answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Why using number system in computer?

number system is used in microprocessor yet computer is not started . Number are given to microprocessor and it perform the action as per given instruction.number system r used to as 001 110 1001

Can NTFS permissions be easily circumvented when you have physical access to a computer yes or no?

Yes. A Linux boot disk will allow you to change passwords or completely bypass Windows security and access the data directly.

How many computer crime is there?

The answer for this is Downloeding music, videos, and other things of f the computer

How do you get rid of wininnet.dll virus?

First you need to find out what this dll file has attached itself to. If you go to run and enter procexp then hit enter. Go to find dll or handle and enter wininnet.dll. It will show you the processes and handle that it is attached to. Right click on the process and kill the process if it's not a necessary process for your computer to run. Then you can delete that dll. If it's something like Winlogon or Explorer (which I just dealt with), then you will need to right click on the process and go to properties. Listed under the threads will be all the dll's associated. You will need to right click and kill every instance of the wininnet.dll. You will also need to right click on the handle and kill that process. Then you should be able to delete or move that dll to another location. If you can't delete it, simply move it to a new folder. I created a "virus" folder in My documents. Then rebooted and was able to delete that dll damed virus. Good luck.

What is gain gator?

as far as i know GAIN.Gator is used as a video/media player, however this is known to be SPY/MALWARE and is a rather nasty one at that. never accept gator from anywhere.

How is privacy affected by computer technology?

Although computer technology makes data easier to compile, combine, and circulate, it dramatically increases potential violations of personal privacy and security.

What are the possible actions of a computer virus?

When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.

Why you use binary number system?

Modern computers run on binary languages. The only two things your computer actually understand are 0 and 1. The operating system converts everything else into 0's and 1's for the computer to process it. So without the binary system, anything done on a computer would have to be done by hand.

How can a virus enter a computer having antivirus software installed in it?

a virus can enter your protected computer by being powerful enough to get inside your firewall.

What might cause a computer to not save pictures?

It depends on what you are trying to do. If you right click on an image and it errors saying the image is protected--that has nothing to do with your computer--the owner of the image is protecting it from being copied. If you can right click on an image and you get the "save as" option, you can usually choose the format (jpg or bmp are the most common). Pay attention to what folder the image is being saved in. It may be as simple as you not being able to find the saved image.

Is reg cleaner safe?

A trusted reg cleaner is Intel Software Partner, RegInOut

How do you remove the issas.exe computer virus?

(Same as How Do You Remove a Computer Virus)There are many different kinds of "computer virus'." Many people confuse the terms: malware, spyware, and adware, assuming they all are the same as a "Computer Virus." This is not so, though many of such kinds of malicious applications can be quite easily removed.

Step 1: Download an Anti-Virus application. Good examples of this are:

  • Spybot Search and Destroy
  • Microsoft Windows Defender
  • Norton 360 (not free)
  • AVG Anti-Virus
  • Avast!
  • Trend Micro
  • Etc.

The list goes on, and on... You can see the corresponding links to each recommended anti-virus application in the "Related Links" below. (Note: There has been debate over the possible problems that may arise with having multiple anti-virus applications installed, yet this has not been widely confirmed and is mainly an individual problem with few computers.)

Step 2: Download and Install updates for the installed anti-virus application and then run a "Full Scan" of your computer to attempt and detect any malicious activity.

Step 3: Follow the instructions given by the individual anti-virus application to remove the malicious application(s).

Step 4: Install security updates on your computer. Separate from updates for individual anti-virus applications, it is highly recommended you download and install updates for your operating system. A corrosponding link is given in the links below for Microsoft Windows updates.

Step 5: Stay safe by downloading and installing proper security tools. These tools could include:

  • CCleaner (Cookies and Registry Cleaner)
  • McAfee Site Advisor (Idenitifies Malicious Websites)
  • WOT (Identifies Malicious Websites)

The corresponding links are given below under "Related Links" as well.

Other s
  • Well you can't just ask how to remove a computer virus. There are thousands of variations of viruses. Each one having different code and as such some are harder or easier to remove. To remove a virus software quarantines the file that is infected, delete the file, clean the infected file of the virus or deny the virus access.
  • If you suspect or if you confirm that your computer is infected with a virus, obtain current antivirus software. For more information about antivirus software vendors, click the following article number to view the article in the Microsoft Knowledge Base. Antivirus software helps protect your computer against most viruses, worms, trojans, and other malicious programs. Many computers come with antivirus software installed. You can also purchase antivirus software, and you can install it yourself. In this scenario, you must also keep the antivirus software up to date.
  • A firewall is software or hardware that creates a protective barrier between the computer and potentially damaging content on the Internet. A firewall helps guard the computer against malicious users and against many computer viruses and computer worms. Use a firewall only for network connections that you use to connect directly to the Internet. For example, use a firewall on a single computer that is connected to the Internet directly with a cable modem, with a DSL modem, or with a dial-up modem. You can use the same network connection to connect to the Internet and to a home network or to an office network. In this scenario, use a router or a firewall that prevents a computer that is connected to the Internet from connecting to the shared resources on the home computer or on the office computer. Do not use a firewall on network connections that you use to connect to your home network or to your office network unless the firewall can be configured to open ports only for your home network or for your office network.
  • Updates help shield your computer from vulnerabilities, from viruses, from worms, and from other threats as they are discovered. Steps that you can take to update your computer include the following:

    Install updates for Windows and for Windows components such as Internet Explorer, Outlook Express, and Windows Media Player

    Install updates for Microsoft Office programs.

    Install updates for other third-party programs on your computer. For more information, contact the manufacturer of the third-party program. Additionally, install security updates for other Microsoft products that are on your computer, such as Internet Information Services (IIS), Microsoft SQL Server, Microsoft Exchange Server, and other products.

    If you are running a version of Microsoft Outlook that is earlier than version 2002, make sure that the Outlook e-mail security update is installed on the computer. For more information about the Outlook e-mail security update

    If you are running Outlook Express, use caution when you open e-mail attachments.

    Disable active scripting in Outlook and in Outlook Express.

  • Steps to remove a virus: Visit the Protect Your PC site and install the latest updates.

    If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.

    Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses

Is throwing bananas at people illegal?

no because you arent going to hurt them

More accurate:Throwing anything at a person is illegal.

It is know as assault if it causes no physical harm

If it causes injury of any kind the crime is more serious.

Of course many people would not press charges if it were done as a joke, but they can and it is a crime.

In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so.

I understand what you mean, and the answer to that is FALSE.

How do you fix your computer runs very slow after you clean a virus?

That means that there is still an issue. You will probably need to re-format your hard drive and re-install your OS (operating system).

Meaning of bounties in computer crime?

bounties is a reward offerd to catch offenders of cyber crime,those who spread worms,viruses

Why do computers use the floating point system for number represantation?

Computers need a method to store decimals. More to the point, they need a method to manage very large and very small numbers - numbers that we would normally show in scientific notation.

If you use the system software to remove all files from your computer can an individual still be able to find out how long the computer has been in use?

Information is never really gone unless something is written over the physical space that it resided. Anyone who wanted to find it would be able to using data recovery tools. Depending on how important knowing if someone was using a computer is to someone, they may have a tool in cost and efficiancy, that supercedes your tool for deleting the files.

How do you remove Trojan horse VB ECR Can't remove using AVG?

try download a trial version of panda virus scan www.pandasoftware.com get there better one under the consumer side, give u a 1 month trail. turn it all on o maximum sensitvty under theseetign for both real time and scannng make sure to have it as hi as it will detech on hristic and have it enabled. works well

If a activate a game on your computer can you activate it on another computer?

depends on the game

some can only be activated on 1 computer

some can only be activated on 3 computers

the rest dont give a crap

it should say on the box

Why is computer crime harmful?

Computer crime can destroy valuable data, steal funds, steal identity information for illegal purposes or block use of the computer and computer networks. All these are harmful

How do you identify a worm on your network that seems to be performing a DNS server attack and moving from machine to machine?

This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

These are head wrecking. A solution that works if your not on a big network that can afford a small bit of downtime is to change all the network ids. Say you had 5 machines: 192.168.2.11

192.168.3.12

192.168.4.13

192.168.5.14

With each subnet being 255.255.255.0 Now start your scans. Usually I find that as soon as a virus scan starts, a worm will try to jump to another machine. This change in IP has often being enough, in my own experience, to keep the worm on a single machine long enough to get rid of it. If you do this right, you wont lose very much network facilities - if any -. Though it also depends on a few things such as what hardware you are using such as a router, hub, switch. If your doing ics through a machine or if your ethernet is just going to a router or something... anyway if you get really stuck drop me a line and I'll help you out.