answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

What kind of damages do computer viruses do to your computer?

Computer viruses can cause and do this:

Delete files.

Various messages in files or on programs.

Changes volume label.

Marks clusters as bad in the FAT.

Randomly overwrites sectors on the hard disk.

Replaces the MBR with own code.

Create more than one partition.

Attempts to access the hard disk drive, which can result in error messages such as: Invalid drive specification.

Causes cross-linked files.

Causes a "sector not found" error.

Cause the system to run slow.

Logical partitions created, partitions decrease in size.

A directory may be displayed as garbage.

Directory order may be modified so files, such as COM files, will start at the beginning of the directory.

Cause Hardware problems such as keyboard keys not working, printer issues, modem issues etc.

Disable ports such as LPT or COM ports.

Caused keyboard keys to be remapped.

Alter the system time / date.

Cause system to hang or freeze randomly.

Cause activity on HDD or FDD randomly.

Increase file size.

Increase or decrease memory size.

Randomly change file or memory size.

Extended boot times.

Increase disk access times.

Cause computer to make strange noises, make music, clicking noises or beeps.

Display pictures.

Different types of error messages.

If your computer is unplugged can it still receive viruses?

This question is non-sense, but if the computer is unplugged, it can not acquire a virus.

I think it's meant to say, "If your computer is unplugged and then plugged back in, will there be any viruses waiting to infect the computer?"

That's what I think.

What are the Advantages of automation information systems?

Advantages :

Less time consuming

Less money saving

less paper needed

less space needed

Disadvantages: Make employees lazy

Eye strains

How do you uninstall AVG free edition?

The best way to uninstall AVG Utilities totally within minutes is to download a powerful and advanced uninstall tool as fast as you can. The powerful and advanced uninstall tool can provide you with absolutely professional solution to uninstall AVG Utilities completely and efficiently within minutes.

How can spam affect your computer?

Most spam is Worms and like Malicious software, they can damage your computer.

I suggest you use a really good AV Software (E.G. ESET, Kaspersky etc.) to get rid of them. you could also use MBAM and Hitman Pro 3.5.9 or above to remove them.

How do you avoid catching a computer virus?

You can download antivirus software, know more about the site/file by using websites such as Virustotal, and do more research about viruses so you can spot or defend against malware easier.
You can download antivirus software, know more about the site/file by using websites such as Virustotal, and do more research about viruses so you can spot or defend against malware easier.

What are some consequences for people caught intentionally setting viruses?

If you are talking about intentionally putting a virus in your computer then that would depend on what the virus was written to do. If it is supposed to erase your hard drive or erase an important file from your PC the the consequences could be really bad. The first thing you should do though is find out what kind of virus it is then find out what it will do.

If you are talking about intentionally spreading a virus to make others sick then that is a felony and you will be spending time in a prison.

How do you restore your computer?

To restore your computer, you have to got to the control panel, click on system and security, then click restore my computer to an earlier time. You would then choose a system restore point. These instructions are for a pc using windows operating system.

What free virus removal are the most used?

The top three free virus removers ,or "antivirus" programs available would be AVG, Norton, and Avast. Each of these programs have there own perks such as tech support or ability to upgrade for a one time fee.

What is the funniest video on YouTube?

charlie the unicorn videos

Elmo backstage

Harry Potter puppet pals

the story behind Elmo

Dramatic look

fat cat small tree

charlie bit me

How to be hobo

how to be ninja

Youtube page: itemish95

things to do when you'r bored during the holidays

things to do when you'r bored in the office

things to do when you'r bored in an elevator

things to do when you'r bored at home

dancing baby doing the samba in Brazil

How do you tell if a program has a virus?

You can always do research on the program on the internet, and see if any other users have had a problem with it. You can download the program without executing it and scan it for viruses as well before you open it.

When was photoshop invented?

In 1982 scripts were written to form something like Photoshop. The first real version of Photoshop 1.0 was released in 1990 (for Macintosh exclusively) with basic photo editing filters and adjustments.

List different types of computer viruses?

W32/AutoIt Trojan and its variants

VirusW32/Delf Downloader Trojan and its variants

VirusW32/OnLineGames Password Stealer Trojan and its variants

VirusW32/Agent Dropper Trojan and its variants

W32/Agent.ENU.Dropper is a Trojan. The Trojan will infect Windows systems.

What virus is triggered on a certain date?

Logic Bomb

They go off when certain conditions are met.

One example being a certain date or time.

What virus runs a program that searches for common data files compresses them and makes them unusable?

That would be an encryption. Encryptions are usually found within safe looking files and programmed macros.

How does spyware get in your computer?

You can get spyware in many ways. Here A Couple Examples On How To Get Infected With Spyware:

1: You did not install an antivirus on your OS

2: You weren't careful on your protection

3: You might have not updated your Windows or Mac or Linux (any OS)

4: You went on a exploit site, which it can do drive by downloads

Drive By Download Definition:

  1. Downloads which the user indirectly authorized but without understanding the consequences (eg. by installing an unknown ActiveX component or Java applet).
  2. Any download that happens without knowledge of the user.
  3. Download of spyware, a computer virus or any kind of malware that happens without knowledge of the user. Drive-by downloads may happen by visiting a website, viewing an e-mail message or by clicking on a deceptive popup window: the user clicks on the window in the mistaken belief that, for instance, an error report from the PC itself is being acknowledged, or that an innocuous advertisement popup is being dismissed; in such cases, the "supplier" may claim that the user "consented" to the download although actually unaware of having initiated an unwanted or malicious software download. Websites that exploit the Windows Metafile vulnerability (eliminated by a Windows update of 5 January 2006) may provide examples of "drive-by downloads" of this sort.

Here some preventions to become a victim of spyware:

1: Install an antivirus program (example: AVG Free Anti Virus, ESET, NOD 32, etc)

2: Only one company that was a special component that can scan a link or block access to a malicious site: AVG Free Anti Virus, AVG Anti Virus, AVG Internet Security. They Have Something Called "Linkscanner". This component can scan links in search results before you actually access that site.

3: Use a browser that checks for malicious links and stops you as you click on bad ones.

4: Install a spyware removal program which also has background scanning.

How do you remove or get past RM Safety Net or Safety Net Plus?

Goto Google (http://www.google.co.uk) and enter: "cache:website.com", without the quotation marks, and (obviusly), changing website.com to your websites domain name (URL, Address).

For Example:

cache:facebook.com or cache:msn.com

Even if your school monitors the websites you go onto, it will appear on their screen as "www.google.com", as this is a google trick!

(Note: This will only work on 50% of websites, and certain pages don't load images!)

or

Go the start menu and click on the control panel. Then click on add/remove programs. Wait a moment and then find Rm Safety Net or Safety Net Plus. If you can't find either one of them they might be a componet of a program. Find that program and click remove. The uninstall wizard window will appear and then follow the instructions.

(Note: Most school computers will not allow you to do this unless they give you special permission!)

or

  • Uninstall it and/or delete the program file. Don't delete any shared system files though!
  • Install a proxy.
  • Go on www.spiderproxy.com or www.surfproxy.net - They have now Banned both.
  • Use the IP address. Visit www.centralops.net and ping the site. Copy the IP into the address bar with http:// in front. This will not always work. Update: centralops.net has now been banned by RM Safety Net.
  • Combine the two methods above - use the IP address method to access www.spiderproxy.com, and visit other desired websites through that proxy. You might need to get the IP addresses at home now and write them down since they blocked centralops.
  • Read more information at www.rm.com.
  • If you want to de-filter stuff go to www.yarrt.com
  • Download a free program to get past it here http://sourceforge.net/projects/rmpass
  • Download FireFox by uploading it to a host. Put it as a .jpg file and when you access it at school download it and change the extension to .exe . Then install FireFox into your User Area and open it up. Tell it to import settings from Internet Explorer then you can change them in FireFoxs internet options.
  • Also try this link, its a Proxy and it works well but YouTube will not work on this: http://64.191.70.133/go/

Previous 2 Entries deleted due to spam and false advice!

Why is water dangerous near a computer?

U see, when u throw water on a computer it has a very bad affect because the water goes to the wires and u should know that when electrical things are hit by water, they get ruined therefore the computer will get ruined and will stop working.

What is USB disk security 6.1.0.432 license key zbshareware?

The USB disk security is a well known software for protecting your system from USB based malwares/threats.

Will megaupload give you a virus?

Megaupload is a website in which you can download almost anything anyone uploads for you to download. That being said, if the user wishes to upload a file with a Trojan virus or other malicious software, then yes the file will contain a virus. You can always run a virus scan of the file before downloading.

Why would your Windows 98 computer automatically restart after 15-20 minutes?

On some motherboards, when the CPU temperature gets too high, it will automatically reboot the system in hopes of cooling the chip and the associated hardware. This is not a normal occurrence though - if your PC is rebooting automatically, something is wrong with the fans inside your PC case. Check to see if one of the fans aren't turning on or is running too slow. Make sure that dust has not piled up on the board or heat sync.

If the fans are working fine, and there is not dust, then try adding some extra thermal grease to the CPU. You can get a tube of it for a dollar or less on ebay. Just open up the PC, remove the Heat Sync, and carefully apply a small amount of the paste to the top of the CPU. There should be some fairly dry paste already on the CPU. You can leave it there, or replace it. If a small amount gets out on to the board, it will probably be fine, but try to avoid this if you can. Remember that when you latch down the heat sync, it will try to squeeze out the thermal grease, so only use a little. Now carefully put back the heat sync, and close up the PC again.

-----

Other answers:

The fans will affect that. My mom's laptop did that and all it was was a dust buildup on the fan and most processors nowadays have a thermal sensor and when it gets too hot it shuts the computer down to try and prevent the processor from dying. It could also happen because the processor IS dying and needs replacing

-----

There may be a program that turns on automatically when you start up windows 98. Go to the start button, run and type in Msconfig. When the box opens look for the tab that says "Start-up" then click on it, uncheck anything that you do not want to start-up when you turn your computer on. It is safe to uncheck all options that are check under the Start-up tab only if the computer truly needs the program to work it'll turn on automatically again.

What are the types of LAN technologies?

Answer by Techsupport

There are different types of Media Access Control methods in a LAN, the prominent ones are mentioned below :

=> Ethernet - Ethernet is a 10Mbps LAN that uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol to control access network. When an endstation (network device) transmits data, every endstation on the LAN receives it. Each endstation checks the data packet to see whether the destination address matches its own address. If the addresses match, the endstation accepts and processes the packet. If they do not match, it disregards the packet. If two endstations transmit data simultaneously, a collision occurs and the result is a composite, garbled message. All endstations on the network, including the transmitting endstations, detect the collision and ignore the message. Each endstation that wants to transmit waits a random amount of time and then attempts to transmit again. This method is usually used for traditional Ethernet LAN.

=> Token Ring - This is a 4-Mbps or 16-Mbps token-passing method, operating in a ring topology. Devices on a Token Ring network get access to the media through token passing. Token and data pass to each station on the ring. The devices pass the token around the ring until one of the computer who wants to transmit data , takes the token and replaces it with a frame. Each device passes the frame to the next device, until the frame reaches its destination. As the frame passes to the intended recipient, the recipient sets certain bits in the frame to indicate that it received the frame. The original sender of the frame strips the frame data off the ring and issues a new token.

=> Fast Ethernet - This is an extension of 10Mbps Ethernet standard and supports speed upto 100Mbps. The access method used is CSMA/CD .For physical connections Star wiring topology is used. Fast Ethernet is becoming very popular as an upgradation from 10Mbps Ethernet LAN to Fast Ethernet LAN is quite easy.

=> FDDI (Fiber Distributed Data Interface) - FDDI provides data speed at 100Mbps which is faster than Token Ring and Ethernet LANs . FDDI comprise two independent, counter-rotating rings : a primary ring and a secondary ring. Data flows in opposite directions on the rings. The counter-rotating ring architecture prevents data loss in the event of a link failure, a node failure, or the failure of both the primary and secondary links between any two nodes. This technology is usually implemented for a backbone network.

Which websites have really bad computer viruses on them?

Sites that don't have the certificates are more prone to spreading viruses. If the content of the website is objectionable, then you might get objectionable results by interacting with such a site. You can always set your browser settings to be warned of no certificate sites, or for them to be blocked. and if you do end up interacting with such a website, then try not to download anything, and have a good anti-virus working. "Free downloads", "free pornography", spam oriented, are a few examples of sites that are more prone to leaving a virus on your computer.

How do you remove spyware?

Spyware infections can easily be removed with the help of anti spyware software that is available on the internet for download.Some anti spyware applications have proven to be more effective than others and so one should read reviews before making a decision.

When using anti spyware software you should also ensure that it is updated frequently with the latest signature updates as this will ensure that it is able to detect and remove any new spyware infections that pose a threat to your system.

What Is Spyware?Spyware is a type of malware which is installed sneakily and maliciously onto a personal computer and collects lots of information at a time about users without their permission. The presence of spyware is typically hidden from the user, and can be difficult to detect. One of the ways that spyware enters the computer is when new programs are installed on your computer. Spyware will try everything to collect not only various types of personal information, such as Internet surfing habits and sites that have been visited but also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. It is a high risk for you having spyware hidden on your computer. Spyware also will infect your computer as software virus. Anyway, no matter how spyware enter your computer, they may track your Internet activity or may steal usernames and passwords, credit card numbers, and other personal financial information. How to Remove Spyware?To remove spyware, you should identify the certain program where spyware hidden in at first and then delete it right away. Some spyware would modify the Windows registry maliciously and your computer is still getting bad performance even though you remove spyware. In order to remove spyware completely you had better repair the destroyed registry. From the professional viewpoint, it is really hard to remove spyware and repair the referring files, registry entries manually if you are not an anti-spyware expert. You will definitely have no idea when you face the registry list. You need to download some kind of spyware removal tools which can assist you remove spyware and repair the corrupted registry keys safely and quickly.