answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

Why would a car air condition freeze?

Low air flow. If you have a low air flow as produced by the fan blowing the air cooled air inside, then the coils will have a tendency to freeze. The explanation is that the air flow, warms the refrigerant up as it cools the air in the process. If the air flow is low, the refrigerant does not heat up as much, so that when it loops back to pass through the expansion valve, it is starting off cooler than before and thus becomes colder with each pass, until the coils freeze up on the inside and the AC fails to work properly. Low refrigerant. The second issue of the refrigerant being low in the unit is based on the above principle as well. Remember that when the freon passes through the expansion valve it expands and thus cools. Well, if there is less refrigerant in the coils as it passes through the expansion valve, then the refrigerant is allowed to expand even more than before because it has more room. Since it can now expand even more, it will thus cool that much more. As the refrigerant level drops, this expansion increases more and more, until this chilling process begins to freeze up the coils on the inside and the unit fails. So have your unit checked by a professional. You more than likely have a leak and it needs to be repaired before adding more refrigerant.

What is exploit virus?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

If you have a 86 300zx turbo engine will computers from other years work properly with the 86 engine?

The 300zx is a very particular car. It depends on where you get the computer from. I have swapped a non turbo to a turbo with the same engine except my new motor was from japan. the computers were slightly different, but nothing a little modification wont fix. As long as you get a computer off of a motor that is the same model as yours, it must be from the same model, several years have the same model (1984-1986) then you should not have any major problems.

How do you show healed folders which are now classified as hidden system folders and in the properties the hidden option is not click-able. The virus was a worm called Vb.ug?

open dos prompt.

go to directory of that hidden system file/folder.

type "attrib -s -h <name of that file/folder>".

-s declassifies it as system file/folder while -h unhides it

What is an undetectable viris?

Usually this term is used when somebody is known to be infected with a virus, such as HIV or Hepatitis C. After treatment, the virus is reduced to such a low level that it cannot be detected by our most sensitive tests. It doesn't mean you've been cured though, since the virus could still be present at very low levels though and return when the treatment stops. But the treatment is working well.

What is the Brontok virus?

A computer worm that infects Windows and emails itself to addresses harvested from the infected computer. Brontok Virus came from Indonesia. It arrives as an attachment of e-mail named kangen.exe ("kangen" word itself means "I miss you so much"). When Brontok is first run, it copies itself to the user's application data directory. It then sets itself to start up with Windows, by creating a registry entry in the HKLM\Software\Microsoft\Windows\CurrentVersion\Run registrykey. It disables the Windows Registry Editor (regedit.exe)and modifies Windows Explorer settings. It removes the option of "Folder Options" in the Tools menu so that the hidden files, where it is concealed, are not easily accessible to the user. It also turns off Windows firewall. In some variants, when a window is found containing certain strings (such as "application data") in the window title, the computer reboots. User frustration also occurs when an address typed into Windows Explorer is blanked out before completion. Using its own mailing engine, it sends itself to email addresses it finds on the computer, even faking the own user's email address as the sender. The computer also restarts when trying to open DOSwindow (Command Prompt) in Windows and prevents user from downloading files. It also pop ups the default Web browser and loads a web page (HTML) which is located in the "My Pictures" (or on Windows Vista, "Pictures") folder. It create .exe files in folders usually named as folder itself (..\documents\documents.exe)includes all mapped network drives.

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What was the first computers purpose?

ENIAC was designed to calculate artillery firing tables for the army.

However its first real problem was to simulate the original "classical super" H-bomb design. The simulation proved that that design could not work. It used over 1 million punch cards solving this problem.

How do you program a macro?

i think that te way to program a macro has somthing to do with holding th ctrl and alt buttons anddo somthing over and over thenyou let go of them and do it the exact same way again......but i am not sure so dont quote me on it

What is Perflib Perfdata 644dat?

Iincomplete answer starts here ...

http://www.pcreview.co.uk/forums/thread-423449.php

Additional Information:These are NOT virus files. They are completely harmless and are only present because another application (Ad-aware, NAV, or disk monitoring software) might be creating them. You can safely ignore them as they pose absolutely no harm, other than taking up about 16 KB of drive space, which is almost insignificant these days.

You can safely delete any of these, except for those that were created on the present date, as those will be locked and can't be deleted.

You can check on your systems monitoring by right clicking on My Computer, then select Manage and check for active programs under Performance Logs and Alerts.

I found a new file is created on each reboot, not just on each day. I also found that if the Java Quick Starter Service is disabled (I used Msconfig to disable it; note it is under the Services tab), the file was no longer created on my Win XP SP3 computer using Java Version 6 Upgrade 25. However, as the file was causing no harm, I reenabled the Service (and the file started to be created again).

How do you delete a InstantAccess virus?

not-a-virus:Porn-Dialer.Win32.InstantAccess.ar [Kaspersky Lab] Run a good antivirus like Kaspersky

What are five examples of computer hardware including one example of hardware on a special-purpose computer?

1. graphics card 2. ram 3. dvd/disk/dvd-r/rw drives 4. wireless pci card 5. usb devise specialty computer= firewall hardware

How do you take off acrylics?

the easiest way to take off acrylics is to soak them in an ACETONE nail polish remover and them use a cuticle stick to lightly pry them off. It will take awhile for them to get soft

-What I do is dip a cotton ball in Acetone, set it on top of my nail, and wrap it in tin foil for about 45 minutes to an hour. After that I take off the foil and the acrylic is usually pretty simple to take off. or just pick them off haha

Is it possible to legally adopt someone over 21?

It depends what state, province, or country you live in.

In states such as California, NY, Alaska, Florida, Illinois, and Nevada, adult adoption is readily available with few restrictions. This also applies to Canadian provinces such as Ontario, Alberta, Nova Scotia, and Saskatchewan.

In other places, restrictions apply. Example: in Alabama you may only adopt an adult if he/she is "totally and permanently disabled" or "determined to be mentally retarded." In British Columbia, an adult can be adopted if they were financially supported by the potential adopter while a minor.

In other states and provinces, the court has ruled it cannot be done.

Adult adoption is a legal process that has historical roots in Roman times, and was frequently used throughout the last 2000 years to establish legal inheritance rights between adults. It precedes laws that deal with the legal adoption of infants (mainly instituted under child welfare laws dating to the mid 19th century).

Besides inheritance rights, former foster parents may want to adopt the adult they fostered as a child, and natural parents may want to "adopt-back" the adult son or daughter they surrendered to adoption as an infant, especially if the surrender involved fraud or coercion.

Persons who are developmentally disabled are also eligible to have a court appointed guardian or Guardian Ad Litem, if it is necessary.

How do you reinstall Windows XP after some software destroyed some files and drivers on the computer without erasing previously installed remaining data?

Use the following commands in Windows XP: Start, Run, type sfc /scannow This will restore all Windows files and drivers back to their original condition, without losing or erasing information.

How do you get rid of the blood hound virus if you have ZoneAlarm Secruity Suite Zonelabs?


In case your computer got infected, try the following:

  • Get an antivirus program (if you don't have one already)
  • Update your antivirus
  • Scan all your computer and delete, repair or quarantine the infected files.

How do you remove Isass exe error from your computer in Windows 2000?

When Your computer starts up put in safe mode and then go to computer properties and delete it If you take off your startup programs, it may help. On windows XP go to the start button, run and type in msconfig. At the top of the window there are tabs choose the tab that says start-up. Uncheck everything it will not harm your computer. Click apply then ok. It will tell you to reboot your computer when it reboots a window will appear that states "You are using selective start-up" there is a box in the middle of the window that says "Do not show this message again" click that.

It is not safe to remove the file manually. The problem should be caused by virus infection. You could enter safe mode, update your antivirus program and run a scan.

In what directory should Explorer be located in Windows XP SP2 and how can you tell if it is the real one or malware?

It should be located in the /windows directory. The only truly effective way to determine if it is the real one is to compare the MD5 or SHA1 hash of a valid one to the same hash of the one on your system.

How do you correct the error c progra1wildta1appscdacdaeng1dll?

THE EASIEST WAY IS TO REINSTALL WINDOWS OVER THE TOP OF BAD OPERATING SYSTEM IF THIS DOESNT WORK GO TO START>>>RUN>>>>>>MSCONFIG THEN LOOK FOR THE c;progra1wildta1appscdacdaeng1dll AND TAKE THE CHK MARK OUT OF IN STARTUP ==NOTE== "1" is the way Windows truncates long names... progra1 = program files So, the file at issue is located in c:\program files\ in a subfolder who's name begins with "wildta", and the file appears to be a .dll file with a name that starts with appscdacdaeng

How do you remove lass.exe from Windows XP?

lass.exe is a process which is registered as the Troj.Bdoor.AKM Trojan. This Trojan allows attackers to access your computer from remote locations

You need to run a good anti virus and anti spyware program

What is a computer virus?

Virus is the programming file....

A computer "virus" is a program that runs on your computer doing things you would not want it to do. Typically, this will involve doing damage to your hard drive, or sending mail without your permission. A virus gets on to your computer usually when you connect to the Internet. Browsing the Internet sometimes calls for small programs to be downloaded to your computer, and they run there to help make the whole thing you are looking at go quicker or easier. Some of these, however have been put there to drop a little "extra" program onto your system, which will then deliberately mess things up. You can sometimes have a virus that hasn't yet hurt anything, but is waiting for a moment or date in time when it will be activated. The best way to insure that you don't have a virus is to buy virus scan software, have it on your system, and have it scanning your system periodically. This virus scan software can delete virus's automatically, and prevent new ones from getting onto your system. A virus is code that duplicates itself through a host in another words a computer. Viruses alter or delete files and other data. They also can send them selves to other computers via the infected computers email or network. A virus is code that tries to travel from computer to computer by attempting to copy itself, hide itself, and send itself to others. Most of the time, viruses will also have harmful effects, depending on what the exact virus is. One hypothetical example is a virus that changes your Windows user password to "slug bug".

Infection by viruses and other harmful software can be prevented largely by the use of specialized software and by not running any programs unless you're absolutely sure of what they are, especially ones that attempt to be downloaded to your computer from websites, or in email.

Note that not all harmful software is technically a virus; only ones that attempt to become duplicated and spread across multiple computers. A computer virus is a malicious software that enters your computer via email or downloading files.

A parasitic program written intentionally to enter a computer without the users permission or knowledge. The word parasite is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some virus's do little but replicate others can cause serious damage or effect program and system performance. A virus should never be assumed harmless and left on a system." -Symantec

A functional definition of a computer virus must include the fact that it creates damage to the computer system "infected"; either inadvertently or deliberately. This definition is somewhat simplified and does not cover all virus types, but is sufficient to show the major differences between viruses and so called "Trojan" programs, which is that the virus replicates, but the Trojan program does not. A computer virus is a software that enters your computer via email or downloading. A computer virus can be classified as any program or other piece of code that is written to disrupt the normal operation of a computer. The severity of the disruption ranges from minor annoyances, like displaying silly or distracting messages, to very destructive. Listing all the possible symptoms that a virus can cause is outside the scope of this question, but suffice it to say that a majority of them are towards the destructive end of the scale. In order to protect your computer from viruses, you must ensure you have an anti virus program installed, and that it is constantly updated. Some of the more common anti virus programs are Norton Anti Virus, McAfee Anti Virus, AVG, and Trend Micro to name a few. Regardless of which software you are using, or choose to install, they all need to be updated at least daily. These updates contain new and updated virus signatures. Without these updates, the software will be unable to detect newer viruses as they come out. In addition to installing anti virus software on your PC, you must also make sure your operating system is up to date. If you are using a Microsoft Windows operating system, you should regularly check windows update for updates, and install all the critical updates. Many viruses spread through security vulnerabilities in Windows that have already been addressed by Microsoft via a patch. If you do not use Windows Update, it is possible you can be infected with a virus through one of these vulnerabilities. Having up to date anti virus software, and an up to date operating system does not guarantee that you will never be infected with a virus, but the chances are much lower. A computer virus is a software that enters your computer via email or downloading files. A computer virus is a program that harms or leads to the harm of your computer. You can get one by downloading it when viewing the Internet or double clicking on an attachment sent to you.

A virus is a computer program that piggybacks or attaches itself to application programs or other executable system software.


A computer virus is a software program that has been intentionally created to cause a user grief, spread to other computers, or destroy data on an individual's computer. To help prevent a computer from becoming infected by a virus, software developers have developed antivirus programs that stay active on the computer helping to protect it.

How do you get rid of download.trojan virus from temporary internet files?

You can get rid of any virus in the Temporary Internet Files in 2 ways: 1. By Clicking 'Extra' and then 'Internet Options' in Internet Explorer. Select the 'General'-tab. 'Delete Cookies' and 'Delete Files (also 'Offline Items' in the next window). 2. Directly thru 'This Computer'. First, make sure all files and folders are visible. Then select the drive on wich Windows is installed and, for every user, delete all files and folders in the folder '\Documents and Settings\USER\Local Settings\Temporary Internet Files\'

Good luck! Jawwi :-)

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is a toolbar virus?

Normally a Toolbar is not a virus. They can still be malicious and cause problems. Only install toolbars that you know for sure are adware, spyware, and redirectors free. You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

Why would your Windows 98 PC be unable to open 'add-remove program' from control panel?

Try a adware, spyware program. Could even be a virus. Go to Windows update, Then click on Microsoft.com Home they have some great free programs that do it all. Their beta products but ive been using some of them for over the last 2 years. They also just started a beta program called Windows one care so far I like it.

How do you get rid of default-homepage-network.com newspynotice.html?

Run Malwarebytes Anti-Malware

Run the anti spyware removal programs spybot

Run Superantispyware

Run a complete scan with free curing utility Dr.Web CureIt!

First run spy-bot s&D. Then adaware. Uninstall all toolbars. Download google tool bar. Go to start, run, reg edit. Search for TSCASh or any other program left and delete the results.

I had the same issue on my wife's system and this is how I solved it. I tried every pest, spyware, and virus scanner around and none detected or fixed this issue. This is what you need to do:

1) Make sure Internet Explorer is closed.

2) Back up your Windows registry. To do this, click on Start, Run, then type "regedit" and click OK. You are now in your windows registry editor. Now, at the top of your screen click "Registry" and then "Export Registry File". Make sure to select the Export Range radio button that says "All". Name and save the file to your desktop. This may take a while to complete, so be patient.

3) After the registry backup is complete, navigate through the registry to the "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" branch on the left side of the window and look for the "Search Bar" Key on the right side of the window. Double-click on the "Search Bar" key and change the value to "http://g.msn.com/0SEENUS/SAOS01" (without the quotation marks) and click OK. Now close the Registry Editor. What this did is change your Search Toolbar built into Internet Explorer back to the default.

4) Now, find the Internet Explorer icon on your desktop. Right-click on the icon and select "Properties." Click the "Programs" tab and click "Reset Web Settings". A Reset Web Settings dialogue box will appear. Make sure the box is checked that reads "Also reset my home page" and then click "Yes". Next, click on the "Advanced". Click on the "Restore Defaults" button. Then click "OK" at the bottom of this window.

5) You should now be able to open Internet Explorer and your home page will be set to msn.com. Click on the Search button in Internet Explorer and you should see the standard search bar with a Microsoft Corporation copyright at the bottom.

6) Sit back, relax, and curse those bad, bad, people that do these things to our machines.....