Virus is software which is enter up & destry of computer functional pogramma
Ten most dreadful viruses that had happened in recent years?
# W32/Netsky # Troj/Pushdo # W32/Traxg # Troj/Mdrop # Mal/Iframe # Troj/Agent # W32/Mytob # Troj/Pushu # W32/MyDoom # W32/Zafi
How do you get rid of I-worm Sober E in a winsys32 file?
You can try using The Cleaner 4.1 (Evaluation version) to scan your computer for viruses. It picks up a lot of things and has a fairly large database. I scanned and it picked up 54 things, most of which I wasn't even aware I had.
You can download it here:http://www.moosoft.com/products/cleaner/download/
Just remember to delete the items in the quarantine.
There are three main types of viruses, complex, rod and geometric. There are many more but all the others are either subtypes or strains of those three or cover a very small number of viruses. However if you want to know how many different viruses there are the answer would be in the billions.
Viruses can be categorized on the following bases:
Laptops, Iphone, Droid, any kind of phone now days. Ipods and Ipads "Personal Computers" :) you gotta have them though
Why using number system in computer?
number system is used in microprocessor yet computer is not started . Number are given to microprocessor and it perform the action as per given instruction.number system r used to as 001 110 1001
Can NTFS permissions be easily circumvented when you have physical access to a computer yes or no?
Yes. A Linux boot disk will allow you to change passwords or completely bypass Windows security and access the data directly.
How many computer crime is there?
The answer for this is Downloeding music, videos, and other things of f the computer
Beth Littleford
How do you get rid of wininnet.dll virus?
First you need to find out what this dll file has attached itself to. If you go to run and enter procexp then hit enter. Go to find dll or handle and enter wininnet.dll. It will show you the processes and handle that it is attached to. Right click on the process and kill the process if it's not a necessary process for your computer to run. Then you can delete that dll. If it's something like Winlogon or Explorer (which I just dealt with), then you will need to right click on the process and go to properties. Listed under the threads will be all the dll's associated. You will need to right click and kill every instance of the wininnet.dll. You will also need to right click on the handle and kill that process. Then you should be able to delete or move that dll to another location. If you can't delete it, simply move it to a new folder. I created a "virus" folder in My documents. Then rebooted and was able to delete that dll damed virus. Good luck.
Spyware
as far as i know GAIN.Gator is used as a video/media player, however this is known to be SPY/MALWARE and is a rather nasty one at that. never accept gator from anywhere.
How is privacy affected by computer technology?
Although computer technology makes data easier to compile, combine, and circulate, it dramatically increases potential violations of personal privacy and security.
What are the possible actions of a computer virus?
When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.
Why you use binary number system?
Modern computers run on binary languages. The only two things your computer actually understand are 0 and 1. The operating system converts everything else into 0's and 1's for the computer to process it. So without the binary system, anything done on a computer would have to be done by hand.
How can a virus enter a computer having antivirus software installed in it?
a virus can enter your protected computer by being powerful enough to get inside your firewall.
What might cause a computer to not save pictures?
It depends on what you are trying to do. If you right click on an image and it errors saying the image is protected--that has nothing to do with your computer--the owner of the image is protecting it from being copied. If you can right click on an image and you get the "save as" option, you can usually choose the format (jpg or bmp are the most common). Pay attention to what folder the image is being saved in. It may be as simple as you not being able to find the saved image.
How do you remove the issas.exe computer virus?
Step 1: Download an Anti-Virus application. Good examples of this are:
The list goes on, and on... You can see the corresponding links to each recommended anti-virus application in the "Related Links" below. (Note: There has been debate over the possible problems that may arise with having multiple anti-virus applications installed, yet this has not been widely confirmed and is mainly an individual problem with few computers.)
Step 2: Download and Install updates for the installed anti-virus application and then run a "Full Scan" of your computer to attempt and detect any malicious activity.
Step 3: Follow the instructions given by the individual anti-virus application to remove the malicious application(s).
Step 4: Install security updates on your computer. Separate from updates for individual anti-virus applications, it is highly recommended you download and install updates for your operating system. A corrosponding link is given in the links below for Microsoft Windows updates.
Step 5: Stay safe by downloading and installing proper security tools. These tools could include:
The corresponding links are given below under "Related Links" as well.
Other sInstall updates for Windows and for Windows components such as Internet Explorer, Outlook Express, and Windows Media Player
Install updates for Microsoft Office programs.
Install updates for other third-party programs on your computer. For more information, contact the manufacturer of the third-party program. Additionally, install security updates for other Microsoft products that are on your computer, such as Internet Information Services (IIS), Microsoft SQL Server, Microsoft Exchange Server, and other products.
If you are running a version of Microsoft Outlook that is earlier than version 2002, make sure that the Outlook e-mail security update is installed on the computer. For more information about the Outlook e-mail security update
If you are running Outlook Express, use caution when you open e-mail attachments.
Disable active scripting in Outlook and in Outlook Express.
If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.
Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses
Is throwing bananas at people illegal?
no because you arent going to hurt them
More accurate:Throwing anything at a person is illegal.It is know as assault if it causes no physical harm
If it causes injury of any kind the crime is more serious.
Of course many people would not press charges if it were done as a joke, but they can and it is a crime.
I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so.
I understand what you mean, and the answer to that is FALSE.
How do you fix your computer runs very slow after you clean a virus?
That means that there is still an issue. You will probably need to re-format your hard drive and re-install your OS (operating system).
Meaning of bounties in computer crime?
bounties is a reward offerd to catch offenders of cyber crime,those who spread worms,viruses
Why do computers use the floating point system for number represantation?
Computers need a method to store decimals. More to the point, they need a method to manage very large and very small numbers - numbers that we would normally show in scientific notation.