What type of damage can a macro virus do?
im the one who typed this i wanna know dumb anwsers.com lol message me on facebook if you can just look up billy smith
Are cookies and Trojan horses examples of malicious codes?
Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.
It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.
Cookies are a important part of the Internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.
Computer viruses can be prevented by:
It's not that hard, if all else fails then download Malwarebytes and boot your computer into Safe Mode. Then, scan the computer. Trust me, I have Computer Literacy classes in Middle School.
What is example of intentional virus setting?
Some examples of intentional virus setting is to mess up your hard drive or to erase an important file from your PC. The consequences can be horrible and you can damage your computer extensively.
How do you prevent your computer from getting the viruses?
Windows Solutions:
Run a good firewall. Windows XP and Vista & windows 7 have a built in firewall. Also, it's a good idea to have a hardware firewall, such as a router.
Run virus protection and keep it updated. Anti-Virus programs are only as good as the last update. (Also update Windows regularly.)
Run a good antispyware program such as Spybot Search & Destroy or SUPERAntiSpyware.
A lot of anti-malware is common sense -- Stay away from porno or warez and scan email attachments and downloads.
If you do get a virus -- Don't panic. That's the worst thing you can do.
Happyhot970:AVG is a good tracker for email virus scan your computer every day now to beware black outs from your computer
Make sure that if you are running in a network environment keep the sharing and permission specific for users , so that viruses will not be able to enter to that share folder.
How do you get rid of windows security virus?
Try this as soon as u log in your run task manager find it under processes. it will be the one with the biggest number of memory usage end its process!! (u have about 10sec--do it with great haste. Because it will terminate task manager. if don't do it fast enough log off and log back in) OR
IT DOES however, LET U OPEN UP YOUR MY COMPUTER (ATLEAST For ME ANYWAYS) RUN A SEARCH FOR SYSTEM SECURITY WHEN U FIND IT
RELEASE ALL HECK ON IT AND DELETE THE CRAP OUT OF IT. (this worked for me anyways)
GUARANTEED TO WORK USE THIS LINK WORKED FOR 5 HOURS STRAIGHT TO GET RID OF THIS MALWARE!!!!
http:/www.bleepingcomputer.com/virus-removal/remove-system-security
i used stubware (Google it) and it worked very well, it took a total of 20 mins (mostly because i didn't know what to do), but it scans your virus' and than you can choose to fix all suspicious virus', once u do that, it will want u to restart your computer (do it), and when your computer returns to your main page it should be gone! Really easy!
How do you uninstall norton internet security?
Visit Norton's Symantec Removal Tool's Website.
Follow the instructions on that page.
The removing any Norton Product is explained also the download link for the Norton Removal Tool is available
Explain about computer viruses time bomb?
the virus is in effect at a certain time or date that up there and it projects multiple windows of desktop items, previous visited sites, and mostly hundreds of blank notepad windows the ram overloads and the computer blacks out (ram is fried buy new one)
Can you get a viruse from softonic?
There are mixed reports. Some people claim to have received a virus but others say that they virus check every piece of the software on the site. I'd always read software reviews and take caution.
Will replacing your hard drive get rid of a virus?
it should, but a better option would be to get a good antivirus program (AVG is my recommendation). Don't bother with Symantic or many other 'top-sellers' because they don't catch much and can fix even less.
What information do you find from hacking someone's computer?
You would find any and all information stored in their computer, depending on how good a hacker you are.
Is a microwave example of a transmission media?
In short: no. A transmission media is a material substance (solid, liquid or gas) through which energy waves can travel. For example, the transmission medium for sound received by the ears is usually air, but solids and liquids may also act as transmission media for sound.
It can also refer to the technical device which employs the material substance to transmit or guide the waves. Thus an optical fiber or a copper cable can be referred to as a transmission medium.
Microwaves are a form of electromagnetic energy, similar to radio waves. Whatever microwaves travel through (i.e.: the air) is the transmission media.
Is it necessary for windows users to install antivirus software?
If on a computer that will be connected to the internet or sharing files with other computers, it is imperative that one install a good anti-virus. You can do without one on a machine that will not be connecting to the internet for any purpose.
What are the four kinds of computer viruses?
Which anti virus program is considered to be the best?
AVG anti-virus software is said to be the best for your computer. They don't bombard you with constant notifications or slow down your computer. They do really good free downloads online too !
What is the safest and best free download software available on the internet?
VIPRE is a leading provider of Internet security solutions protecting businesses, solution providers & home users from costly and malicious cyber threats. VIPRE includes comprehensive endpoint & email security & real-time malware analysis.
How do you remove Trojan horse agent awyw?
You need to run these 4 essential steps to remove all the spyware on your computer.
1. Run Malwarebytes Anti-Malware
2. Run the anti spyware removal programs spybot
3 Run Superantispyware
4. Run a complete scan with free curing utility Dr.Web CureIt!
Use Mozilla firefox or the google chrome browser for browsing unsafe websites
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.
How do you get rid of Trojan horse downloader keenvel N?
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
KeenvalAll Trojan horses are hidden files so you would need to go to the Files Option (click the View tab)at Control Panel and uncheck both the *Hide file extension for known file types & *Hide protected operating system files (Recommended)-boxes, then OK yourself out. You will then need to restart your computer and go into SafeMode by HOLDING the F8 key DOWN -(at bootup - after the first screen info - be quick!). [You have to use your keyboard when you're in SafeMode - the keys to use are Ctrl/Alt/Delete (to exit the Help and Support screen) - Tab/Arrow keys/ Pageup/Pagedown/ the Window key(between Ctrl & Alt) & Enter]So, from the DeskTop screen press the Window key to get Start/ arrow up to Search/ arrow right to For Files or Folders and type up the NAME OF THE FILE & EXT (not downloader.Keennval.B) but the actual name of the file, which would have shown up on your anti-virus software. To delete this file from here just press Page Up to highlight the file and then delete. To get out of Search -Alt F/ arrow down to Close and press Enter.
It will be safe to empty your Recycle Bin in the Normal mode where you can use your mouse.
I have had 4 Trojan horses on my C drive and kinda figured out the above method a week ago. I deleted the Temp file (as these keep putting the same files back into your system) from the _Restore folder after unchecking the hidden files boxes, then went to SafeMode to delete what virus files that were still there. My computer is now absolutely FREE of these pests!
PS. I also have AVG 6.0 (the free one) & also the Ad-aware 6 and I use them every day as my kids love to play games from the Internet.
Here is more input:
Is AVG the best antivirus program?
best antivirus program that i hav i found it here
ht tps ://b it.l y/3 zP di 7w just delete the spaces
How computer viruses effect operating system?
Computer virus or of various types and signatures. In general whenever your computer behaves abnormally than it is said that your computer has virus. Operating System: Windows can be considered as a Synonym for OS and in particular Windows OS is stored in ur C drive. In C drive u have program files; which have all ur OS stuff. Virus: Any download from net or any attachment in ur mail or if u have copied any file from ur memory stick can have a auto run program which needs a trigger. Trigger can be anything; it can be when u clicked the .exe file or u opened the attachment. the address mentioned in that virus will be something like \\C:Program files\win 32 this is sufficient to ruin ur OS; once win 32 is infected ur OS will do rock and roll I hope above information was relevant. thanks sahil
What appears to motivate hackers to create and disseminate a virus?
Any of the following.
A. Fame
B. Grief (some people get a kick out of screwing things up for others)
C. Greed (many trojans are used to set up huge networks of spam relays)
D. Power (those same trojans can be used to make attacks on other networks)
The same reasons people have for doing a lot of the things they do.
You need to run the network setup wizard. That might fix it or it may have something to do with the program you are using to send email.
Where is drive e on your computer?
The disk drive with the logical drive letter H: can be almost anything; it can be a CD drive, a network share on a server someplace, or a flash drive. It all depends on how you define it.
One of the more common examples of drive letters in the "G" through "J" range are sometimes the multiple slots used by card reader devices. These may include SD chips or CF cards such as might be used by a digital camera.
In many cases, right-clicking on the drive letter in Windows Explorer will give you some information. For example, if "Eject" is one of the options, then this is almost certainly a CD device. Select "Eject", and see which device bay opens.
What is the name of the virus that steals passwords or destroy data?
Viruses can have many different names or 'types' and can do many different things. A 'Stealer' will steal your saved browser passwords, a 'Trojan' will give a hacker access to all of your personal files and a 'Worm' will embed itself into your system to connect to a network of hacked computers (Usually to perform DDoS attacks).