answersLogoWhite

0

📱

Computer Viruses

Computer viruses are harmful pieces of software which can reproduce themselves and automatically spread to other computers and networks. Questions about computer virus techniques and specific computer viruses belong here.

5,673 Questions

How can you delete the virus Trojan BAT Shutdown bi?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browsre for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone

protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection

against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and

other malware.

What is a Generic-PUPexe?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What is spoofing virus?

Its an email virus... Many e-mail viruses now use random e-mail addresses from an infected computer's address book in the FROM and TO fields of messages the virus sends. Most likely the virus on someone else's computer has found your e-mail address in an address book and used it in the FROM field as the virus replicates itself via e-mail. The messages look like they came from you, but they did not. This is called e-mail spoofing.

Is blindwrite a virus?

Blindwrite is CD authoring software and is often used for making copies of discs. While Blindwrite itself is not a virus, if you do not download the software from the manufacturers website or another reliable source, you run the risk of downloading an infected copy.

NOD32 finds virus how do you erase it?

NOD32 should automatically remove the virus or put it in the virus vault. It may not do it if the virus is saved in the restore folder. You need to switch off and switch back on your system restore . Also You need to run these 5 essential steps to remove all the spyware on your computer. 1. Run Deckard's System Scanner (DSS) 2. Run Malwarebytes Anti-Malware 3. Run the anti spyware removal programs spybot 4 Run Superantispyware 5. Run a complete scan with free curing utility Dr.Web CureIt!

Name two anti rootkit products?

rootkit revealer by sysinternals. Backlight by F-secure.

What do you do if a rogue antivirus got installed?

You need to run these 5 essential steps to remove all the spyware on your computer. 1. Run Deckard's System Scanner (DSS) 2. Run Malwarebytes Anti-Malware 3. Run the anti spyware removal programs spybot 4 Run Superantispyware 5. Run a complete scan with free curing utility Dr.Web CureIt!

I have mcafee antivirus but i still get Windows vista security alert?

It looks like your antivirus cannot stop the latest rogue ware.

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Specific computer virus?

Keyloggers, Backdoor, and spyware are those specific virus.

What is first line of address?

The first line of an address is composed of the street address. The second line is used for any apartment or suite number.

Why does the antivirus program say that the virus program that i am going to download say that it has a virus all the time?

Ok... uh that question is full of fail... I'm going to go out on a limb and assume you meant "Why does the AntiVirus Program say that the program that I am going to download say that it has a virus all the time?"

Ok... first off, I have no idea what you have been trying to download, so I can really help you directly, but my guess is that you're downloading programs with viruses on them... either that or you're using an anti virus with a public report system and ignorant people have been reporting that programs have viruses when they dont... honestly- just get a different anti virus

How can you catch the Norwalk virus?

You catch it by eating or drinking contaminated food or drink that has vomit particles in it. Just wash your hands after the rest room, and before eating or drinking, and you should be fine. Also, never put your hands in your mouth! Norwalk virus is not airborne, so you can really only catch it if your hands are contaminated, and then you put your hands in your mouth. Also, use a bleach cleaner to clean kitchens and bathrooms, and make sure to avoid physical contact with a sick person. If you never put your hands in your mouth, you will most likely never get sick.

What is a dropper virus?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

What is trojan.gen?

Gen stands for generic no name Trojan

You need to run these 5 essential steps to remove all the Trojan on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

2nd answer:

The first answer doesn't really tell what Trojan.gen is. Trojan.gen is a computer virus that slows down your computer(a lot), collecting your personal information without you knowing, damaging your computer system, and deletes files without your consent.

What is piggybacking?

While worms do not need another program to attach themselves to, viruses do. Piggybacking refers to the way that viruses infect or attach themselves to legitimate programs or documents to sneak onto your computer and attempt to infect it.

I accidentally clicked on virus What do I do?

Run an online virus scan to find out if there are viruse in your computer

use services like

* Trend Micro HouseCall * ESET OnlineScan (NOD32)

What is hinhem scr?

its a virus that keeps sending out messages that you have not writtin on yahoo...download AVG and you can get rid of it.

How do you remove khatarnak virus?

Remove all shares from the system Install avast antivirus and scan for the virus. it will delete the virus named khatarnak.exe.

What viruses can you get?

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

if you need more help e-mail me: nik.kita@hotmail.co.uk

How does an aniti-virus protect your computer?

  • Scanning your files
  • Scanning downloads
  • Scanning e-mails
  • Warning you about viruses
  • Virus alerts
  • Firewall
  • Many are anti-spyware, too

What is sp rsser.exe is it an virus....?

This file is "Realtime Shield Service" and is part of a program called Crawler Spyware Terminator. I have seen no indication that it is a virus, but it seems to take up alot of unneeded system resources. I would advise against using this program simply because many free spyware removal tools are inadequate and some even plant viruses or other undesireable processes. If you need a free solution to adware and spyware try Spybot: Search and Destroy, millions swear by it and I myself will not run a computer without it.

The term integration refers to the ability to?

Integration is one of the most useful features of current software packages. It refers to the ability to place information created in one type of application into a document created with another type of application.

Why do people create computer viruses?

to slow down your hard-drive, hack your personal info, or just to do so. It is illegal. And they can completely crash your hard-drive.

There are all sorts of reasons, however, the most common is because some viruses can track what you do- online or offline. If you enter your bank account details in somewhere, for instance, the person who made the virus can see what you put, and can therefore be able to steal from it. Other reasons include, but are not limited to:

'Posing' as you on popular Instant messaging sites & email providers, so they can force people to also develop the virus;

Crashing people's systems

Deleting important information.

Some viruses were created as experiments.