answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

What harmful things could computer viruses do?

Slow down email. Viruses that spread by email, such as Sobig, can generate so much email traffic that servers slow down or crash. Even if this doesn't happen, companies may react to the risk by shutting down servers anyway. ■ Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them. ■ Use your computer to attack websites. MyDoom used infected computers to flood the SCO software company's website with data, making the site unusable (a denial of service attack). ■ Let other users hijack your computer. Some viruses place "backdoor Trojans" on the computer, allowing the virus writer to connect to your computer and use it for their own purposes. ■ Corrupt data. The Compatable virus makes changes to the data in Excel spreadsheets. ■ Delete data. The Sircam worm may attempt to delete or overwrite the hard disk on a certain day. ■ Disable hardware. CIH, also known as Chernobyl, attempts to overwrite the BIOS chip on April 26, making the computer unusable. ■ Play pranks. The Netsky-D worm made computers beep sporadically for several hours one morning. ■ Display messages. Cone-Fdisplays a political message if the month is May. ■ Damage your credibility. If a virus forwards itself from your computer to your customers and business partners, they may refuse to do business with you, or demand compensation. ■ Cause you embarrassment. For example, PolyPost places your documents and your name on sexrelated newsgroups. source: www.Sophos.com

How does the choice of CPU and motherboard affect the choice of RAM?

The only thing that affects the decision on RAM is a motherboard. Your motherboard can only support a certain type of RAM.

What do you do if your CD ROM is missing on windows xp for example you click on your your mycompurter folder and it's not there?

firstly the basics, make sure the drivers are installed. see if the cd-rom is being reed from starting. if not.take a look inside see if it is plugged in. if you cant do that take it to an IT shop. next if you can open it, can you smell a burnt smell coming out of the cd-rom if so you need a new one. Yours Faithfully Your_Mum/David

What are the traits of worms?

3 of the traits are

  • body separated into segments
  • found in soil, freshwater, and saltwater
  • have body cavity that holds organs

What is Relocation in computing?

In computer science Computer science
Computer science is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems....
, relocation is the process of replacing symbolic references or names of libraries Library (computer science)
In computer science, a library is a collection of subroutines or Class used to develop software. Libraries contain code and data that provide services to independent programs....
with actual usable addresses in memory before running a program. It is typically done by the linker Linker
In computer science, a linker or link editor is a computer program that takes one ormore object file generated by a compiler and combines them into a single executable program....
during compilation Compiler
A compiler is a computer program that transforms source code written in a programming language into another computer language . The most common reason for wanting to transform source code is to create an executable program....
(at compile time Compile time
In computer science, compile time refers to either the operations performed by a compiler , programming language requirements that must be met by source code for it to be successfully compiled , or properties of the program that can be reasoned about at compile time....
), although it can be done at runtime Runtime
In computer science, runtime or run time describes the operation of a computer program, the duration of its execution, from beginning to termination ....
by a relocating loader Loader (computing)
In computing, a loader is the part of an operating system that is responsible for loading programs from executables into memory, preparing them for execution and then executing them....
. Compilers or assemblers Assembly language
An assembly language is a low-level language for programming computers. It implements a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture....
typically generate the executable Executable
In computing, an executable causes a computer "to perform indicated tasks according to encoded instruction ," as opposed to a file that only contains data ....
with zero as the lower-most, starting address. Before the execution of object code, these addresses should be adjusted so that they denote the correct runtime addresses.

Relocation is typically done in two steps:

  1. Each object code has various sections like code Code segment
    In computing, a code segment, also known as a text segment or simply as text, is a phrase used to refer to a portion of memory or of an object file that contains executable Instruction s....
    , data Data segment
    A data segment is one of the sections of a program in an object file or in memory, which contains the global variables that are initialized by the programmer....
    , .bss .bss
    In computer programming, .bss or bss is used by many compilers and linkers as the name of the data segment containing static variables that are filled solely with zero-valued data initially ....
    etc. To combine all the objects to a single executable, the linker merges all sections of similar type into a single section of that type. The linker then assigns runtime addresses to each section and each symbol. At this point, the code (functions) and data (global variables) will have unique runtime addresses.
  2. Each section refers to one or more symbols which should be modified so that they point to the correct runtime addresses.


A fixup table -- a relocation table Relocation table
The relocation table is a list of pointers created by the linker and linked into the MSDOS .exe file. The relocation table tells the loader where these segments can be found in program image loaded into computer storage....
-- can also be provided in the header of the object code file. Each "fixup" is a pointer to an address in the object code that must be changed when the loader relocates the program. Fixups are designed to support relocation of the program as a complete unit. In some cases, each fixup in the table is itself relative to a base address of zero, so the fixups themselves must be changed as the loader moves through the table. In some architectures, compilers, and executable models, a fixup that crosses certain boundaries (such as a segment boundary) or that does not lie on a word boundary is illegal and flagged as an error by the linker.

Explain the advantages of hexodecimal number system to binary system?

with hexidecimal you neednt use as many chartictors to represent a number. in binary 15 would be 01111 where as in hex it would be E resulting in much quicker coding times

Study the group of signal words then select the name of the pattern in which these signal words would probably be used?

This would depend on the words that are being used. Since there are no words that are being shown, it is hard to tell.

How does a surface computer work?

The surface computer is nothing more than a rear projection television inverted. The only differences are in the touch interface. the screen is surrounded by infrared L.E.D.'s. when you touch the screen the an infrared sensitive camera below the screen can pick up on the sensitive touches. Coordinates are then transmitted to a computer where they are interpreted and projected back to the screen to reflect the changes.

Do most internet providers offer 24 hour customer service these days?

There are nearly 7,000 ISPs in the United States alone. While some of them do supply 24 hour customer service, the smaller companies are likely to only staff call centers during business hours.

Is screen cast o matic free?

It's free, but sometimes, it could cause a virus, depending on what computer you have

What you should do when taking a message?

Messages may either be left as voice-mail messages for the person being called or written down by someone else. If you are writing down the message, use a telephone message form to fill in the appropriate parts.

How do I block Munga bunga?

Download "Spybot: Search and Destroy" this is freeware, and it will detect and delete munga_bunga bruteforce keyware. PLEASE NOTE there are other software packages with other names which will actually INSTALL spyware on your computer, use only the one exactly as it is named in this post. Do your homework. Verify what I have said.

How does the computer works?

A computer uses a processor to execute instructions read from ram to move data, do some simple math operations (+,-,*,/), and jump to different instructions, depending on what the data is. A computer can move the data to the monitor, the hard drive or even out into the internet. A computer also reads data from devices, such as a hard drive, mouse, keyboard, and websites on the internet.

What is the online company Geeks Of America best known for?

Geeks Of America is an online computer support help desk. It's core service is Windows and MAC based technical support, but it also provides remote data backup services and next day PC retail services. The company is known for it's insistence that each one of it's technicians be certified within 120 days of hiring or employment is terminated. The company is also considered the future of online help desks and is growing rapidly. To learn more about Geeks Of America, visit their website at http://www.geeksovamerica.com

What are the risks of computer viruses?

If you open a email that u dont know the person who sent it, or if you keep downloading anything and i mean anything i just downloaded a game and my computer has viruses,trojans,and everything so dont download anything

Can you get viruses from playing computer games?

yes, you can. This is why it is urged to research the games publisher(if you don't already trust the publisher) before you download/play the game. Many come with an executable file(.exe) and may contain viruses. [bear in mind, not all, there are PLENTY of trusted computer games]

Which identifies stand-alone software that does not require a user to assist in its propogation is it virus worm backdoor or rootkit?

Worms do not require human assistance in order to spread. Viruses, backdoors, and rootkits all require some form of user assistance in order to propagate, most often by opening or executing an infected file.