answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Who made virus?

The first virus was made in Chauburji, Lahore, Pakistan, 1986Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.

Can you do an upgrade if your computer has a virus?

well it depends on what virus it has like a weak virus then yes but a big virus like a Trojan horse then no.

What does Dropper Inor do to your computer?

Well with my computer it locks up windows, pages move slow or not at all, makes having the internet not worth the hassle!

--------------

In general, a dropper (a.k.a. trojan loader) will sneak on to your system somehow, and avoid detection because it does not actually contain malicious code. It then secretly downloads and installs malware on your computer. This attack is designed to be effective against computers with an antivirus program.

Does the free chatting website knuddelscom give your computer a virus?

No, knuddels.com is a java-based chat room with no immediate access to your computer (including files or sending files), therefore it doesn't give you any virus at all.

Can iPads be infected with a virus?

There is no need of any Anti-virus software program for iPad or any Mac Product as they don't get any virus threat or any harm from trojan or malware.

To get rid of win32 brontok AA virus?

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Are all computer viruses bad?

Obviously some will be worse than others, but a virus isn't a virus if it doesn't in some way harm your computer. So yes.

PS: some viruses and spywares will cause your PC from crash to destroy your system files, it makes you lose all your files or sometime, it will hijack your valuable files and demand for money

How do you write 9 in binary number system?

The base units; 8 4 2 1

9 in binary: 1 0 0 1

So 1001...because 9 = 8 + 1

How do you fix a hacked computer?

You can't "fix" a hacked computer. It depends on what has been done, but if they install a virus, use a antivirus program or format the harddrive. If they just connect to your computer and hack the password, reset the password and change your IP.

Easy as 3.1415926535

What is the difference between between a Trojan horse and a virus?

A Trojan Horse virus comes into you computer, and your computer usually won't expect it. It then send many other different and horrible viruses into your comp. Look up the story of the Trojan Horse if you still don't understand.

Is spybot search and destroy a good program?

yes it is a good program it deletes all spyware,viruses,and other things that are harming your computer.

How do you remove photothumb?

You are on your pc now...lets start.

Click Start

Click Control Panel

Double click Folder Options

If you have My Computer open and are browsing any folder in your system

Click Tools (next to File, Edit, View at the top of the screen)

Click Folder Options

After performing either of those two operations, the "Folder Options" window will open up.

Click on the View tab

Check off the circle next to Do not cache thumbnails

Click the Ok button

Once you click the Ok button, your computer will cease to generate Thumbs.db files. If you delete any of the existing Thumbs.db files, they will not return. It's working with my pc. Hope this help.

What happens to a computer when it has a virus?

It escapes like everything in Resident Evil and we all become zombies.ARGH!?! As I understand it, it gets put into a sandbox like environment where it is cut off from the rest of the system. Please correct or improve

Can Computers work exclusively with numbers?

No, they can process just about any type of information, including numbers, texts, dates, images, etc.

Where can you buy squirmles magic worms?

Its 99 Cents on sale when the sale is over is will be two dollars here:

http://www.officeplayground.com/Magic-Worm-P1340.aspx

Good Luck!

Why are segmented worms important?

The segmentation in worms is an advantage because it is helpful in the locomotion or movement of a worm. Each segment has many muscles in it and when those are flexed they push against the rest of the body to propel it forward. Without body segments the worms would not be able to move.

A computer virus that sends copies of itself to computers across the internet and cause a network traffic jam ends with w?

The type of malware you have described is called a worm. Worms spread across network links and infect the machines connected to it. Because worms spread so fast in so little time, they consume a lot of network resources, which can cause the network to slow down or crash.

Who made the virus Melissa computer virus?

The Melissa virus is also known as "Mailissa", "Kwyjibo" and "Simpsons". It was created by David L. It's unknown when it was created but found on March 26, 1999, where it shut down Internet E-mail systems that got clogged with infected e-mails.

The way to prevent a computer virus from infecting your home computer is to?

There are many ways to protect from viruses but seeing that you asked this question on Wiki answer, i would suggest for you to buy a good firewall and LISTEN TO WHAT IT SAYS, DON'T GO BY PASSING IT'S DIRECTIONS.

What happens when you get hacked?

someone gets into your files and your personal information, and usaly puts viruses and other things that can harm your computer

What is the phage computer virus?

It is a destructive virus that rewrites itself and is an executable program with its own code. It usually destroys the program it infects.

What are the different types of system call?

In computing, the process identifier (normally referred to as the process ID or just PID) is a number used by some operating system kernels (such as that of UNIX, Mac OS X or Microsoft Windows) to uniquely identify a process. This number may be used as a parameter in various function calls allowing processes to be manipulated, such as adjusting the process's priority or killing it altogether.

A parent process is a computer process that has created one or more child processes.

In UNIX, every process except process 0 (the swapper) is created when another process executes the fork system call. The process that invoked fork is the parent process and the newly-created process is the child process. Every process (except process 0) has one parent process, but can have many child processes.

The kernel identifies each process by its process identifier (PID). Process 0 is a special process that is created when the system boots; after forking a child process (process 1), process 0 becomes the swapper process. Process 1, known as init, is the ancestor of every other process in the system.

When a child process terminates execution, either by calling the exit system call, causing a fatal execution error, or receiving a terminating signal, an exit status is returned to the operating system. The parent process is informed of its child's termination through a SIGCHLD signal. A parent will typically retrieve its child's exit status by calling the wait system call. However, if a parent does not do so, the child process becomes a zombie process.

A child process is a computer process created by another process (the parent process).

A child process inherits most of its attributes, such as open files, from its parent. In UNIX, a child process is in fact created (using fork) as a copy of the parent. The child process can then overlay itself with a different program (using exec) as required.

Each process may create many child processes but will have at most one parent process; if a process does not have a parent this usually indicates that it was created directly by the kernel. In some systems, including UNIX based systems such as Linux, the very first process (called init) is started by the kernel at booting time and never terminates (see Linux startup process); other parentless processes may be launched to carry out various daemon tasks in userspace. Another way for a process to end up without a parent is if its parent dies, leaving an orphan process; but in this case it will shortly be adopted by init.

The exec functions of Unix-like operating systems are a collection of functions that causes the running process to be completely replaced by the program passed as argument to the function. As a new process is not created, the process ID (PID) does not change across an execute, but the data, heap and stack of the calling process are replaced by those of the new process.

In the execl, execlp, execv, and execvp calls, the child process inherits the parent's environment.

Files open when an exec call is made remain open in the new process. All open files must be flushed before an exec call. The exec calls do not preserve the translation modes of open files. If the child process uses files inherited from the parent, setmode function can be called to set the translation mode to the desired mode.

In MS-DOS environments, a program executed with one of the exec functions is always loaded into memory as if the "maximum allocation" in the program's executable file header is set to default value 0xFFFF. The EXEHDR utility can be used to change the maximum allocation field of a program. However, if this is done and the program is invoked with one of the exec functions, the program might behave differently from a program invoked directly from the operating-system command line or with one of the spawn functions.

Many Unix shells also offer an "exec" built-in command that replaces the shell process with the specified program.[1] "Wrapper" scripts often use this command to run a program (either directly or through an interpreter or virtual machine) after setting environment variables or other configuration. By using exec, the resources used by the shell program do not need to stay in use after the program is started. [2]

A computer process terminates its execution by making an exit system call. More generally, an exit in a multithreading environment means that a thread of execution has stopped running. The operating system reclaims resources (memory, files, etc.) that were used by the process. The process is said to be a dead process after it terminates.

In modern computer operating systems, a process (or task) may wait on another process to complete its execution. In most systems, a parent process can create an independently executing child process. The parent process may then issue a wait system call, which suspends the execution of the parent process while the child executes. When the child process terminates, it returns an exit status to the operating system, which is then returned to the waiting parent process. The parent process then resumes execution.

Fork is the name of the system call that the parent process uses to "divide" itself ("fork") into two identical processes. After calling fork(), the created child process is actually an exact copy of the parent - which would probably be of limited use - so it replaces itself with another process using the system call exec().

In computing, kill is a command that is used in several popular operating systems to request the termination of a process that is currently running on the system.