answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What kind of software solutions are available for antivirus?

I have been using vipre antivirus for past 1 year. My experience with it is pretty decent. It is handy and I found it easy to use, so most people will find the same as, tech savvy is not my domain. I have been using home protection but there is also business protection. There is some free trial period to get the feel of the product or you can directly buy it

How many computer viruses are in the whole world?

Billions.... and billions...... and billions.... and billions.... You can make a virus that will start deleting your windows/programs with notepad... Hope this helped :)

What virus shuts down computers?

Certain worms that get into your computer shut down your computer when the worm loads. One specific worm is the MSBLAST.exe and W32.Blaster...

and also if you search on YouTube you can find people renaming files and creating a fake virus message which shuts down your computer.

How do you find out which computer virus you have?

Your AV software should tell you that. You DO have AV software installed don't you?

You could also try running an online virus/adware scanner like one of these:

X-Cleaner

Trojan Scan

HouseCall

Spyware Begone

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

How do you get rid of a virus on your USB?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Is threre any solution if virus disables antivirus?

Answer">Answer">Answer

Yes but it's rare. I would suggest use an antivirus that is efficient and powerful, as well as free, use AVG Antivirus Free Edition 2011 'coz it allows you to stay protected on social networks and enjoy a faster running PC.

EDIT:

Well, I happen to have got that virus one time. Its called AntiVirus 2010. It SAYS its a virus killing program, but when you run it, its actually downloading a HUGE virus. It wouldn't let me use AdAware or anything!!

EDIT:

actually its not so rare antivirus 2010 is one of many programs called "rogues" rogues are a fake antivirus that may install itself without any given consent and if not its just downloaded by the user and installed

also rogues can do things like disable command prompt and task manager

Does gimp have any viruses?

YES, if you downloaded it from a site called "Trusted Software"! This installer does actually install the gimp, but also 5 other things, 2 of which are malware! the "freeze.net " thing especially!

What get less viruses YouTube or deviantart?

For me I'd chose Youtube as i know it much more and know its a safe site but the only problem for Youtube is that the comments may lead to links that harm your computer. As for Deviant art that is also safe but is a different sort of website. I'd recommend Youtube.

Hope this helped :)

Does blackra1n have viruses or bugs?

No it is safe, I have it and it actually makes my PC faster

Which is the example of computer virus?

Virus (computer), a self-duplicating computer program that spreads from computer to computer, interfering with data and software. Just as biological viruses infect people, spreading from person to person, computer viruses infect personal computers (PCs) and servers, the computers that control access to a network of computers. Some viruses are mere annoyances, but others can do serious damage. Viruses can delete or change files, steal important information, load and run unwanted applications, send documents via electronic mail (e-mail), or even cripple a machine's operating system (OS), the basic software that runs the computer.

How infection occurs?

A virus can infect a computer in a number of ways. It can arrive on a floppy disk or inside an e-mail message. It can piggyback on files downloaded from the World Wide Web or from an Internet service used to share music and movies. Or it can exploit flaws in the way computers exchange data over a network. So-called blended-threat viruses spread via multiple methods at the same time. Some blended-threat viruses, for instance, spread via e-mail but also propagate by exploiting flaws in an operating system.

Traditionally, even if a virus found its way onto a computer, it could not actually infect the machine-or propagate to other machines-unless the user was somehow fooled into executing the virus by opening it and running it just as one would run a legitimate program. But a new breed of computer virus can infect machines and spread to others entirely on its own. Simply by connecting a computer to a network, the computer owner runs the risk of infection. Because the Internet connects computers around the world, viruses can spread from one end of the globe to the other in a matter of minutes.

Types of viruses

There are many categories of viruses, including parasitic or file viruses, bootstrap-sector, multipartite, macro, and script viruses. Then there are so-called computer worms, which have become particularly prevalent. A computer worm is a type of virus. However, instead of infecting files or operating systems, a worm replicates from computer to computer by spreading entire copies of itself. Parasitic or file viruses infect executable files or programs in the computer. These files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents of the host program unchanged but attach to the host in such a way that the virus code is run first. These viruses can be either direct-action or resident. A direct-action virus selects one or more programs to infect each time it is executed. A resident virus hides in the computer's memory and infects a particular program when that program is executed. Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot sector. These viruses replace either the programs that store information about the disk's contents or the programs that start the computer. Typically, these viruses spread by means of the physical exchange of floppy disks. Multipartite viruses combine the abilities of the parasitic and the bootstrap-sector viruses, and so are able to infect either files or boot sectors. These types of viruses can spread if a computer user boots from an infected diskette or accesses infected files. Other viruses infect programs that contain powerful macro languages (programming languages that let the user create new features and utilities). These viruses, called macro viruses, are written in macro languages and automatically execute when the legitimate program is opened. Script viruses are written in script programming languages, such as VBScript (Visual Basic Script) and JavaScript. These script languages can be seen as a special kind of macro language and are even more powerful because most are closely related to the operating system environment. The 'ILOVEYOU' virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers, is a famous example of a script virus. Strictly speaking, a computer virus is always a program that attaches itself to some other program. But computer virus has become a blanket term that also refers to computer worms. A worm operates entirely on its own, without ever attaching itself to another program. Typically, a worm spreads over e-mail and through other ways that computers exchange information over a network. In this way, a worm not only wreaks havoc on machines, but also clogs network connections and slows network traffic, so that it takes an excessively long time to load a Web page or send an e-mail.

Protection against viruses

Computer users can prepare for a viral infection by creating backups of legitimate original software and data files regularly so that the computer system can be restored if necessary. Viral infection can be prevented by obtaining software from legitimate sources or by using a quarantined computer-that is, a computer not connected to any network-to test new software. Plus, users should regularly install operating system (OS) patches, software updates that mend the sort of flaws, or holes, in the OS often exploited by viruses. Patches can be downloaded from the Web site of the operating system's developer. However, the best prevention may be the installation of current and well-designed antiviral software. Such software can prevent a viral infection and thereby help stop its spread.

Several types of antiviral software can be used to detect the presence of a virus. Scanning software can recognize the characteristics of a virus's computer code and look for these characteristics in the computer's files. Because new viruses must be analyzed as they appear, scanning software must be updated periodically to be effective. Other scanners search for common features of viral programs and are usually less reliable. Most antiviral software uses both on-demand and on-access scanners. On-demand scanners are launched only when the user activates them. On-access scanners, on the other hand, are constantly monitoring the computer for viruses but are always in the background and are not visible to the user. The on-access scanners are seen as the proactive part of an antivirus package and the on-demand scanners are seen as reactive. On-demand scanners usually detect a virus only after the infection has occurred and that is why they are considered reactive.

Antivirus software is usually sold as packages containing many different software programs that are independent of one another and perform different functions. When installed or packaged together, antiviral packages provide complete protection against viruses. Within most antiviral packages, several methods are used to detect viruses. Checksumming, for example, uses mathematical calculations to compare the state of executable programs before and after they are run. If the checksum has not changed, then the system is uninfected. Checksumming software can detect an infection only after it has occurred, however. As this technology is dated and some viruses can evade it, checksumming is rarely used today.

Most antivirus packages also use heuristics (problem-solving by trial and error) to detect new viruses. This technology observes a program's behavior and evaluates how closely it resembles a virus. It relies on experience with previous viruses to predict the likelihood that a suspicious file is an as-yet unidentified or unclassified new virus.

Other types of antiviral software include monitoring software and integrity-shell software. Monitoring software is different from scanning software. It detects illegal or potentially damaging viral activities such as overwriting computer files or reformatting the computer's hard drive. Integrity-shell software establishes layers through which any command to run a program must pass. Checksumming is performed automatically within the integrity shell, and infected programs, if detected, are not allowed to run.

Once a viral infection has been detected, it can be contained by immediately isolating computers on networks, halting the exchange of files, and using only write-protected disks. In order for a computer system to recover from a viral infection, the virus must first be eliminated. Some antivirus software attempts to remove detected viruses, but sometimes with unsatisfactory results. More reliable results are obtained by turning off the infected computer; restarting it from a write-protected floppy disk; deleting infected files and replacing them with legitimate files from backup disks; and erasing any viruses on the boot sector.

How do you get rid of a virus?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

A storage area for files that have been deleted?

Files that have been deleted from the computer by the user can either be deleted from the hard drive directly or sent to the recycling bin. Files that are detected by your anti-virus software are often sent to a quarantine folder on your hard drive.

What is virus and how to protect?

A Virus is a self replicating program which has the ability to duplicate and transfer itself to other computers.

The great grandaddy of all viruses, the Boot sector virus executes itself by infecting the start up processes of a computer. These type of viruses are now considered dinosaurs of the computer age. However recently they had a revival due to the self executing nature of usb memory sticks. This has been resolved in part by motherboard manufacturers switching the feature off as a default.

A Worm is a virus which has the ability to transfer itself across a network to a target machine.

A Trojan is a malicious program which uses a legitimate program to hide in to be transported. A RAT (Remote Access Trojan) is the type which most people are familiar with which allows an attacker to take complete control of a target machine. these types of malicious programs do not self replicate so therefore they are not considered true viruses however they are generalised into the same category by the public.

Bots are networks of infected computers with a form of RAT on them which operate as a swarm. The Bot program is designed to run applications and provide proxy services for criminals. Generally these are used to send SPAM.

Root kits (Known in the late 1990's as Device Driver Trojans) are RATS which have the ability to superceed the operating system and therefore can cloak themselves against detection by applications and the operating system istself.

SpyWare is software which is designed to report back to its creators your activity on the internet.

There are lots more virus/Trojan/Spyware variants which are beyond the scope of this article.

ScareWare

Again not really a virus but a method of getting a user to install malicious software. Scareware will normally report a condition which frightens the user into installing or purchasing a program. It's a social manipulation ploy, not a program itself.

For instance a website may offer to scan your computer for viruses then find hundreds on a previously clean machine. It will then offer to clean these viruses if you just download the tool to do so. Of course the took is usually malicious and in some cases is used to blackmail the user into parting with money to clear the fault.

Antivirus

Antivirus solutions are used to detect and remove viruses,spyware and trojans. They do this using a couple of methods.

The Signature file method

Each program on a computer is made from instructions which are represented as numbers. Take a big enough sample of these numbers and you can cross compare the 'signature' with an unknown file byte by byte until a match (or not) with the sample is achieved.

Hueristic analysis

Hueristics are used to identify unknown types of virus. It does this by not looking at what the file is but at what it does. For instance, a screen saver program is highly unlikely to attempt to erase the hard drive on the computer in its first few lines of code, but a virus might. Or a Trojan might want to open a port to "Phone Home". These activities can be scored and the result can be filtered by a 'sensitivity control' set by the programmer or the user.

Expert opinion votes the best method of preventing infection by malicious programs is to get 'NetWise'. Make sure that you have a functioning antivirus solution from a reputable company. Take a look at your browsing habits.

Criminals favour websites that are highly popular or contain information which will reduce the users resistance to installing their malicious software. Ilegal Peer to peer sharing systems, hacker websites, and porn sites are all favourite targets for criminals who use virus techniques to steal credit card information or proxy machines for further criminal activities.

Avoid these types of websites and file transfers and your reduce the overall risk of becoming infected with a virus.

Which part did the virus creeper attack?

the creepr virus {when it was made spread to screens of computers infeted it} goes to computers and infects them and then the messege "i'm the creeper cacth me if you can!" appears on infeted screens and what it does is mess up programmsa and stuff like that

Any software to remove Nhatquanglan virus?

I consistently suggest the use of Spybot Search and Destroy (http://www.safer-networking.org,) AVG Anti-Virus (http://www.grisoft.com,) and Site Advisor (Internet Explorer and Firefox Add-On at http://www.siteadvisor.com).

How do you remove Trojan horse agent kh and Trojan horse backdoor generic3 rtf from computer?

try one of the free demo versions of virus scan/ firewall software available from Norton, or Zone Alarm or any other one of the companies out there, they are fully functional and up to date versions of their software that you can download and use on a temporary basis, you may even decide to pay for the subscription which is a good idea.

How can you remove viruses from boot sector?

Run Malwarebytes Anti-Malware

Run the anti spyware removal programs spybot

Run Superantispyware

Run a complete scan with free curing utility Dr.Web CureIt!

Also run rootkit revealer.

How do you get rid of those websites that keep popping up?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

You can get rid of these pop -ups by following these steps.

1 Download and intall the Superantispyware on your computer .

2 Update your Superantispyware

3 Scan your computer for all the pop ups in your computer .

4 Remove all the malwares , found while scanning with the Superantispyware

5 Restart your computer .

Is there a good virus protection software available free?

Affordablekey one of the best websites for free Windows virus protection software. They offer a variety of different options from top vendors, making it easy to find the perfect security solution for your system. They also have great summer sale offers with up to 30% off when you use coupon code: HAPPYMD. With their wide selection and unbeatable prices, Affordablekey is definitely the best seller for free Windows virus protection software!

What is secondary storage memory?

Second storage memory has 2 definitions, it's either the space in your hard drive that's not occupied by your files and operating system, or it could be portable memory like usb sticks, (flash drives) and CD's.

How do you download antivirus on iPad?

The iPad doesn't need any anti-virus.. The operating system automatically segments the memory, so downloaded programs cannot invade other memory spaces or programs. The worst it can do is crash itself.

What is the meaning of the term quarantine in relation to antivirus software?

When anti-virus software quarantines a file it moves it into a reserved section of the hard drive where it cannot execute. Usually it will do this because it has identified it as malware. Generally the quarantined code or file can be moved back to the accessible portion of the drive if the user has identified it as non-malware, but it is rarely advisable to do so. The quarantined file may also be able to be forwarded to the anti-virus company for further analysis if it is not a recognized piece of malware. A final possible action that may be possible is to repair a damaged file that is in quarantine - but again, that usually takes some very special skills to accomplish and the virus protection software was unable to do it - hence sending it to quarantine.

What is the difference between normal view and print layout view?

Normal view is best used to quickly type or search a document. This mode does not display things like headers, footers, columns and some special features.

Print Layout, often called Page layout, is used to adjust formatting, page breaks, footer and header content, etc. and shows the document as you would see it if it was printed.

Which mode you use depends on what you need to do at the time. Most of the time you can use normal mode to get the bulk of any typing done and then switch over to the layout mode to make it look nice.