How should you protect yourselves from hackers?
First it would depend on what type of browser one is using. As the hacks were launched against users using Internet Explorer you can either use a different browser( Firefox, Google Chrome, etc.) or you can use Protected Mode in Internet Explorer and enable Data Execution Prevention.
What is spy-ware and how do you remove it?
There are many programs which help you remove spyware. Webroot Spy Sweeper (webroot.com) is a just one program I use which will give you a free trial and long term use under limited conditions, but for full benefits you must pay. You can get rid of this spyware by following these steps . 1 Download and intall the Superantispyware on your computer .
2 Update your Superantispyware
3 Scan your computer for all the pop ups in your computer .
4 Remove all the malwares , found while scanning with the Superantispyware
5 Restart your computer .
You need to run these 3 essential programs to remove all the spyware on your computer.
If you do not have an internet security suit and only an anti virus
1. Run Malwarebytes Anti-Malware
2. Run a complete scan with free curing utility Dr.Web CureIt!
3. Run the anti spyware removal programs spybot or Superantispyware
Browsers
Use Mozilla firefox or the google chrome browser for browsing unsafe websites
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Run an online virus scan like
Trend Micro HouseCall
Kaspersky free online virus scanner
Windows Live OneCare safety scanner
BitDefender Online Scanner
ESET Online Antivirus Scanner
F-Secure Online Virus Scanner
avast! Online Scanner
update your software by running
Secunia Online Software Inspector
Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.
Is there any virus made for mac?
At any one time, the answer to this question could vary. In general, Macs are less prone to viruses than Windows-based computers. This is in part due to the smaller market share of Apple/Mac computers, and also due to the general design and architecture of the Apple computers.
In short, you shouldn't assume that because you have a Mac you are immune from attack, but your chances of being "infected" are much lower. You should still take appropriate measures to safeguard your computer per recommendations posted on the Apple website.
Does factory resetting your computer get rid of viruses?
If you choose factory reset setting, you will wipe out everything on your computer. You will have to pay a tech to reload it with the basics, unless you have the drivers. You will get rid of the virus if you restore your computer to an earlier date, before you down loaded the virus.
What types of technology Is a computer?
A computer uses materials, electrical and mechanical technologies.
How do you remove osd lockout?
To resolve the issue you can hold the power button of the monitor until you get another message something similar to "OSD unlocked"....if the problem continues. Switch of the monitor and remove the power cable and connect it again.
How do you uninstall AntiVirus Plus?
Use MalwareBytes anti-malware or Spyware Doctor. You may also so remove it manually.
Open task manager and terminate the following processes:
AntivirusPlus.exe
dop.exe
then delete these files:
AntivirusPlus.exe
AntivirusPlus.grn
rundll32.exe
dop.exe
Finally, delete registry values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run "AntivirusPlus"
Does WeeWorld give you a virus?
Yes, it does. It sends a worm that has all the adds on it and that causes a virus. That worm can do very bad damage to your computer OR your laptop. Also, the adds that pop up on your screen, don't click them because they will add more adds to that worm.
What are the steps required to alphabetize the list of favorites?
Right-click on any site in the list. A menu opens. Left-click on "Sort by Name."
Avast, is definitely a top contender for one of the best antiviruses. Most people, don't have the money for a paid antivirus, so that eliminates most antiviruses, leaving three main contenders, Avast, AVG and Avira. All three of these have pro's and con's. So to make this as simple as possible here are the pro's and con's of each.
Avast pro's =
has built in antispyware, antivirus and heuristics engines.
Has multiple shields including behavior, network, instant messaging, peer-to-peer, and Web shields
a silent-gaming mode
a sleek UI that new users should find far more manageable
Good detection rate
Auto updates
Avast con's =
Some users with slower computer's claim it uses a lot of system resources, though this has been improved
Hang ups on slower machines
Some complaines of slow scan, but the new version is drastically improved
AVG pro's =
included antivirus and antimalware engine, LinkScanner, and e-mail scanning
Efficient scanner
Easy to use
Solid protection
AVG con's =
Some complaints of hang ups
Some bugs
Some complaints of Internet slowdowns
Some complaints of difficulty to remove
Some complaints of interface bugs
Complaints of older computer slow downs
Complaints of trouble installing
Avira Pro's =
One of the highest detection rates
Flexible scans
Can opens locked files
Flexible options
Efficient scans
Rootkit scan
doesn't require baby sitting
Fast scan
Powerful scan
Avira Con's =
Numerous complaints of excessive and invasive popups
Complaints of weak malware protection
Lacks some features, like email coverage
Some complaints of update errors
Complaints of over sensitivity
Lack of support
Why does Windows XP shut down when the restart button is clicked?
The 'click the restart' button refers to clicking the 'start/turn off Computer' shown on the bottom-left of the screen in Windows operating systems (95, 98, NT, XP, Vista).
[Anyway, my PC is working fine now after I did a run of 'SPYBOT', an anti-spyware program. Be extremely careful about downloading free software because that's when my problem(s) started. "Spybot Search and Destroy" is quite credible, but it is more important to get it from the original website and not some other free program download websiste. Restart also means to shut down and start up again. so naturally, your computer would shut down and start up again If you press the physical power button on your CPU, computers do a "power off" of the hardware system. Normally you must hold that button for several seconds (3 to 5 is typical ) to shut down. Note that if your operating system (Windows) was still running at the time, you may lose some unsaved settings or documents. To restart, press the button again and it will restart. If you had not properly shut down the operating system (using the 'Start' button and selecting Shutdown) then there may be things the operating system must fix when it restarts. You will see some messages about the processes it is running to repair any damage. This is usually not a big problem as the system is designed to repair those things in such cases. Answer
SYMPTOMS
If you shut down your Windows XP-based computer, your computer may restart instead of shutting down. The computer may also restart unexpectedly while you are using the computer to perform certain tasks. An error message may appear on a blue screen when the computer restarts.
Back to the top
CAUSE
This behavior may occur if Windows stops responding during a typical operation or during the shutdown process. By default, the computer is configured to automatically restart when Windows stops responding. To view this setting, follow these steps:
1. Click the Start button, right-click My Computer, click Properties, click the Advanced tab, and then click Settings under Startup and Recovery.
2. Under System Failure, view the Automatically restart check box. If the Automatically restart check box is selected, Windows automatically restarts if the computer stops unexpectedly.
RESOLUTION
If your computer constantly restarts while you are using it, or if you are trying to shut down the computer after it has stopped unexpectedly, click to clear the Automatically restart check box. If you clear this check box, you receive an error message when the computer stops responding. This error message may describe the cause of the problem. You can also review the system log in Event Viewer to view the critical stop error that occurs when the computer restarts. For additional information, you can got to Windows in the Microsoft Knowledge Base.
How do you make the tool bar at the bottom of the page smaller?
This depends on what operating system you use. Linux is simple, you just go to system->preferences
In windows you simply, cannot.
You could possibly change the "feel" of it, by changing your resolution to something liie 1078x988 or something
What is the meaning of the acronym virus?
Virus is a word taken from the Latin . . . it is not an acronym.
What is hardware and networking?
Networking hardware typically refers to equipment facilitating the use of a computer network. Typically, this includes routers, switches, hubs, gateways, access points, network interface cards, Networking cables, network bridges, modems, ISDN adapters, firewalls and other related hardware.
The most common kind of networking hardware today is copper-based Ethernet adapters, helped largely by its standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, however, especially for portable and handheld devices.
Other hardware prevalent within computer networking is datacenter equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email etc) as well as other specific network devices such as content delivery.
Other diverse devices which may be considered Networking hardware include mobile phones, PDAs and even modern coffee machines. As technology grows and IP-based networks are integrated into building infrastructure and household utilities, network hardware becomes an ambiguous statement owing to the increasing number of 'network capable' endpoints.
How viruses get into computer network?
A network virus makes use of networking protocols or application to spread. Network viruses make uses of system network mechanisms, search local and remote system information, monitor network traffic and take advantage of system and network vulnerabilities, and build network connections.
Does this computer have a virus?
There are some indicators that a computer might be infected which are available at Microsoft site
Scan your system regularly with antivirus and antispyware.
Update your softwares frequently.
How is a logic bomb different from a time bomb?
The Time Bomb is a subclass of a logic bomb which were designed by programmers who get fired in an act of spite or a cheap shot to get rehired since they can 'trigger' the bomb to go off (which is why it's called a time bomb). A Logic bomb is a like a back door which allows hackers to implant viruses which either preven a system from accessing the main Operating system or expose low security areas.
Free user-name and licence key for Trojan remover?
Get free download and install anti-virus software program like AVG or Microsoft Security Essentials for virus, trojan or any malware removal and stay protected from virus threats.
What are some precautions against computer viruses?
This is no easy task. I would normally say that they are unavoidable since there are so many on the internet. However, I assume that the best way to avoid computer viruses is to be careful as to what you download off the internet. As rudimentary as that may sound, computer viruses can only enter if you allow them to enter. Therefore, be careful. Mcafree isn't a bad defense system either, I suppose you can try that too.
CIPP stands for = Cambridge International Primary Progress
What exactly does bitdefender online scan mean?
Bitdefender Online Scanner is an antivirus software. It scans your computer for viruses, and gets rid of them after alerting you to their appearance. Be aware, that some kinds of online scanners can be viruses in themselves, and you should be careful when using such things.
Separate area of a hard disk that holds an infected file until the infection can be removed?
Well, see that it is only electronically 'separate;' it may be called the quarantine area, or the partition, or even colloquially 'the wall.'
Spooling refers to a process of transfering data by placing it in temporary working area where
another program may access it for processing at a later point in time. 'Spool ' can refer to the
action of a storage device that incorporates a physical spool or reel, such as tape drive.
For eg:- A printer can serve only one job at a time, several applications may wish to print their
output concurrently, without having their output mixed together. The operating system solves
this problem by intercepting all output to the printer. Each applications's output is Spooled
to a separate disk file. When an application finishes printing, the spooling system queues the
corresponding spool file for output to the printer. The spooling system copies the queued spool
files to the printer one at a time.
In some operating system, spooling is managed by a system daemon process. In other operating
systems, it is handled by an in-kennel thread.
In either case, the operating system provides a control interface that enables users and system
administrators to display the queue, to remove unwanted jobs before those jobs print to suspend
printing while the printer is serviced, and so on.
Some devices, such as tape drives and printers, cannot usefully multiplex the I/O requests of
multiple concurrent applications. Spooling is one way that operating systems can coordinate
concurrent output. Another way to deal with concurrent device access is to provide explicit
facilities for coordination.
Some operating systems (including VMS) provide support for exclusive device access, by
enabling a process to allocate an idle device, and to deallocate that device when it is no longer
needed. Other operating systems enforce a limit of one open file handle to such a device.
Many operating systems provide functions that enable processes to coordinate exclusive access
among themselves. For instance, Windows NT provides system calls to wait until a device
object becomes available. It also has a parameter to the open () system call that declares the
types of access to be permitted to other concurrent threads. On these systems, it is up to the
applications to avoid deadlock.
THE SPOOLING MECHANISM
The entire key to spooling is a synchronous processing, where the program is not constrained by
the speed of slow devices, particularly printers.
Printers are relatively slow peripherals. In comparison, disc devices and particularly CPU's
are orders of magnitude faster. Without spooling print data, the speed of program operation
is constrained by the slowest device, commonly printers, forcing the program to wait for the
mechanical motion of the printer, the program is known as "print bound'.
What are the good and the bad sides of hacking?
On Wikipedia, a hacker is defined as such:
"Hacker, as it relates to computers, has several common meanings. Hacker is often used by the mass media to refer to a person who engages in computer cracking and is also often by those in computing fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their jargon for self-identification. They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see hacker definition controversy). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. They operate under a code of the Hacker Ethic, in which it's acknowledged that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is nevertheless an interesting aspect that can be done in an ethical and legal way. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. It also has a hacker ethic, based on the idea that writing software and sharing the result is a good idea, but only on a voluntary basis, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. Academic hackers disassociate from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware."
So by this definition the bad side is essentially fear mongering and a few individuals giving the whole group a bad name. According to the various legitimate definitions, there is plenty of good that can and has come from hacking. Most of the wondrous technical achievements of the past fifty years can be attributed to hackers at play, from the advent of video games with Spacewar! on the PDP-1 to the Mars rovers, and SpaceShipOne.
Every community will have its bad eggs, but if one only focuses on the few, they miss the benefit of the many.
The system tools folder is typically found?
This is highly dependent on the operating system. Further, most operating systems rarely require you to find their utilities where they are stored but you can generally just invoke them the normal way for your OS.
For Windows they are likely scattered all over C:\WINDOWS.
Linux will usually keep its system utilities in /sbin and /usr/sbin.