answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Who invented binary number system?

The modern version of binary numbers was discovered by the German mathematician Gottfried Leibniz in 1679. He credits the invention of binary numbers to Fu Xi, who he claims invented the "I Ching" binary system in China 4,000 years ago. Modern historians believe that the "I Ching", which contains the "bagua" binary hexagrams, dates closer to the 9th century BC. Binary numbers were also used elsewhere in the world outside China and Germany. In Polynesia, indigenous groups used a binary decimal system as early as 1450 AD. Pingala in India used a binary system in 200 BC for prosody. A similar system was used in sub-saharan Africa as part of their numerology system (known as "geomancy"). The sort of binary we use today however was put together by a fellow named "Francis Bacon" , and another chap named "Gottfried Leibniz" in the 1600s. The full power of Binary however was finally unlocked by a man named "George Boole" in the 1800s when he invented Boolean algebra which brought all the ideas together.

What is the Bobbit computer virus?

I would report that to any virus company. its not in any of the virus databases

What are computer viruses detailed information?

well you see, the term "virus" is overused, there are tojan horses, spam bots, and other things like worms, which spread automatically, what a virus is is essentially something unwanted on your computer, their not good, to be infected by a Trojan, all you have too do is run a certain file, your infected, *detailed information*: the Trojan horse writes registry enteries into the registry using a soft of coding language, once those codes are written, its kind of like windows now accepts it as safe, and the Trojan will boot up every time you turn on the computer with no hassle, some trojans can do scary things, some can look through your webcam, listen into your microphone, turn up and down your volume, steal sensitive information, and destroy your computer beyond repair, the "Trojan virus is varied in different context, but in essence, it allows somebody else to connect to your computer and wreak havoc. thank you for your interest, i would give you contact information, but im a hacker and don't want to get caught, if you ever hear of a hacker codenamed W3zkid, That's me, pce.

How do you get rid of the virus I-worm netsky b?

I had the virus i-worm/netsky.b and after running AVG antivirus several times I decided to pay Grisoft.com a visit and found virus removal utilities. I downloaded the removal tool for i-worm/netsky.b. which removed the problem with ease.

I actually had a problem with a different virus and AVG would not remove the virus with its built in virus scan; I, however, did find an alternative (for Netsky viruses as well) given by grisoft/AVG at the following URL: grisoft.com

I would suggest following the URL's instructions to the letter. If you do, you can then run AVG's Scanning Software and the Virus will have disappeared.

This removed the other virus for me and it is also supposed to work for the netsky viruses as well.

    • Be careful opening your emails especially from email addresses you do not recognize. I would suggest scanning them first or signing up with an email service that scans them for you. I keep getting sent the Netsky virus over and over again to one of my accounts but it is detected and cleaned before being sent to me, fortunately. I suspect that someone has me as a contact and has gotten a hold of their email list and started sending me email supposedly from these other valid email addresses. I do not expect this to clear up until that person, realizes they have the netsky virus and "cleans" their computer.

Good Luck!

How do computer virus execute?

A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce by attaching to other programs

Courtesy: howstuffworks.com

What is the difference between Indian number system and international number system?

the difference between Indian and International number systemis that after ten thousand lakh comes in Indian number system and in International number system hundred thousand comes after ten thousand.

How do you remove Anslacdo Virus remove from registry?

Well as a computer repair technician i made a list of steps that we go through to get rid of computer infections (viruses, worms, trojans, ect) at http://speedupmycomputer.webs.com/

How express the number 52 using the binary number system?

(52)10 = (1 1 0 1 0 0)2<-----------incorrect

52 = (00110110)<-------correct

Because binary is written in bytes and a byte is comprised of 8 bits, we have 8 spaces. binary has a base of 2 so each place is 2 raised to a power starting from 0 to 7 from right to left. That is how you get the numbers below.

Spaces from left to right are 128 64 32 16 8 4 2 1

Does 128 fit inside of 52? no, so it gets a zero in on the first place from the left and so on.

64 into 52? no, so it is 0.

32 into 52? Yes, so it is a 1 and now you subtract, 52 minus 32 = 20

16 into 20? Yes, so it get a 1 and so on.

Hope this helps.

Who made virus?

The first virus was made in Chauburji, Lahore, Pakistan, 1986Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.

Can you do an upgrade if your computer has a virus?

well it depends on what virus it has like a weak virus then yes but a big virus like a Trojan horse then no.

What does Dropper Inor do to your computer?

Well with my computer it locks up windows, pages move slow or not at all, makes having the internet not worth the hassle!

--------------

In general, a dropper (a.k.a. trojan loader) will sneak on to your system somehow, and avoid detection because it does not actually contain malicious code. It then secretly downloads and installs malware on your computer. This attack is designed to be effective against computers with an antivirus program.

Does the free chatting website knuddelscom give your computer a virus?

No, knuddels.com is a java-based chat room with no immediate access to your computer (including files or sending files), therefore it doesn't give you any virus at all.

Can iPads be infected with a virus?

There is no need of any Anti-virus software program for iPad or any Mac Product as they don't get any virus threat or any harm from trojan or malware.

To get rid of win32 brontok AA virus?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Are all computer viruses bad?

Obviously some will be worse than others, but a virus isn't a virus if it doesn't in some way harm your computer. So yes.

PS: some viruses and spywares will cause your PC from crash to destroy your system files, it makes you lose all your files or sometime, it will hijack your valuable files and demand for money

How do you write 9 in binary number system?

The base units; 8 4 2 1

9 in binary: 1 0 0 1

So 1001...because 9 = 8 + 1

How do you fix a hacked computer?

You can't "fix" a hacked computer. It depends on what has been done, but if they install a virus, use a antivirus program or format the harddrive. If they just connect to your computer and hack the password, reset the password and change your IP.

Easy as 3.1415926535

What is the difference between between a Trojan horse and a virus?

A Trojan Horse virus comes into you computer, and your computer usually won't expect it. It then send many other different and horrible viruses into your comp. Look up the story of the Trojan Horse if you still don't understand.

Is spybot search and destroy a good program?

yes it is a good program it deletes all spyware,viruses,and other things that are harming your computer.

How do you remove photothumb?

You are on your pc now...lets start.

Click Start

Click Control Panel

Double click Folder Options

If you have My Computer open and are browsing any folder in your system

Click Tools (next to File, Edit, View at the top of the screen)

Click Folder Options

After performing either of those two operations, the "Folder Options" window will open up.

Click on the View tab

Check off the circle next to Do not cache thumbnails

Click the Ok button

Once you click the Ok button, your computer will cease to generate Thumbs.db files. If you delete any of the existing Thumbs.db files, they will not return. It's working with my pc. Hope this help.

What happens to a computer when it has a virus?

It escapes like everything in Resident Evil and we all become zombies.ARGH!?! As I understand it, it gets put into a sandbox like environment where it is cut off from the rest of the system. Please correct or improve

Can Computers work exclusively with numbers?

No, they can process just about any type of information, including numbers, texts, dates, images, etc.