Why using number system in computer?
number system is used in microprocessor yet computer is not started . Number are given to microprocessor and it perform the action as per given instruction.number system r used to as 001 110 1001
Can NTFS permissions be easily circumvented when you have physical access to a computer yes or no?
Yes. A Linux boot disk will allow you to change passwords or completely bypass Windows security and access the data directly.
How many computer crime is there?
The answer for this is Downloeding music, videos, and other things of f the computer
Beth Littleford
How do you get rid of wininnet.dll virus?
First you need to find out what this dll file has attached itself to. If you go to run and enter procexp then hit enter. Go to find dll or handle and enter wininnet.dll. It will show you the processes and handle that it is attached to. Right click on the process and kill the process if it's not a necessary process for your computer to run. Then you can delete that dll. If it's something like Winlogon or Explorer (which I just dealt with), then you will need to right click on the process and go to properties. Listed under the threads will be all the dll's associated. You will need to right click and kill every instance of the wininnet.dll. You will also need to right click on the handle and kill that process. Then you should be able to delete or move that dll to another location. If you can't delete it, simply move it to a new folder. I created a "virus" folder in My documents. Then rebooted and was able to delete that dll damed virus. Good luck.
Spyware
as far as i know GAIN.Gator is used as a video/media player, however this is known to be SPY/MALWARE and is a rather nasty one at that. never accept gator from anywhere.
How is privacy affected by computer technology?
Although computer technology makes data easier to compile, combine, and circulate, it dramatically increases potential violations of personal privacy and security.
What are the possible actions of a computer virus?
When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.
Why you use binary number system?
Modern computers run on binary languages. The only two things your computer actually understand are 0 and 1. The operating system converts everything else into 0's and 1's for the computer to process it. So without the binary system, anything done on a computer would have to be done by hand.
How can a virus enter a computer having antivirus software installed in it?
a virus can enter your protected computer by being powerful enough to get inside your firewall.
What might cause a computer to not save pictures?
It depends on what you are trying to do. If you right click on an image and it errors saying the image is protected--that has nothing to do with your computer--the owner of the image is protecting it from being copied. If you can right click on an image and you get the "save as" option, you can usually choose the format (jpg or bmp are the most common). Pay attention to what folder the image is being saved in. It may be as simple as you not being able to find the saved image.
How do you remove the issas.exe computer virus?
Step 1: Download an Anti-Virus application. Good examples of this are:
The list goes on, and on... You can see the corresponding links to each recommended anti-virus application in the "Related Links" below. (Note: There has been debate over the possible problems that may arise with having multiple anti-virus applications installed, yet this has not been widely confirmed and is mainly an individual problem with few computers.)
Step 2: Download and Install updates for the installed anti-virus application and then run a "Full Scan" of your computer to attempt and detect any malicious activity.
Step 3: Follow the instructions given by the individual anti-virus application to remove the malicious application(s).
Step 4: Install security updates on your computer. Separate from updates for individual anti-virus applications, it is highly recommended you download and install updates for your operating system. A corrosponding link is given in the links below for Microsoft Windows updates.
Step 5: Stay safe by downloading and installing proper security tools. These tools could include:
The corresponding links are given below under "Related Links" as well.
Other sInstall updates for Windows and for Windows components such as Internet Explorer, Outlook Express, and Windows Media Player
Install updates for Microsoft Office programs.
Install updates for other third-party programs on your computer. For more information, contact the manufacturer of the third-party program. Additionally, install security updates for other Microsoft products that are on your computer, such as Internet Information Services (IIS), Microsoft SQL Server, Microsoft Exchange Server, and other products.
If you are running a version of Microsoft Outlook that is earlier than version 2002, make sure that the Outlook e-mail security update is installed on the computer. For more information about the Outlook e-mail security update
If you are running Outlook Express, use caution when you open e-mail attachments.
Disable active scripting in Outlook and in Outlook Express.
If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.
Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses
Is throwing bananas at people illegal?
no because you arent going to hurt them
More accurate:Throwing anything at a person is illegal.It is know as assault if it causes no physical harm
If it causes injury of any kind the crime is more serious.
Of course many people would not press charges if it were done as a joke, but they can and it is a crime.
I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so.
I understand what you mean, and the answer to that is FALSE.
How do you fix your computer runs very slow after you clean a virus?
That means that there is still an issue. You will probably need to re-format your hard drive and re-install your OS (operating system).
Meaning of bounties in computer crime?
bounties is a reward offerd to catch offenders of cyber crime,those who spread worms,viruses
Why do computers use the floating point system for number represantation?
Computers need a method to store decimals. More to the point, they need a method to manage very large and very small numbers - numbers that we would normally show in scientific notation.
Information is never really gone unless something is written over the physical space that it resided. Anyone who wanted to find it would be able to using data recovery tools. Depending on how important knowing if someone was using a computer is to someone, they may have a tool in cost and efficiancy, that supercedes your tool for deleting the files.
How do you remove Trojan horse VB ECR Can't remove using AVG?
try download a trial version of panda virus scan www.pandasoftware.com get there better one under the consumer side, give u a 1 month trail. turn it all on o maximum sensitvty under theseetign for both real time and scannng make sure to have it as hi as it will detech on hristic and have it enabled. works well
If a activate a game on your computer can you activate it on another computer?
depends on the game
some can only be activated on 1 computer
some can only be activated on 3 computers
the rest dont give a crap
it should say on the box
Why is computer crime harmful?
Computer crime can destroy valuable data, steal funds, steal identity information for illegal purposes or block use of the computer and computer networks. All these are harmful
This is the free Microsoft anti-virus line. This is a totally free service that will walk you through the virus removal steps: For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).
These are head wrecking. A solution that works if your not on a big network that can afford a small bit of downtime is to change all the network ids. Say you had 5 machines: 192.168.2.11
192.168.3.12
192.168.4.13
192.168.5.14
With each subnet being 255.255.255.0 Now start your scans. Usually I find that as soon as a virus scan starts, a worm will try to jump to another machine. This change in IP has often being enough, in my own experience, to keep the worm on a single machine long enough to get rid of it. If you do this right, you wont lose very much network facilities - if any -. Though it also depends on a few things such as what hardware you are using such as a router, hub, switch. If your doing ics through a machine or if your ethernet is just going to a router or something... anyway if you get really stuck drop me a line and I'll help you out.