answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Definition of virus?

Virus is software which is enter up & destry of computer functional pogramma

Ten most dreadful viruses that had happened in recent years?

# W32/Netsky # Troj/Pushdo # W32/Traxg # Troj/Mdrop # Mal/Iframe # Troj/Agent # W32/Mytob # Troj/Pushu # W32/MyDoom # W32/Zafi

How do you get rid of I-worm Sober E in a winsys32 file?

You can try using The Cleaner 4.1 (Evaluation version) to scan your computer for viruses. It picks up a lot of things and has a fairly large database. I scanned and it picked up 54 things, most of which I wasn't even aware I had.

You can download it here:http://www.moosoft.com/products/cleaner/download/

Just remember to delete the items in the quarantine.

Name five computer viruses?

Answer

There are three main types of viruses, complex, rod and geometric. There are many more but all the others are either subtypes or strains of those three or cover a very small number of viruses. However if you want to know how many different viruses there are the answer would be in the billions.

Viruses can be categorized on the following bases:

  • On the basis of the type of nuclear material they carry:
    • a) DNA virus
    • b) retrovirus or RNA virus
  • On the basis of morphology (shape):
    • a) helical
    • b) Complex
    • c) Enveloped
    • d) Icosahedron

Different types of computers?

Laptops, Iphone, Droid, any kind of phone now days. Ipods and Ipads "Personal Computers" :) you gotta have them though

Why using number system in computer?

number system is used in microprocessor yet computer is not started . Number are given to microprocessor and it perform the action as per given instruction.number system r used to as 001 110 1001

Can NTFS permissions be easily circumvented when you have physical access to a computer yes or no?

Yes. A Linux boot disk will allow you to change passwords or completely bypass Windows security and access the data directly.

How many computer crime is there?

The answer for this is Downloeding music, videos, and other things of f the computer

How do you get rid of wininnet.dll virus?

First you need to find out what this dll file has attached itself to. If you go to run and enter procexp then hit enter. Go to find dll or handle and enter wininnet.dll. It will show you the processes and handle that it is attached to. Right click on the process and kill the process if it's not a necessary process for your computer to run. Then you can delete that dll. If it's something like Winlogon or Explorer (which I just dealt with), then you will need to right click on the process and go to properties. Listed under the threads will be all the dll's associated. You will need to right click and kill every instance of the wininnet.dll. You will also need to right click on the handle and kill that process. Then you should be able to delete or move that dll to another location. If you can't delete it, simply move it to a new folder. I created a "virus" folder in My documents. Then rebooted and was able to delete that dll damed virus. Good luck.

What is gain gator?

as far as i know GAIN.Gator is used as a video/media player, however this is known to be SPY/MALWARE and is a rather nasty one at that. never accept gator from anywhere.

How is privacy affected by computer technology?

Although computer technology makes data easier to compile, combine, and circulate, it dramatically increases potential violations of personal privacy and security.

What are the possible actions of a computer virus?

When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.

Why you use binary number system?

Modern computers run on binary languages. The only two things your computer actually understand are 0 and 1. The operating system converts everything else into 0's and 1's for the computer to process it. So without the binary system, anything done on a computer would have to be done by hand.

How can a virus enter a computer having antivirus software installed in it?

a virus can enter your protected computer by being powerful enough to get inside your firewall.

What might cause a computer to not save pictures?

It depends on what you are trying to do. If you right click on an image and it errors saying the image is protected--that has nothing to do with your computer--the owner of the image is protecting it from being copied. If you can right click on an image and you get the "save as" option, you can usually choose the format (jpg or bmp are the most common). Pay attention to what folder the image is being saved in. It may be as simple as you not being able to find the saved image.

Is reg cleaner safe?

A trusted reg cleaner is Intel Software Partner, RegInOut

How do you remove the issas.exe computer virus?

(Same as How Do You Remove a Computer Virus)There are many different kinds of "computer virus'." Many people confuse the terms: malware, spyware, and adware, assuming they all are the same as a "Computer Virus." This is not so, though many of such kinds of malicious applications can be quite easily removed.

Step 1: Download an Anti-Virus application. Good examples of this are:

  • Spybot Search and Destroy
  • Microsoft Windows Defender
  • Norton 360 (not free)
  • AVG Anti-Virus
  • Avast!
  • Trend Micro
  • Etc.

The list goes on, and on... You can see the corresponding links to each recommended anti-virus application in the "Related Links" below. (Note: There has been debate over the possible problems that may arise with having multiple anti-virus applications installed, yet this has not been widely confirmed and is mainly an individual problem with few computers.)

Step 2: Download and Install updates for the installed anti-virus application and then run a "Full Scan" of your computer to attempt and detect any malicious activity.

Step 3: Follow the instructions given by the individual anti-virus application to remove the malicious application(s).

Step 4: Install security updates on your computer. Separate from updates for individual anti-virus applications, it is highly recommended you download and install updates for your operating system. A corrosponding link is given in the links below for Microsoft Windows updates.

Step 5: Stay safe by downloading and installing proper security tools. These tools could include:

  • CCleaner (Cookies and Registry Cleaner)
  • McAfee Site Advisor (Idenitifies Malicious Websites)
  • WOT (Identifies Malicious Websites)

The corresponding links are given below under "Related Links" as well.

Other s
  • Well you can't just ask how to remove a computer virus. There are thousands of variations of viruses. Each one having different code and as such some are harder or easier to remove. To remove a virus software quarantines the file that is infected, delete the file, clean the infected file of the virus or deny the virus access.
  • If you suspect or if you confirm that your computer is infected with a virus, obtain current antivirus software. For more information about antivirus software vendors, click the following article number to view the article in the Microsoft Knowledge Base. Antivirus software helps protect your computer against most viruses, worms, trojans, and other malicious programs. Many computers come with antivirus software installed. You can also purchase antivirus software, and you can install it yourself. In this scenario, you must also keep the antivirus software up to date.
  • A firewall is software or hardware that creates a protective barrier between the computer and potentially damaging content on the Internet. A firewall helps guard the computer against malicious users and against many computer viruses and computer worms. Use a firewall only for network connections that you use to connect directly to the Internet. For example, use a firewall on a single computer that is connected to the Internet directly with a cable modem, with a DSL modem, or with a dial-up modem. You can use the same network connection to connect to the Internet and to a home network or to an office network. In this scenario, use a router or a firewall that prevents a computer that is connected to the Internet from connecting to the shared resources on the home computer or on the office computer. Do not use a firewall on network connections that you use to connect to your home network or to your office network unless the firewall can be configured to open ports only for your home network or for your office network.
  • Updates help shield your computer from vulnerabilities, from viruses, from worms, and from other threats as they are discovered. Steps that you can take to update your computer include the following:

    Install updates for Windows and for Windows components such as Internet Explorer, Outlook Express, and Windows Media Player

    Install updates for Microsoft Office programs.

    Install updates for other third-party programs on your computer. For more information, contact the manufacturer of the third-party program. Additionally, install security updates for other Microsoft products that are on your computer, such as Internet Information Services (IIS), Microsoft SQL Server, Microsoft Exchange Server, and other products.

    If you are running a version of Microsoft Outlook that is earlier than version 2002, make sure that the Outlook e-mail security update is installed on the computer. For more information about the Outlook e-mail security update

    If you are running Outlook Express, use caution when you open e-mail attachments.

    Disable active scripting in Outlook and in Outlook Express.

  • Steps to remove a virus: Visit the Protect Your PC site and install the latest updates.

    If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.

    Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses

Is throwing bananas at people illegal?

no because you arent going to hurt them

More accurate:Throwing anything at a person is illegal.

It is know as assault if it causes no physical harm

If it causes injury of any kind the crime is more serious.

Of course many people would not press charges if it were done as a joke, but they can and it is a crime.

In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so.

I understand what you mean, and the answer to that is FALSE.

How do you fix your computer runs very slow after you clean a virus?

That means that there is still an issue. You will probably need to re-format your hard drive and re-install your OS (operating system).

Meaning of bounties in computer crime?

bounties is a reward offerd to catch offenders of cyber crime,those who spread worms,viruses

Why do computers use the floating point system for number represantation?

Computers need a method to store decimals. More to the point, they need a method to manage very large and very small numbers - numbers that we would normally show in scientific notation.