Should you repair if a computer virus is found?
Yes - the vast majority of computer viruses can be removed, or disabled by most anti-virus software. The trick is - to keep your anti-virus software, and definitions database up-to-date, as people are writing new viruses on a daily basis !
A virus is a piece of code that attaches itself to a program or file so it can spread from computer to computer. They can also try to damage your software, your hardware, and your files. To protect your PC from virus, you'd better enable one antivirus program on your computer.
Worm can very in size. They can be microscopic or grow to a littler over three feet in length. The most well known worm is an earthworm.
How do marine worms help the environment?
they fertilize the plants. its kind of like giving your dog or cat special nutrients food... the worms poop out plant-enriching nutrients.
How are computer virus computer worms and computer Trojan Horse different?
worm will not effect ur computer
but ,tronjent will currept all the files & disable the task manager...
>Worm viruses will duplicate your folder and end up eating your disk space and your disk memory. On tronjent or Trojan horse will make your executable files corrupt. Both are serious virus since they delete, destroy and duplicate files. In which Anti-viruses can't cope with this problem. The last option is to reformat your computer.
What is the difference between a virus and a worm?
A virus is a program that is designed to spread from file to file on a single PC, it does not intentionally try to move to another PC, and it must replicate, and execute itself to be defined as a virus.
A worm is designed to copy itself (intentionally move) from PC to PC, via networks, internet etc.
A worm doesnt need a host file to move from system to system, whereas a virus does.
So worms spread more rapidly then viruses.
The word 'Virus' has become a common term a lot of people use to refer to worms and trojans too. Which is not exactly correct.
Do worms live in wet or damp places?
yes, they prefer damp and dry areas and dont like the really wet areas so when it rains they come to the top of the soil because its to wet for them at the bottom.
You can get a computer virus in any number of ways. Viruses usually spread to your computer disguised as a useful program that you download and install yourself. Viruses can also spread by exploiting bugs in programs many people use, like Internet Explorer, in order to run code on your computer that will let the viruses install themselves. Viruses can spread this way in both emails and files.
What is characteristic of computer worms?
A computer worm is a self replicating piece of software. If you have other computers on your network some worms can send copies of itself to the other computers. Worms also consume a lot of bandwidth.
What are the major sources of computer viruses?
viruses can be destructive once it enters your computer system. You can easily noticeits effect such as slow processing-applications; presence of anonymous files, abnormal computer behavior, and the worse part will be the corruption of your files and the operating systeminstantly.These are just some of the effects of computer viruses. There are viruses, which can actuallysteal personal information on your computer without you noticing it. If there is no anti-virusinstalled on your workstation, it is very hard to prevent the replication of these programs (yes,viruses are also programs created by crazy people) and its effect on your computer.However, you can prevent file corruption and theft carried by viruses by means of assessing the protection of your computer, especially if it is connected to the Internet. Analyze and do thenecessary adjustments to your computer to avoid future problems.1. Version of operating system you are using. Are you using Windows-based operating system or Open Source Applications? If you are using Windows, then it is more prone to viruses comparedto other operating systems because most viruses target Windows computers because lots of people are using it.If this is the case, install an anti-virus program and update its system regularly to capture and prevent newer programs from entering the computer. Always update your operating system for security patches provided by the manufacturer to make it stronger and secure in fighting viruses.2. People using your computer. If you are not the only one using the computer, there are lots of possibilities that viruses may compromise your system. If possible, try to limit the number of people using your computer or never let others use it to lessen the possibility of virus intrusion.3. Websites you visit. Be careful in visiting virus prone websites such as porn websites, or other similar sites, which may be tempting but you do not know it will be the source of viruses you donot expect. Always think first before you do any act in visiting various websites.4. Email attachments. There are lots of emails we receive each day that we do not want. As a precaution, never try to open unknown emails, download its attachments, or visit their links evenif it is tempting. It might be some kind of a virus.These factors can be a great help in preventing computer viruses from disrupting the normaloperation of your computer. Always update your anti-virus program, security patches, andsoftware updates on your operating system to serve as armor in blocking unwanted programsfrom corrupting your files.
Can computer virus infect a human?
Absolutely not. Computer virii are a way of describing logic-deconstruction programs in layman's terms. They are entirely non-biological, and incapable of affecting the human system in any measurable fashion.
How do you protect my computer from the cookie virus?
Usually not. A text file should is not able to transmit a virus, which is what a cookie almost always is. It needs to be an executable file. However your internet broweser may have flaws that would cause it to execute code in a cookie... and in that way it could transmit a virus.
Why you convert binary number system to hexadecimal number system?
The hexadecimal system is a base 16 system, just as binary is base 2 and decimal is base 10. The same way that a binary system is more practical for hardware and software implications, hexadecimal is great for easy viewing of binary numbers. It's a lot easier, in the opinion of most, to look at 1FE4 than it is to get the same information as quickly from 0001111111100100. Hexadecimal numbers can also be easily converted to the seven segment display commonly used on electric signs and scoreboards to display numbers and some letters.
What do you do if your computer has been infected by a virus?
Install the operating system disk.It cleans the files you saved since last install but during the install prompt will ask you good questions to keep things in order.What do to you got to lose anywayYou are trying to get back the system.
Start up the system in safe mode. It worked for me!!
There are three most common solutions which i practise. First one is to install operating system on second partition (bare sistem only with antivurs), (works with XP/2000) and clean your infected partition, after cleaning your virus on infected partition you can safley remove your second system (or leave it for other time :), second one is to install Linux on other partition and clean it safely from there (similar as the first solution), and third one is to unhook your hard drive and attach it to other uninfected computer as slave drive and disinfect it from there (most common and simplest solution).
-dmc
For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).
This is the Microsoft virus line, the call is free if you call them they will walk you though the steps for virus removal
Get a boot disk with a virus scan program on it.
If you're using XP - turn the computer on, when the windows screen comes up, unplug the computer. plug it back in, turn it on, and theres a choice that comes up to use the last good configuration
Other OS's - I don't know
Prevention and treatment of the computer worms?
Sadly, the most effective way to mitigate computer worms and virus attacks it to not connect your computer to the Internet. If you do connect to the Internet, however, use the best anti-virus software you can find, and run it regularly. Further, do not open files from unknown sources, no matter how tempting they are.
Can Movie Star Planet give your computer virus?
It all depends on the site security settings. If you receive a virus it may not be specifically from the site itself per say, you will most likely receive it from the movie or whatever it is that you download from the site.
None, worms are like snakes have no legs and use circular muscles that contract and relax to move. They actually greatly help soil conditions.
What happens when you get the ILOVEYOU computer virus?
What are the top 10 viruses of the computer?
The top ten viruses are:
1- Stuxnet (2009 - Present)
It is built and designed mainly to target industrial system. The United States of America used it to infect a nuclear Powerplant in Iran causing it to shutdown with major radiation leaks inside the powerplant itself.
2- Conflikter (2009 - Present)
This worm crawled its way into millions of Windows-based PCs around the world, creating a massive botnet army of remotely controlled computers capable of stealing financial data and other information.
3- agent.btz (2008 - 2009)
This piece of malware's claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command.
4- Zeus (2010 - Present)
There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today's cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents.
5- Poison Ivy (2005)
PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user's computer. Malware like PoisonIvy is known as a "remote access trojan," because it provides full control to the perpetrator through a backdoor.
6- Mydoom (2005)
MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.
7- Fizzer (2003)
Just a normal worm but a very successfull one...
8- Code Red (2001)
Compared to modern malware, Code Red seems like an almost kinder, gentler version of a threat. But when it swept across computers worldwide in 2001.
9- Love Letter/I love you :L (2001)
Yes... It was a love letter that infected computers and deleted the OS of it...
10- Vmware Trojan (Present)
Latest virus that claims to have infected over 50,000 Windows based computers and over 200,000 Macs.
How can you block your computer from a virus?
download a pop up blocker from yahoo or google
== == If it is spyware a pop up blocker will not stop the popups
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
What are number systems use in computer to store data and perform calculations?
Binary number system ,which has only two digits 0 and 1.
What does a computer worm do to a computer?
It can do a number of things. First it can crash your computer and make you lose all of your data. It can also make you download unnessisary protection software. If it is really bad it can ruin your computer forever.
Who discovered the computer virus at first?
The first virus was made in Chauburji, Lahore, Pakistan, 1986
Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.