answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What is a virus protection sorfware?

"to protect PC from dangerous software and programmes"

To be slightly more indepth without being complicated, Virus protection softwares tend to scan files on your computer, and use a variety of methods to indicate possible infection, such as Virus signatures of known viruses, new viruses are constantly being released so it is important to keep these upto date.

What is a malicious user?

There are 3 levels of malicious users

You will soon notice the ever-present malicious user. The term malicious is used liberally. What we are referring to is an individual or group who has the knowledge, skills, or access to compromise a system's security. Malicious user is a generic category encompassing a variety of roles that deserve additional discussion. A malicious user can be any of the following.

Organized crime (financial motivation)

These malicious users are capable, motivated, well organized, and well funded. They are intent on operations such as cloning cell phones or other wireless devices and stealing money, goods, and services. Organized crime is the most capable category of attackers. Their ability stems from having the resources available to obtain the necessary hardware, software, and knowledge to mount sophisticated attacks quickly if the potential financial benefits justify the effort.

Hackers (nonfinancial motivation)

These malicious users are also capable, motivated, and well organized and may be well funded. Although hacker interest in wireless systems may initially be sparked by the financial or proprietary information the system protects, their attacks are generally focused on achieving notoriety. Attacks that can be expected of hackers include small-scale and wide-scale disruption of operations and the collection and release of sensitive information.

Malicious programmers (financial or brand damage)

These malicious users vary in their technical ability and are usually highly motivated by personal greed, grievance, or grudge. They are usually not well organized but may possess significant knowledge of the wireless system and access to internal processes. Malicious programmers can originate from various sources: a disgruntled employee at a wireless manufacturer; an application programming contractor; operations and support personnel; a knowledgeable programmer who feels wronged by someone associated with the manufacture, distribution, or management of a wireless system or device; a programmer who feels wronged by an individual or a company using wireless systems or devices.

Also in this group we consider attackers with nonmalicious intent whose actions can incur security issues, either inadvertently or because of an interest in improving the system's security. The information and vulnerabilities generated by nonmalicious attackers are capitalized on by malicious attackers if not immediately addressed by the affected wireless component or system.

What are the important measures for a firm to take to protect itself from hackers and viruses?

Install an anti virus and keep it updated, do not click on links in websites (i.e. advertisements)/emails from people you do not know and do not download files from websites that are not legitimate.

Very straight forward really

How do you prevent hardware and software failure?

Computers cannot be protected from all system failures. To guard against this be sure that backups of the system are made on a scheduled basis. Also be sure to perform all regularly scheduled maintenance. It is also suggested that an uninterrupted power supply always be connected to the system.

How do you program a Realistic PRO 2009 Scanner?

First make sure that there is a live battery in the scanner. The battery is located under the plate on the rear of the scanner, you can remove the plate with a philips screwdriver and put a fresh 9v battery in.

Step 1. Turn on the scanner and put it in manual mode.

Step 2. Flick the Manual switch downward until you find the channel you wish to program.

Step 3. Push the "Program Button" on the right hand side keypad.

Step 4. Input your frequency and hit the "enter" key on the right hand side keypad.

Repeat process until all of your desired frequencies are programmed into the 16 channels.

Hope this helps.

Why viruses can make your computer run slow?

If you are trying to ask how to stop viruses from making your computer slow- The answer is you need to kill the virus. You can go to a local PC hardware store and maybe they can kill the virus. I know of a place called "Computer Geeks" I don't know if they are in your area or not. But try a local PC hardware store. You might have options on your computer that CAN kill the virus.

What does the conficker worm do?

The Conficker is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service. If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. Depending on the specific variant, it may also spread via removable drives and by exploiting weak passwords. It disables several important system services and security products and downloads arbitrary files.

How to stop a computer from shutting down automatically?

One possible reason for this could be that your computer is overheating and has to shutdown every now and then. I suggest you get it checked by a computer technician.

Also scan your entire system for any viruses or so.

Well also another possible reason is that your computer may have alot of dust clogged up where the air is suppose to get out which causes the hot air to stay in your computer which will overheat and shut down. I suggest you go to a computer technician and let him take a look at it

How do you stop browser redirects?

Under Tools -> Internet Options -> Security settings for the zone you want to disable browser redirects, you can do so by selecting Custom level... In the Miscellaneous section you can disable META REFRESH which will prevent your browser from redirecting

Is the t-virus real?

No, it's not. (Thank God!)But Umbrella is

How to turn on and off the antivirus protection?

To turn on anti-virus protection, if it is installed & not working -->>

1. Start>> Control Panel >> Security Center >> turn on if it is turn off

2. Check for updates

3. Reinstall the anti-virus

Note: If your PC has virus, it can prevents anti-virus to work

What is spyware software?

Anti-spyware software protects your computer from spyware, which are a classification of malicious software that infect your computer and generally (but not always) steal confidential data like credit card numbers or bank account information to rob you of your money. Try downloading SpyBot: Search and Destroy. I personally use it and it is very effective at catching spyware. Over that past 3 years, I have caught two spyware programs on my computer and successfully removed them.

What is another good internet security to use besides norton internet security?

Matousec's Proactive Security Challenge hails a Comodo Internet Security Product as No. 1

AVG Internet Security 8.0 it works well and it doesn't slow down your computer.

McAffee also produces a well regarded internet security product. Kaspersky Labs does too. There are some pretty decent freeware and shareware products that perform almost as well as (or in some people's opinion - better than) the commercial products. Most of the non-commercial products provide less customer support however.

What is USB Disk Security 6.2.0.18 license key?

USB Disk Security version 6.2.0.18-License/Serial Key/Crack

100% WORKING!!

Name: ABRADANT

Serial: 18033

Name: AAWB

Serial: 17751

Name: AUTHORITY

Serial: 18053

Name: ABROGATE

Serial: 17929

Name: BATCH

Serial: 17710

Name: AMPLITU

Serial: 18000

Differences between malwareadware and spyware?

Adware is any software program in which can cause advertising banners to pop up on your computer and display advertisements without your consent.

Malware is the term used for malicious software which can be any program or file that is harmful to a computer user

Spyware is malicious software that can hijack,steal your passwords, cripple your computer.

Is it true or false that Portable memory devices can be used to upload viruses or other malicious software to a system.?

True; for instance, USB devices can be used to upload viruses or other malicious software to a system.

What is backdoor Trojan horses?

A backdoor Trojan horse is a malicious program that allows the hacker to view everything on your computer.

How to detect a virus in your computer?

you need a virus and firewall protection software installed on your computer in order to scan for viruses such as norton internet security. There is a way you can do it with command prompt but im not entirely sure on how to do the command prompt way. not the answer you were wanting but that's all i know.

Does redsnow give you a virus?

redsn0w itself will not give you a virus, but a program that pretends to be redsn0w (a Trojan) very easily could. The best advice is to always download your software from reliable sources.

Do you ave to be connected to the internet to do a virus scan?

No. Your Computer does NOT have to be connected to the Internet to run a virus. Any contaminated or corrupt file can infect your computer any time it is open, run, or executed. The Internet is just one of many ways a virus can be 'run', started, opened, or spread. One common source not direct from the Internet is through USB (although the source may have be originated from the Internet.

How attachment are send it on mail?

before sending attachment, open attach file link and then browse the file you want to attach.

Can norton remove malware virus?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

cutt.ly/7jtIlIT