answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

What is a computer viruses?

Firstly, it should be 'What are computer viruses?', or 'What is a computer virus?'. But to answer the question, a virus is a a harmful or malicious script or code which may harm your computer. These should not be confused with Trojans or Worms.

TrojansTrojans horses are just like in the story of troy: They are something bad wrapped up in something good. You may be downloading a video from the internet and get the video, but with it will come a device that will attempt to hack your computer or get you to buy some piece of software for a very high price. A Trojan horse is a file that appears harmless until executed.

A good example is WinAntiVirus, a Trojan that comes bundled with a download that you, yourself wanted to download. It convinces you that there are hundreds of viruses on your computer, that this "new and efficient" program can detect. It will try and make you buy the full WinAntiVirus for hundreds of dollars or pounds, and when you buy it the whole thing clears off of your system, leaving you confused with empty pockets. Something even more shocking is that the person who owns WinAntiVirus makes nearly 6 million dollars (3 and a half million pounds) every year. Bear in mind that YOU MUST DOWNLOAD THE TROJAN FOR IT TO GET ONTO YOUR SYSTEM. Most good antivirus systems will get rid of these trojans.

VirusesA computer virus is a script that can copy itself and infect a computer without permission or knowledge of the user. However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

In easier language, viruses can copy themselves, and those copies can copy themselves, but all copies can do the same thing-usually destroy files (which could be critical files) or hack the system (attempting to obtain personal details).

WormsFinally, a worm is the most independent. A worm can spread itself to other computers without the user actually doing anything. A good example is an email worm. An email worm comes in an email, and as soon as the user opens it the worm duplicates the email, sending it to all contacts on the users list. When those users open it the same thing happens, so the link can go on forever. Sometimes they are harmless, but it is more common that they delete files-causing a nuisance to the user. In some cases the worm may permanently shut down your computer. Worms usually come in the form of Spam.

What is the Brontok virus?

A computer worm that infects Windows and emails itself to addresses harvested from the infected computer. Brontok Virus came from Indonesia. It arrives as an attachment of e-mail named kangen.exe ("kangen" word itself means "I miss you so much"). When Brontok is first run, it copies itself to the user's application data directory. It then sets itself to start up with Windows, by creating a registry entry in the HKLM\Software\Microsoft\Windows\CurrentVersion\Run registrykey. It disables the Windows Registry Editor (regedit.exe)and modifies Windows Explorer settings. It removes the option of "Folder Options" in the Tools menu so that the hidden files, where it is concealed, are not easily accessible to the user. It also turns off Windows firewall. In some variants, when a window is found containing certain strings (such as "application data") in the window title, the computer reboots. User frustration also occurs when an address typed into Windows Explorer is blanked out before completion. Using its own mailing engine, it sends itself to email addresses it finds on the computer, even faking the own user's email address as the sender. The computer also restarts when trying to open DOSwindow (Command Prompt) in Windows and prevents user from downloading files. It also pop ups the default Web browser and loads a web page (HTML) which is located in the "My Pictures" (or on Windows Vista, "Pictures") folder. It create .exe files in folders usually named as folder itself (..\documents\documents.exe)includes all mapped network drives.

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

How do you stop the internet service in the client xp system?

You can stop Network Service in Services. In this case nobody can have network commutication on that PC.

How do you get rid of the blood hound virus if you have ZoneAlarm Secruity Suite Zonelabs?


In case your computer got infected, try the following:

  • Get an antivirus program (if you don't have one already)
  • Update your antivirus
  • Scan all your computer and delete, repair or quarantine the infected files.

What is a computer virus?

Virus is the programming file....

A computer "virus" is a program that runs on your computer doing things you would not want it to do. Typically, this will involve doing damage to your hard drive, or sending mail without your permission. A virus gets on to your computer usually when you connect to the Internet. Browsing the Internet sometimes calls for small programs to be downloaded to your computer, and they run there to help make the whole thing you are looking at go quicker or easier. Some of these, however have been put there to drop a little "extra" program onto your system, which will then deliberately mess things up. You can sometimes have a virus that hasn't yet hurt anything, but is waiting for a moment or date in time when it will be activated. The best way to insure that you don't have a virus is to buy virus scan software, have it on your system, and have it scanning your system periodically. This virus scan software can delete virus's automatically, and prevent new ones from getting onto your system. A virus is code that duplicates itself through a host in another words a computer. Viruses alter or delete files and other data. They also can send them selves to other computers via the infected computers email or network. A virus is code that tries to travel from computer to computer by attempting to copy itself, hide itself, and send itself to others. Most of the time, viruses will also have harmful effects, depending on what the exact virus is. One hypothetical example is a virus that changes your Windows user password to "slug bug".

Infection by viruses and other harmful software can be prevented largely by the use of specialized software and by not running any programs unless you're absolutely sure of what they are, especially ones that attempt to be downloaded to your computer from websites, or in email.

Note that not all harmful software is technically a virus; only ones that attempt to become duplicated and spread across multiple computers. A computer virus is a malicious software that enters your computer via email or downloading files.

A parasitic program written intentionally to enter a computer without the users permission or knowledge. The word parasite is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some virus's do little but replicate others can cause serious damage or effect program and system performance. A virus should never be assumed harmless and left on a system." -Symantec

A functional definition of a computer virus must include the fact that it creates damage to the computer system "infected"; either inadvertently or deliberately. This definition is somewhat simplified and does not cover all virus types, but is sufficient to show the major differences between viruses and so called "Trojan" programs, which is that the virus replicates, but the Trojan program does not. A computer virus is a software that enters your computer via email or downloading. A computer virus can be classified as any program or other piece of code that is written to disrupt the normal operation of a computer. The severity of the disruption ranges from minor annoyances, like displaying silly or distracting messages, to very destructive. Listing all the possible symptoms that a virus can cause is outside the scope of this question, but suffice it to say that a majority of them are towards the destructive end of the scale. In order to protect your computer from viruses, you must ensure you have an anti virus program installed, and that it is constantly updated. Some of the more common anti virus programs are Norton Anti Virus, McAfee Anti Virus, AVG, and Trend Micro to name a few. Regardless of which software you are using, or choose to install, they all need to be updated at least daily. These updates contain new and updated virus signatures. Without these updates, the software will be unable to detect newer viruses as they come out. In addition to installing anti virus software on your PC, you must also make sure your operating system is up to date. If you are using a Microsoft Windows operating system, you should regularly check windows update for updates, and install all the critical updates. Many viruses spread through security vulnerabilities in Windows that have already been addressed by Microsoft via a patch. If you do not use Windows Update, it is possible you can be infected with a virus through one of these vulnerabilities. Having up to date anti virus software, and an up to date operating system does not guarantee that you will never be infected with a virus, but the chances are much lower. A computer virus is a software that enters your computer via email or downloading files. A computer virus is a program that harms or leads to the harm of your computer. You can get one by downloading it when viewing the Internet or double clicking on an attachment sent to you.

A virus is a computer program that piggybacks or attaches itself to application programs or other executable system software.


A computer virus is a software program that has been intentionally created to cause a user grief, spread to other computers, or destroy data on an individual's computer. To help prevent a computer from becoming infected by a virus, software developers have developed antivirus programs that stay active on the computer helping to protect it.

Is there a virus that causes the computer to beep every 15 minutes or so?

According to the following URL about NETSKY.C VIRUS it does indicate a virus: mcafee.com

Indications of Infection:

Audio payload - On Feb 26, between 6-9am the worm makes random beeping sounds with varying pitches and rhythm. Sound byte

Existence of files and registry keys as mentioned above

Unexpected network traffic

Outgoing DNS queries to one of the following hard-coded IP addresses: 145.253.2.171 151.189.13.35 193.141.40.42 193.189.244.205 193.193.144.12 193.193.158.10 194.25.2.129 194.25.2.130 194.25.2.131 194.25.2.132 194.25.2.133 194.25.2.134 195.185.185.195 195.20.224.234 212.185.252.136 212.185.252.73 212.185.253.70 212.44.160.8 212.7.128.162 212.7.128.165 213.191.74.19 217.5.97.137 62.155.255.16

I would suggest getting a virus program such as AVG from Grisoft. They have a free version available. It works great. It will detect any virus you might have and heal any it can. Those it can't heal, either turn off system restore or for some you can remove with an alternate program that AVG has developed:

To remove I would suggest visiting the following URL from Grisoft/AVG: grisoft.com

I would suggest following its instructions to the letter. If you do, you can then run AVG again and the Virus will have disappeared.

Good Luck!

What do Trojan horse viruses generally do to your computer?

Sometimes I don't think people actually read the question.

You need to run these 6 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run the vundo and combo fix

3. Run Malwarebytes Anti-Malware

4. Run the anti spyware removal programs spybot

5 Run Superantispyware

6. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

Answer:

Yes, the question was what Trojan horses do to your computer, not how to remove them.

There are various Trojans out there. They carry this name, because their job is to infiltrate your system without being detected. This can be done by reediting your registry to fool security software, or if they tag along with legitimate software.

In any case, they are there to harm you in some way. One type of Trojan opens up backdoors to your security so that it can install other harmful processes along the right. Others will keep track of your keyboard input and send the data off to hackers who will steal from you. I hope this is useful.

How do you fix your computer after a virus has deleted some files from windows?

What to do if your computer is infected with a virus.

Sometimes even an experienced user will not realise that a computer is infected with a virus. This is because viruses can hide among regular files, or camoflage themselves as standard files

There are a number of symptoms which indicate that your computer has been infected. If you notice "strange things" happening to your computer. Your computer freezes frequently or encounters errors.

Your computer slows down when programs are started.

The operating system is unable to load.

Files and folders have been deleted or their content has changed.

Your hard drive is accessed too often (the light on your main unit flashes rapidly).

Microsoft Internet Explorer freezes or functions erratically e.g. you cannot close the application window.

What you should do if you notice symptoms of infection.

Disconnect your computer from the Internet.

If your computer is connected to a Local Area Network, disconnect it.

If the computer cannot boot from the hard drive (error at startup), try to start the system in Safe Mode or from the Windows boot disk.

Before taking any action, back up all critical data to an external drive (a floppy disk, CD, flash memory, etc.).

Install antivirus software if you do not have it installed and download the latest updates.

Perform a full system scan.

In the vast majority of cases, personal computers are infected by worms, Trojan programs, or viruses. In most cases, lost data can be successfully recovered.

A good antivirus solution will provide the option to disinfect for infected objects, quarantine possibly infected objects and delete worms and Trojans. A report will provide the names of the malicious software discovered on your computer.

In some cases, you may need a special utility to recover data that have been corrupted. Visit your antivirus software vendor's site, and search for information about the virus, Trojan or worm which has infected your computer. Download any special utilities if these are available

Unfortunately, some viruses cannot be removed from infected objects. Some of these viruses may corrupt information on your computer when infecting, and it may not be possible to restore this information. If a virus cannot be removed from a file, the file should be deleted.

If you cannot boot from your hard drive (error at startup), try to boot from the Windows rescue disk. If the system can not recognize your hard drive, the virus has damaged the disk partition table. In this case, try to recover the partition table using scandisk, a standard Windows program. If this does not help, contact a computer data recovery service. Your computer vendor should be able to provide contact details for such services.

If you have a disk management utility installed, some of your logical drives may be unavailable when you boot from the rescue disk. In this case, you should disinfect all accessible drives, reboot from the system hard drive and disinfect the remaining logical drives.

Recover corrupted files and applications using backup copies after you have scanned the drive containing this data.

Check the integrity of the file system on your hard drive (using CHKDSK program) and repair file system errors. If there are a large number of errors, you must backup the most important files to removable storage media before fixing the errors.

Use other standard Windows tools, for example, the scandisk utility.

After you have removed the infection from your computer.

Perform a full system scan and if you are using XP, make sure system restore is turned off or you might infect your computer all over again.

Make sure that you have appropriately configured antivirus software installed on your computer.

Re-connect your computer to the Internet........

Which measures are you most likely to implement in order to protect against a worm or trojan horse?

Well if you are using Windows OS then i suggest you to install a very good antivirus program and keep updating the thing and have a complete scan regularly once in while. The most important thing is that whenever you download things from the internet or copy things from anybody's data drive make sure you make a through scan of the drive with your trusted antivirus program. Also if you are using MS Windows XP then right click and explore the folder instead of clicking on it, that will reduce activation of viruses to a certain level.(*primitive measures)