answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

What are the major sources of computer viruses?

viruses can be destructive once it enters your computer system. You can easily noticeits effect such as slow processing-applications; presence of anonymous files, abnormal computer behavior, and the worse part will be the corruption of your files and the operating systeminstantly.These are just some of the effects of computer viruses. There are viruses, which can actuallysteal personal information on your computer without you noticing it. If there is no anti-virusinstalled on your workstation, it is very hard to prevent the replication of these programs (yes,viruses are also programs created by crazy people) and its effect on your computer.However, you can prevent file corruption and theft carried by viruses by means of assessing the protection of your computer, especially if it is connected to the Internet. Analyze and do thenecessary adjustments to your computer to avoid future problems.1. Version of operating system you are using. Are you using Windows-based operating system or Open Source Applications? If you are using Windows, then it is more prone to viruses comparedto other operating systems because most viruses target Windows computers because lots of people are using it.If this is the case, install an anti-virus program and update its system regularly to capture and prevent newer programs from entering the computer. Always update your operating system for security patches provided by the manufacturer to make it stronger and secure in fighting viruses.2. People using your computer. If you are not the only one using the computer, there are lots of possibilities that viruses may compromise your system. If possible, try to limit the number of people using your computer or never let others use it to lessen the possibility of virus intrusion.3. Websites you visit. Be careful in visiting virus prone websites such as porn websites, or other similar sites, which may be tempting but you do not know it will be the source of viruses you donot expect. Always think first before you do any act in visiting various websites.4. Email attachments. There are lots of emails we receive each day that we do not want. As a precaution, never try to open unknown emails, download its attachments, or visit their links evenif it is tempting. It might be some kind of a virus.These factors can be a great help in preventing computer viruses from disrupting the normaloperation of your computer. Always update your anti-virus program, security patches, andsoftware updates on your operating system to serve as armor in blocking unwanted programsfrom corrupting your files.

Can computer virus infect a human?

Absolutely not. Computer virii are a way of describing logic-deconstruction programs in layman's terms. They are entirely non-biological, and incapable of affecting the human system in any measurable fashion.

How do you protect my computer from the cookie virus?

Usually not. A text file should is not able to transmit a virus, which is what a cookie almost always is. It needs to be an executable file. However your internet broweser may have flaws that would cause it to execute code in a cookie... and in that way it could transmit a virus.

Why you convert binary number system to hexadecimal number system?

The hexadecimal system is a base 16 system, just as binary is base 2 and decimal is base 10. The same way that a binary system is more practical for hardware and software implications, hexadecimal is great for easy viewing of binary numbers. It's a lot easier, in the opinion of most, to look at 1FE4 than it is to get the same information as quickly from 0001111111100100. Hexadecimal numbers can also be easily converted to the seven segment display commonly used on electric signs and scoreboards to display numbers and some letters.

What do you do if your computer has been infected by a virus?

Install the operating system disk.It cleans the files you saved since last install but during the install prompt will ask you good questions to keep things in order.What do to you got to lose anywayYou are trying to get back the system.

Start up the system in safe mode. It worked for me!!

There are three most common solutions which i practise. First one is to install operating system on second partition (bare sistem only with antivurs), (works with XP/2000) and clean your infected partition, after cleaning your virus on infected partition you can safley remove your second system (or leave it for other time :), second one is to install Linux on other partition and clean it safely from there (similar as the first solution), and third one is to unhook your hard drive and attach it to other uninfected computer as slave drive and disinfect it from there (most common and simplest solution).

-dmc

For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

This is the Microsoft virus line, the call is free if you call them they will walk you though the steps for virus removal

Get a boot disk with a virus scan program on it.

If you're using XP - turn the computer on, when the windows screen comes up, unplug the computer. plug it back in, turn it on, and theres a choice that comes up to use the last good configuration

Other OS's - I don't know

Prevention and treatment of the computer worms?

Sadly, the most effective way to mitigate computer worms and virus attacks it to not connect your computer to the Internet. If you do connect to the Internet, however, use the best anti-virus software you can find, and run it regularly. Further, do not open files from unknown sources, no matter how tempting they are.

Can Movie Star Planet give your computer virus?

It all depends on the site security settings. If you receive a virus it may not be specifically from the site itself per say, you will most likely receive it from the movie or whatever it is that you download from the site.

How many legs worm has?

None, worms are like snakes have no legs and use circular muscles that contract and relax to move. They actually greatly help soil conditions.

What happens when you get the ILOVEYOU computer virus?

  • It copied itself several times and hid the copies in several folders on the victim's hard drive.
  • It added new files to the victim's registry keys.
  • It replaced several different kinds of files with copies of itself.
  • It sent itself through Internet Relay Chat clients as well as e-mail.
  • It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.

What are the top 10 viruses of the computer?

The top ten viruses are:

1- Stuxnet (2009 - Present)

It is built and designed mainly to target industrial system. The United States of America used it to infect a nuclear Powerplant in Iran causing it to shutdown with major radiation leaks inside the powerplant itself.

2- Conflikter (2009 - Present)

This worm crawled its way into millions of Windows-based PCs around the world, creating a massive botnet army of remotely controlled computers capable of stealing financial data and other information.

3- agent.btz (2008 - 2009)

This piece of malware's claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command.

4- Zeus (2010 - Present)

There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today's cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents.

5- Poison Ivy (2005)

PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user's computer. Malware like PoisonIvy is known as a "remote access trojan," because it provides full control to the perpetrator through a backdoor.

6- Mydoom (2005)

MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.

7- Fizzer (2003)

Just a normal worm but a very successfull one...

8- Code Red (2001)

Compared to modern malware, Code Red seems like an almost kinder, gentler version of a threat. But when it swept across computers worldwide in 2001.

9- Love Letter/I love you :L (2001)

Yes... It was a love letter that infected computers and deleted the OS of it...

10- Vmware Trojan (Present)

Latest virus that claims to have infected over 50,000 Windows based computers and over 200,000 Macs.

How can you block your computer from a virus?

download a pop up blocker from yahoo or google

== == If it is spyware a pop up blocker will not stop the popups

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What does a computer worm do to a computer?

It can do a number of things. First it can crash your computer and make you lose all of your data. It can also make you download unnessisary protection software. If it is really bad it can ruin your computer forever.

Who discovered the computer virus at first?

The first virus was made in Chauburji, Lahore, Pakistan, 1986

Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.

What a virus cannot do on its own in computers?

Like a real world virus, computer viruses heavily rely on a "host" file in order to propagate. In the wild, if a computer virus cannot attach and inject itself into a host file, it will just roam around and eventually get destroyed by an antivirus program. Computer viruses cannot replicate without a host. Worms on the other hand are independent programs that can replicate freely without the need of a host like a virus. When it comes to lethality though, a virus is more destructive than a worm.

How do viruses occur?

u get virus' from the dumbest things

one thing is from downloads,

and another is copy and pasting files

also playing games from sites like addicting games, mofunzone, and armor games...

How many worms can a bird eat a day?

None. You should not be raising wild birds. They should be raised by their mother or left to be eaten by something else.

What is the average length of a tiger's life living in the wild?

They can live for twenty years or more.
15-25yeras
15 years
to about 10 to 15 years and in zoos they live up to 25 years old
10 to 20 years
they live up to 25 years in captivity in that long in the wild the oldest one is 35 years

How do earth worm protect themselves?

Different worms have different defence mechanisms. Some are toxic, whereas others have sharp spines (bristles) that stick into and cause pain in potential attackers.

Why you need study number system?

Human being use words and letters to speak to one another. In the same way we need to make electronic devices such as computers understand what we say or what we want it to do. So to make computer understand we use number system. We use ordinary English alphabets to type on computer but these are translated into computer language i.e. binary language.

How does a computer virus get on your machine?

It is a program or command that can get in from infected software or e-mails. You can keep these nasty and time consuming devils off of your computer by doing 3 things. Get the free firewall called Zone Alarm, Get the free program Ad-Aware and run it often. Finally get the free program Hijack this. These 3 freebies will keep trash off of your computer.

How often should you worm a puppy?

The first thing is how do you know your dog does not have worms?
Worms can be so small you can not see them or their eggs.
We actually worm our dogs to keep them healthy, but also to keep us healthy too.
The only way to absolutley know your dog has no worms is to do serial ( a few ) stool collection and have them tested.
The risk of human contmination is important.
I would advise worming your dog every 3 months with a reputable allwormer every 3 months, costs less than testing and works for dog and all in contact

How do you get rid of viruses on your computer?

When you first bought a computer it should come with CDs to repair/reinstall your computer. You need those CDs to reset your computer again to new state. If you don't want to, you can download Anti Virus Programs, such as Norton. But please keep in mind that not all Anti Virus can remove all of your viruses, some of them can be virus made programs itself.

How do computer viruses infect and spread in computer systems?

A virus has a specific string or line of code. When a virus enters a system, it is usually coded to infect a certain part of the computer, for example, the boot sector. When a virus reaches its destination, it injects the code. The virus itself isn't harmful, the code it injects is. Viruses don't replicate. Worms do that.