What is different between a file and a folder?
A folder holds a set of files ----- in IT a file (like a .doc document) holds user data, while a folder is a place where a number of files can be grouped for convenience (like 'my documents'). Folders can also hold other folders making the whole storage structure a tree.
BY JOHN KARL VIDALLO BAUTISTA
What is polymorphic regarding malware?
To change and restructure in multiple ways, so as to show a different signature and thus avoid detection.
For instance, if you link-edit a large group of object modules, their order is not 100% critical as long as they're accessed at the proper entry point. So malware that changes the hash and the signature of the executable this way as part of its operation can be said to be polymorphic.
What allows you to insert and remove devices while the computer is running?
Plug & Play devices can be inserted/removed while Computer is running.
How do you get rid of the iloveyou virus?
You need to run these 4 essential steps to remove all the spyware on your computer.
1. Run Malwarebytes Anti-Malware
2. Run the anti spyware removal programs spybot
3 Run Superantispyware
4. Run a complete scan with free curing utility Dr.Web CureIt!
Install ThreatFire
ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.
Install a good antivirus in your computer.
Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.
Keep your permanent antivirus protection enabled at all times.
In computing, a hyperlink (or link) is a reference to data that the reader can directly follow, or that is followed automatically.[1] A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. A software system for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to hyperlink (or simply to link). A user following hyperlinks is said to navigate or browse the hypertext.
A hyperlink has an anchor, which is the location within a certain type of a document from which the hyperlink can be followed only from the homepage; the document containing a hyperlink is known as its source code document. For example, in an online reference work such as Wikipedia, many words and terms in the text are hyperlinked to definitions of those terms. Hyperlinks are often used to implement reference mechanisms, such as tables of contents, footnotes, bibliographies, indexes, letters, and glossaries.
In some hypertext, hyperlinks can be bidirectional: they can be followed in two directions, so both ends act as anchors and as targets. More complex arrangements exist, such as many-to-many links.
The effect of following a hyperlink may vary with the hypertext system and may sometimes depend on the link itself; for instance, on the World Wide Web, most hyperlinks cause the target document to replace the document being displayed, but some are marked to cause the target document to open in a new window. Another possibility is transclusion, for which the link target is a document fragment that replaces the link anchor within the source document. Not only persons browsing the document follow hyperlinks; they may also be followed automatically by programs. A program that traverses the hypertext, following each hyperlink and gathering all the retrieved documents is known as a Web spider or crawler.
Does my computer have anti virus?
Yes it does if you have avg or microsft security essentials.
to determine whether or not you have anti virus software installed is to check the firewall and look under virus protection.
if should be a blue colour or it should say "virus protection on".
But your anti virus is either on desktop or the bottom right hand corner in taskbar.
How are computer viruses worms and trojans different?
There's many kinds of viruses. The Trojan Horse is one.
Why You Need a Firewall and Antivirus Software?
Endpoint Protection refers to the approach of protecting a business network when accessed by remote devices like smartphones, laptops, tablets or other wireless devices. It includes monitoring status, software, and activities. The endpoint protection software is installed on all network servers and on all endpoint devices.
With the proliferation of mobile devices like laptops, smartphones, tablets, notebooks etc., there has been a sharp increase in the number of devices being lost or stolen as well. These incidents potentially translate as huge loss of sensitive data for enterprises which allow their employees to bring in these mobile devices (enterprise-provided or otherwise) into their enterprise.
What do you see as your most difficult task as manager?
What was the most difficult task you had to learn on your job at Information technology department as a research and development team or Product Release team?
What are programs that run on your computer and disrupt operations?
Malware, a category of software which includes viruses and spyware, is one culprit. Another may be software which does not have malicious intent, but disrupts normal operations becauses of bugs/glitches.
How does a computer virus harm the computer?
A classic "computer virus" was designed to spread through a system or network of computers by establishing itself on files within the operating system, and then sending out copies of itself when these files were accessed. When it had spread from computer to computer, it would execute to affect all of the computers it had spread to, causing harm in some way, like continuous pop-ups or programs to cause computers to crash or reboot.
What is commonly termed a "virus" today is a "worm" or "trojan" that is designed to be downloaded and activated unknowingly by the computer's owner. There are numerous functions of trojans and worms. Some can make files unusable, or change their names on the hard drive. Others are designed to collect personal information from the computer, either by accessing files or by intercepting e-mails and data transfers. Some will log the keystrokes of a user to discover filenames and passwords.
Modern antivirus programs are designed to
-- stop viruses and trojans from entering the operating system
-- prevent them from executing once they are there
-- to remove them if they are found later.
Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.Malwares are one type of computer viruses.
How do you restore deleted cookies from your computer?
Download the Restoration 3.2.13 from the website download.cnet.com. This is a simple freeware program used to recover deleted files.
Extract the zip file to your desktop and locate the "Restoration.exe" file. Right click the file and select "Run as Administrator" to run the utility with administrator privileges.
Select the drive as "Local Drive(C:)" in the Drives pull down menu and click "Search Deleted Files" button.
Select the cookie files that you want to restore and click "Restore by Copying." Select the destination for the file in the dialog box that appears and click "Save."
Go to the destination folder you specified to find the restored cookie files.
Click "Start" and select "Control Panel." Click "Backup and Restore."
Click "Restore My Computer to an Earlier Time" to restore your computer back to previous settings. Choose the date to revert back to in the next window and click "Restore" to start the Restoration.
After the system restore is successful, restart your computer and check whether the system has reverted to older settings.
Navigate to the "Cookies" directory to find the desired cookie files.
Obviously, a company that distributes their own software with viruses in it is not going to be in business very long. As to why pirated software so often contains viruses, it is important to understand the "community" that supplies pirated software.
Cracking software is seen by many young programmers as a way of displaying their "leet" skills. It is often seen as a rite of passage to crack a complex encryption algorithm. When crackers feel their accomplishments are unappreciated by others, they often lash out at "leechers", or non-crackers who download pirated software but do not contribute to providing / cracking it. The cracker extracts his revenge, the leecher "learns his lesson" for not "respecting" the cracker community more and falling into their trap due to not having "leet" skills, and life carries on.
Contrast CISC and RISC technology?
CISC RISC Emphasis on hardware Emphasis on software Includes multi-clock
complex instructions Single-clock,
reduced instruction only Memory-to-memory:
"LOAD" and "STORE"
incorporated in instructions Register to register:
"LOAD" and "STORE"
are independent instructions Small code sizes,
high cycles per second Low cycles per second,
large code sizes Transistors used for storing
complex instructions Spends more transistors
on memory registers
Regards,
Foad Godarzy
NSWER: I believe a CISC processor is a 32 bit processor and a RISC is a 64 bit processor
What tool is necessary to actually see a virus?
An electron microscope is necessary to actually see a virus.
How can a computer be affected by a computer virus?
an infected diskette is inserted into the disk drive, the virus can be copied into the computer system.
The most common ways viruses enter your system are through files added to your systen through removable media such as diskettes, files, downloaded from the Internet, and files attached to e-mails.
+++
Diskettes.... They go back a bit! :-)
'
Timely then, was something I heard on the radio only this evening: businesses have sometimes been attacked from within by a sneaky physical Trojan Horse trick in which the attacker (usually a rival trying to steal commercial secrets) discreetly drops a USB stick close to the victim's front door. The hope is that some staff member will pick it up and out of unthinking curiosity, take into work and plug into his or her office computer to see what's on it. The finder does not see much, but the attackers do, unless the company's IT system is very heavily protected. One protective method allows data traffic to and from only the firm's own authorised and encoded external devices, so the computer cannot read from or write to any randomly-found or employee-owned USB stick .
How do you get your computer to stop typing capitals?
your joking you wrote the question not in capitals. anyway look for a button on your keyboard that says caps lock and give it a big push and it should be fixed
i also faced the same issues which you are facing and my friend told me about "ijinni technician" i contacted them at WWW. Ijinni. Com for any issues Just open the website and you can chat with the experts who are Microsoft certified technicians and will fix the issue itself on the spot or u can call them through Skype or contact and for more visit their website as it is very user friendly website. Just click on the chat as the response rate will be very fast from them and they have fixed my issues in no time.
There are 4 ways to reach them.
1. Once you open the website just click on the live chat where one of the IJINNI technicians will be in touch with you.
2. If you have Skype installed in your machines just add the contact "ijinni.com" (free call).
3. You can email at support@ijinni.com.
4. You can dial at +1 512 879 3546.
For any issue you are facing with the computer just call IJINNI
Are alternative operating systems any less susceptible to viruses than windows?
that's funny i was researching that same question for my computer class...we must be in the same class
that's funny i was researching that same question for my computer class...we must be in the same class
or maybe we just have the same books
Why are computer viruses made?
Human made computer virus because he was of greedy nature. Human enjoy mading chaos sometime, because he know he made someone have bad days, and he enjoy. Human also want you money, so make computer virus that pretend being computer virus getridofer, when really not, and human make money when you pay fake not computer virus.
Shortingly, human made computer virus because human prick.
What are the websites called that have viruses?
the worst computer websites/downloads to get viruses off are:
1.musicjesus
2.limewire
3.winrar
3.javascript
4.any windows live messenger scripts
5.mediafire
on the hole if you stay away from these websites or other websites that are a bit weird or any type of music sites to download free music off then you should be fine and virus free but i do recommend that you install an anti-virus software such as Malwarebytes, avast antivirus,
ad-aware or spy bot search and destroy to keep your computer fully safe from any kinds of worms, hackers, key loggers and Trojans.
What are two examples of malware?
Malicious code is any code designed to have an effect that is unintended by the receiver.
Viruses, Spyware and Malware are three examples.
Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent.
Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you.
Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you.
Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.
What are the characteristics of a computer virus?
It depends what type of virus you get. Some record the key strokes and then if you put users and passwords they can get them. Some delete your files or corrupt your files Some install crap onto your computer Some just do nothing Some delete system files Some just log you off randomly.