answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

What key do you press at startup to display the vista advanced bot options window?

At the Windows Boot Manager

screen, select the OS you want to use the Advanced Boot Options for, then press F8

.

Where or how can you meet a computer hacker?

Computer Hackers are human too. They decide whether they like or dislike meeting up with them. They have their own traits. And a computer programmer is somewhat a computer hacker. So when you meet a computer programmer, you can ask him/her about his/her experience in hacking or computer related objects.

What do you do if your motherboard is old and you want to improve it but the RAM and CPU and other things from that old motherboard won't work for the new motherboard?

When we upgrade our motherboard we concentrate following important points to make changes in ouy PC

1 - First check that the Ram is Dimm or Simm (Too old memory )if it is Dimm Ram then you will have to check that this Ram is of 66 Buses , 100 Buses , or of 133.

Normally P1 works 66 bus ram and P2 works 100 bus ram

2 - Then come to Processor , see wether it is Slot Processor or Socket Processor

depending on the processor type you will have to get the new motherboard

For example I have a PC with a Motherboard XL 2000 and I want to change my motherboard so the Ram that is installed with XL 2000 is 64 MB 100 bus and Processor is Genuine Intel 350 Mhz (Slot Type)

I may get the other motherboard say Intel 810 C Chipset or GFXL (because) Both the motherboards support Ram with 100 bus and My Slot Processor 350 Mhz

It would be better for you to confirm by asking before purchasing new or other motherboard that what is the final range of processor that the new motherboard will support

As I change my motherboard from XL 2000 TO GFXL OR Intel 810c I will Use my own slot processor 350 Mhz that is PII Processor but I can also change My processor from 350 to 500 600 Slot processor to make my system PIII whenever I get the money.

What causes the error message 'LSA shell has encountered an error' when you connect to the Internet?

LSA Shell ErrorsThis used to be caused almost exclusively by the sasser worm. You could simple download the scan and fix from McAfee.

There is now a more common worm that sasser that replaced. It may be causing the LSA Shell error. Your most common junk antivirus such as McAfee can detect and delete sasser. Most firewalls can stop sasser. This sounds more like the womourge worm. You can find and eliminate this with the tools from Symantec.

Here is more input:

  • Although these sites are great to find help and answers some people don't keep up with the information being released every momment of every day and it is difficult to keep up with the ever so progressive virus world. Please search out as many casses of this and read all info pertaining to it before fallowing one post. You could just end up in circles over and over again.
  • The solution is easy, somewhat. I take it when you receive the LSA Shell (Export Version) notice, a few moments later the System Shutdown Count appears? Not to worry. Just restart your computer, making sure that you are, in fact, disconnected from the internet. Then click Start, click Run, and in the white box type "cmd". A black box will appear, inside the black box, after your computer's administrater's name type "shutdown -I" (when typing this, don't forget the space between the hyphen and the word "Shutdown".) and press enter. The Shutdown Setting's window will appear. In the first box, type in your computer's name and click Add. Then in the box that reads: 20 seconds, type 9999. This will increase your time on the internet to about three hours!This will give you time to download Stinger, which can be found on the McAfee website. Stinger will find and repair this problem. Simple.
Solving the LSA Shell ErrorIt's simple and not that simple. Follow the services.msc technique:

1. click start -> Run

2. type "services.msc" (without the double quotes) and press Enter.

3. Double Click "Remote Procedure Call"

4. On the "Recovery" tab, change "Shutdown Computer" to "Restart the Service" for all Failure counts ie. 1st, 2nd and subsequent.

5. Press OK.

That should be the first step to preventing it. Then download any "Blaster Worm Removal Tool" from the net and scan your system for it. This shutdown is often caused by the msblast worm. That should fix your problem.

And if it continues, just do this everytime the shutdown count begins:

1. Select Start -> Run

2. type "shutdown -a" and press Enter

That's it. This solves everything. the countdown disappears.

Preventing the WormPrevention is better than cure.

If you had internet connection firewall (ICF) enabled, this wouldn't have happened. Worms use the LSA shell security flaw to get into the remote system. Enable the ICF by:

1) Right click connections icon in the Network Connections and select properties.

2) Go to advanced and tick ICF option.

This will evade viruses from getting into the system as it blocks all incoming connection requests.

Here is more input:

  • Go to Start > Run> type services.msc and search for RPC, double click on it and on the TAB's go to Recovery, all the failure notices that say "Restar the Computer", change them to "Restart the Service", apply it and then reboot your machine. Once you reboot, it'll give the error message again, but will stop once you press ok twice, restart your machine and it shall be removed.
  • Sometimes its not sasser or the msblast worm like for my case! So the thing is to go to run. type "services.msc" then go to the option "RCP" from there another window will pop up and click the recovery tab. change all three setting to "restart the service" and reset the comp. That should do it.
NoteIf none of these solutions worked for you, you can always restore Windows by using your original discs that came with the computer.

How you can protect yourself from email virus?

There are multiple ways to protect yourself from email viruses. The first and most simple way is to not click on email attachments from unknown senders. These are most likely a virus that will infect your computer. Secondly, if your antivirus has the capability, set it to where it will automatically scan email attachments.

Beware of worms though, these things will infect your friends' computers and then send you an email making it look like it came from them when it is really a virus.

What programs do I need to run MY ps2 eyetoy cam or ps2 singstar mic?

If You Want, I Know A Website Where You Can Get A Driver (A File That Lets The Computer Pick Up A Device) For The Eyetoy, But Don't Know Anywhere For The Mic. Web Page For Eyetoy: http://www.richpsx.com/playstation2/utilities/installing_the_playstation_2_eye.htm

What is error prevention?

Try this..

www.cc.gatech.edu/classes/AY2001/cs6300_fall/Slides/testing.ppt

Difference between international and Indian number system?

Please find the difference between Indian and International number system below,

When you read a set of numbers from right end you will start it as units, tens etc... So, here is the difference in both of the number systems when you read it.

Indian Number System

Units

Tens

Hundreds

Thousands

Ten Thousands

Lakhs

Ten Lakhs

Crores

Ten Crores

International number system

Units

Tens

Hundreds

Thousands

Ten Thousands

Hundred Thousands

Millions

Ten Millions

hundred Millions

Billions

Ten Billions

hundred Billions

Why does a computer use the binary number system?

It is easier to store data and instructions as a series of two-valued (binary) states. These may be holes or no holes in the cards or paper tapes of the 1960s and 70s, or magnetised and not magnetised states (for magnetic tapes), pits and no pits for CDs and so on.

It is possible, in theory , to store information as a set of different levels (of voltage or whatever) but these will degrade over time. The difference between two extreme values is the most robust and so carries the lowest risk of data corruption or errors.

How do you remove Warning visiting this site may harm your computer?

I got rid of it with HiJackThis. You have to be careful not to remove things that are needed though. if you're not sure what it is for it's easy to google it and find out.

What aspects of you life do not involve computers?

Brewing a cup of coffee, would be one daily activity that doesn't involve a computer.

By brewing a cup of coffee, you need a coffee machine... a machine has tons of computers

the right answer was ofcouse: love.

What are the features of the Reading First initiative?

Reading First provides incentives to schools and teachers who are helping students develop their reading skills at an earlier age through grants and recognition programs.

How quantum computers work?

Growth in computer technology, starting from valve computers till quantum computers

What different computers are there?

well theres dell, gateway (bought out e machines) alien ware (gaming) unipaq and that all i can think of

Advantages of binary number system?

The base-2 (binary) system is simpler than a system based on any higher integer. In a way, it is the simplest possible number system.

What are the Advantages of timesharing system?

A timeshare is a system that allows families to use a condo at specific times of the year. Each family pays toward the cost of the condo, and each group gets to use it whenever it is unoccupied. This allows people to afford a vacation property without taking on the entire cost.