answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

How do Hijacker viruses work?

Browser Hijackers aren't technically viruses, they come under the malicious software or malware definition. Browser Hijackers can work in various ways, including having a background process running on your computer that constantly changes your home and search pages or the via the use of a browser helper object (BHO) in Internet Explorer. They are typically installed when visiting a bad website via Microsoft ActiveX technology or due to a dodgy piece of software with "bundled sponsor programs".

What virus has infected the most computers?

Trojan viruses, named after the Trojan horse that was gifted to the ancient city of Troy by the Greeks. The Greek warriors hid themselves in a giant wooden horse that was left outside the gates of Troy. The people of Troy brought the horse inside the gates, thinking it was a gift. Late that night the warriors broke out of the horse, killed the Trojan guards and opened the gate allowing the rest of the Greek army in to take the city. A Trojan virus works the same way. It is written within a usable application. The user installs the program thinking it will do something useful for their computer, but after it is installed the viral part of the program lets loose with whatever the intended damage is.

A Worm is another common virus, in fact it is probably the closest thing to a real virus. It is self-replicating, meaning that, other than its specific goal of damage to the target system, its other main goal is to copy itself and spread to any systems in direct connection with the original. For instance an email virus that, once it installs in its target and does its damage, finds the target's address book and attempts to copy itself out to all the entries in the book.

These two viruses are the most common, but there are many other kinds, and almost infinite versions of each type.

What is a trojan-type virus?

It is a virus that is buried inside another program. SO when the program is run the virus does its thing. That is why a good virus detection software package is important and it is kept up to date.

What are all the computer viruses called?

A computer virus is a small software program that attaches itself to a program or file. It is designed to spread from one computer to another and interfere with computer operation. To avoid viruses, it's essential that you have security software(antivirus).

Types Of Viruses

Trojan Horse:

A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worms:

A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

Bootsector Virus:

A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

Macro Virus:

Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

Memory Resident Viruses:

Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

Rootkit Virus:

A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

Polymorphic Viruses:

A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.

Logic Bombs/Time Bombs:

These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

Who is the actress in the restasis commercial?

The actress is Brenda Julian. Her IMDB profile is available here: http://www.imdb.com/name/nm1635493/

Actress Brenda Julian appears in the new ad for prescription Juvéderm injections to erase wrinkles. You may have seen Julian in a guest role on Desperate Housewives last year or in ads for J.C. Penney, Lipton Tea and Ford Motor.

First two states to take steps to secede in 1860?

South Carolina seceded in 1860. Georgia, Mississippi, and Texas had secession conventions without results.

Information about the first computer?

First programmable computer

The Z1 originally created by Germany's Konrad Zuse in his parents living room in 1936 to 1938 is considered to be the first electrical binary programmable computer.

The first digital computer

Short for Atanasoff-Berry Computer, the ABC started being developed by Professor John Vincent Atanasoff and graduate student Cliff Berry in 1937 and continued to be developed until 1942 at the Iowa State College (now Iowa State University). On October 19, 1973, US Federal Judge Earl R. Larson signed his decision that the ENIAC patent by Eckert and Mauchly was invalid and named Atanasoff the inventor of the electronic digital computer. The ENIAC was invented by J. Presper Eckert and John Mauchly at the University of Pennsylvania and began construction in 1943 and was not completed until 1946. It occupied about 1,800 square feet and used about 18,000 vacuum tubes, weighing almost 50 tons. Although the Judge ruled that the ABC computer was the first digital computer many still consider the ENIAC to be the first digital computer. Because of the Judge ruling and because the case was never appealed like most we consider the ABC to be the first digital computer. However, because the ABC was never fully functional we consider the first functional digital computer to be the ENIAC.

The first stored program computer

The early British computer known as the EDSAC is considered to be the first stored program electronic computer. The computer performed its first calculation on May 6, 1949 and was the computer that ran the first graphical computer game. The first personal computer

In 1975 Ed Roberts coined the term personal computer when he introduced the Altair 8800. Although the first personal computer is considered to be the Kenback-1, which was first introduced for $750 in 1971. The computer relied on a series of switches for inputting data and output data by turning on and off a series of lights. The Micral is considered the be the first commercial non-assembly computer. The computer used the Intel 8008 processor and sold for $1,750 in 1973. The first workstation

Although never sold the first workstation is considered to be the Xerox Alto, introduced in 1974. The computer was revolutionary for its time and included a fully functional computer, display, and mouse. The computer operated like many computers today utilizing windows, menus and icons as an interface to its operating system. The first laptop or portable computer

The first portable computer or laptop is considered to be the Osborne I, a portable computer developed by Adam Osborne that weighed 24 pounds, a 5-inch display, 64 KB of memory, two 5 1/4" floppy drives, and a modem.

What are th compare all generations of computer?

No difference really, they still take 1's and 0's and make mathematical calculations corresponding to their instruction sets (CPU). What is DONE with that has changed dramatically tho, with every new generation, and that's about the only real difference...well besides the darn size thing.

Any more of an answer would be doing your test for you, and take far more room than this page offers.

1st generation computers used vacuum tubes. This generation spanned roughly 1940s to 1958. Today's generation uses very complicated integrated circuits. It started no earlier than the 1990s. A typical single IC from a modern computer contains several orders of magnitude more components than an entire 1st generation computer occupying an entire room, and runs at speeds unimaginable in the 1st generation.

Who are the scientist discovered computer?

The Abacus is a Japanese adding machine that consists of beads on wires strung between a wooden frame. The position of the beads indicated the number and you could do simple math with it. It is one of the oldest forms of computers.

Why do historians say that anachronisms are wrong?

Historians think anachronisms are wrong because of their name. "Anachronism" means "out of time" and refers to things that are outside of sequential order. One example of this is use of certain technology in a time period before it is invented.

When the user loads a program it is copied into before it is run?

RAM

It depends on the computer system being used. Traditionally an executable program would be copied in its entirety from its storage media (disk, diskette, tape, SD card, USB device, network storage) into memory (also called RAM for Random Access Memory). If it already is in a high speed ROM (read only memory) it might be executed directly from there or it might still be copied into RAM for execution. It depends on the capabilities of the rest of the hardware.

Systems with a swapping area might copy the program to the swap area and flag it for execution. When its turn comes, part of it are loaded into memory as needed and run.

Other systems don't even do that. They can just flag the program location on the disk drive as ready run. When its turn arrives, the needed parts of the program are copied to memory and run.

What is a group of worms called?

A group of worms is commonly referred to as a "cluster" or "bunch."

How do you read com file?

You really can't unless you get a decompiler. A .com file is a computer program that has been 'compiled' and converted into machine language. What you want is the 'source code' that was used to create the .com file by running it through a compiler.

What number system does a computer use that is on?

Computers are not smart They only know 0 and 1 or binary states or true or false. this language is known as machine language

What can cure ring worms on skin?

Try Usind Nail Polish and then throw away some of the things that you touched also try using plastic mattress covers Good Luck