that should help or ask it right here on wiki.answers!

What if your computer has an error message apper and the message is NTLDR is missing it is hardware of the software problem?

NTLDR is a boot up (software) problem the file may be corrupt or you may be booting from the wrong disc. Check out the web page at computerhope.com below there is extensive information on troubleshooting for this problem.

What is the inner core made of?

solid iron and nickel
it is made up of IRON Nickel and other LIGHTER ELEMENTS

What is anti-conformity?

Anticonformity is a song written and performed by Christian music artist Krystal Meyers. The word "anticonformity" was coined by her (it is not yet in any dictionary). It therefore means what Krystal Meyers says it means: "Becoming the person that God wants you to be and refusing to become the person that the world and everyone else wants you to be."

The Biblical text Krystal references for this belief is Romans 12:2 "And do not be conformed to this world, but be transformed by the renewing of your mind, so that you may prove what the will of God is, that which is good and acceptable and perfect."

What is the worst Trojan Horse virus to date?

vundo B is a bad Trojan, but trojans are created all the time and there is no way of knowing what is the worst, a question would be what is the worst most popular Trojan on the net to date.

What does the following mean and what language is this Khoc cho nho thuong voi trong long khoc cho noi sau nhe nhu khong Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa?

it's a virus that spreads through Yahoo Messenger. systems affected are windows 2000, 95, 98, Me, NT, and XP. for more info, go to www.symantec.com/security_response/index.jsp

What does the following mean and what language is this Khoc cho nho thuong voi trong long khoc cho noi sau nhe nhu khong Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa?" Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa... Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa... Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa... http://www.freewebtown.com/gaigoisaigon "What does the following mean and what language is this Khoc cho nho thuong voi trong long khoc cho noi sau nhe nhu khong Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa?" Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa... Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa... Khoc cho nho thuong voi trong long, khoc cho noi sau nhe nhu khong. Bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa khoc cho nho thuong voi trong long khoc cho noi sau nhe nhu khong bao nhieu yeu thuong nhung ngay qua da tan theo khoi may bay that xa

Which virus will work as legiminate Virus?

i think cleanthis virus,CleanThis is determined by Tee Support Labs as fake security software that updated from the notorious ThinkPoint. CleanThis has the same fake features as Thinkpoint,it usually spread via Trojan that can enters a computer without any permission and content. Once active, as Unknown/Win32 misleading alert will pop up at the desktop to scare innocents users. CleanThis is going to perform fake system scan and show lots of infections that are not existent at all.If you believe this, then CleanThis is going to scare you to buy its license to get rid of all the fake infections. Certainly, what you need to do is ignore the message of CleanThis. Since CleanThis has high risk for the system, you should remove CleanThis once it's detected on a computer.

Is there any way to find out which virus has attacked your computer. recently i had to restore windows xp with the recovery disc losing all files after a virus deleted boot up files from PC?

You can have an antivirus installed on your PC and scan it as it is, but, my best bet would be to put the infected drive in another CPU and have it scanned there. Now just make sure that the other PC scanning your drive has been updated. It is imperative that the antivirus' DAT file is recent and updated if you want to know the virus' name.

I want to know the Patnaiks history?

I am also intrested in the patnaik history because apparently I am part of them. As far as I can tell the Patnaiks can be traced as far back as Orissa. There are many who have immigrated to Andhra Pradesh and from there to the U.S

Your compaq presario 6000 will not start f1 will not do anyting and f10 does not enter?

Clearing the BIOS password

The BIOS password protects the BIOS from undesired changes. If password checking is enabled, and you need to disable it, use the following steps:

# Turn off the PC and unplug the power cord. # Remove the JPWD1 jumper cap. # To enter BIOS setup, start the PC and press the F1 key as the PC boots. # Clear or reset the BIOS password. # Save the BIOS settings and turn off the PC. # Replace the JPWD1 jumper cap

www.fomek.com

How can rimove UZA computer Viras?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

Your computer freezes when opening document from flash memory?

This is due to the file being corrupted on the flash memory. It can also mean your flash memory is infected by a virus and it spreading it to your computer.

How do i know if i have a trogan horse on my computer?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

How do you get rid of Trojan horse backdoor agent ioa?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

You just paid 60.00 for Norton to find out it can't rmove the bloodhound virus are there any free downloads available to get rid of it?

TRY AVG (ANTI VIRUS FREE) THEY CAUGHT THE TROJAN HORSE ON MY LAPTOP, AND QUARENTINED IT PRONTO. IT IS BY GRISOFT, THUS THE AVG. JUST DOWNLOAD, IT UPDATES EVERY DAY. THEY ALSO HAVE AN APP YOU CAN PURCHASE. FANTASTIC FREE SOFTWARE

What is a computer viruses?

Firstly, it should be 'What are computer viruses?', or 'What is a computer virus?'. But to answer the question, a virus is a a harmful or malicious script or code which may harm your computer. These should not be confused with Trojans or Worms.

TrojansTrojans horses are just like in the story of troy: They are something bad wrapped up in something good. You may be downloading a video from the internet and get the video, but with it will come a device that will attempt to hack your computer or get you to buy some piece of software for a very high price. A Trojan horse is a file that appears harmless until executed.

A good example is WinAntiVirus, a Trojan that comes bundled with a download that you, yourself wanted to download. It convinces you that there are hundreds of viruses on your computer, that this "new and efficient" program can detect. It will try and make you buy the full WinAntiVirus for hundreds of dollars or pounds, and when you buy it the whole thing clears off of your system, leaving you confused with empty pockets. Something even more shocking is that the person who owns WinAntiVirus makes nearly 6 million dollars (3 and a half million pounds) every year. Bear in mind that YOU MUST DOWNLOAD THE TROJAN FOR IT TO GET ONTO YOUR SYSTEM. Most good antivirus systems will get rid of these trojans.

VirusesA computer virus is a script that can copy itself and infect a computer without permission or knowledge of the user. However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

In easier language, viruses can copy themselves, and those copies can copy themselves, but all copies can do the same thing-usually destroy files (which could be critical files) or hack the system (attempting to obtain personal details).

WormsFinally, a worm is the most independent. A worm can spread itself to other computers without the user actually doing anything. A good example is an email worm. An email worm comes in an email, and as soon as the user opens it the worm duplicates the email, sending it to all contacts on the users list. When those users open it the same thing happens, so the link can go on forever. Sometimes they are harmless, but it is more common that they delete files-causing a nuisance to the user. In some cases the worm may permanently shut down your computer. Worms usually come in the form of Spam.

Why do people send viruses?

It would be anti-productive for such companies to produce viruses as they would only give decent/advanced and better programmers ideas as to new holes in an OS. Thus snowballing themselves with new viruses to deal with.

I have been known to write the odd piece of malicious code, but i would never use it on anyone but myself. I do it to prove I'm a reasonable programmer and that i understand what an OS is doing in certain instances.

It is a quesiton of morality when a programmer or hacker releases code for the use of destruction and corruption, sadly there are more destructive programmers than non-destructive in the virus industry.... BUT luckily there are companies which devote their time to fighting these nasty bits of code, undoing damage is much harder than causing it, and to those companies (though for the most part they charge a crap load for their products) i salute them

How do you remove Trojan clicker.FMZ?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

How do you spike someone who is hacking your computer?

Although it may be possible to "spike" a hacker there are programs that allow you to perform an IP Tracer which can be found at http://download.visualware.com/internetsecurity/index.html

But it is far better to inform athorities of the Hacking IP address inwhich the hacker will be delt with accordingly.

To "spike" them and cause damage means you are no better than the hacker and can ultimatly get you in trouble or if the serge is too great you may cause harm to the user. In Australia tough new penalities being considered for computer hackers where New Federal laws are being developed to stiffen the penalties for computer hacking and other forms of cybercrime.

The new bill would lift the maximum penalty for computer crime to 10 years
jail.
http://www.australianlawonline.gov.au/accesspoint?action=menuHome