answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Does cartoonnetwork give you a virus?

Any website can give you a computer virus. But I highly doubt that cartoonnetwork.com gave you a virus.

What is the difference between internet service poviders and online service providers?

ISP (Internet Service Provider) === Internet Service Providers provide internet access to customers and many also offer web site hosting and email services.

Online Service Providers provides services through the internet. You usually need internet to access them.

However, "online service provider" could simply mean you can dial into their service ("online") and it has no connection at all to the internet, which is the way most companies operated private data networks prior to the early 1990s, such as America Online, Prodigy, Telenet, etc.

What are zombie computers and how can they affect network?

Zombie computers are any system attached to a network that silently (unannounced to the user) perform tasks on the network to reach a predetermined goal. A computer system can become a zombie computer by being infected via a network transferable source such as via email, or via a local source delivered from a flash drive or other external source. It is most common for each zombie computer to be performing a small portion of the larger goal, and be part of a larger group of zombie computers that are all working together for the same purpose. This way, if one zombie computer is brought offline, the goal can still be reached. It also ensures that each infected system is not diverting a great deal of resources to the zombie process, which helps to ensure the zombie node is not detected and repaired.

Network consequences are dependent on what the task is that the zombie collective is working on, and how many zombie nodes are contributing vs the scale of the network they sit on. For example, if 10 systems on a network of 10,000 systems are infected, the likelihood of the network being bogged down by the zombie traffic is minimal. However, it also depends on whether the goal the zombie collective is trying to achieve is targeting the local network they are on, or something outside the network on the internet, as 10 computers working to overload a local server, may achieve some results, while 10 computers trying to overload Google for instance would have little effect.

What a example of optical storage?

If you need to any further detail on example of optical storage so you can visit..

http://opticalstorage.org/

What happens if a virus that can't be removed gets in your computer?

Viruses can affect your computer in a number of ways. Usually, they display pop-up ads on your desktop or steal your information. Some of the more nasty ones can even crash your computer or delete your files.

What is the 1st 5 numbers in the binary system?

1 10 11 100 101 110 111 1000 1001 1010 1011 1100 ...

1 10 11 100 101 110 111 1000 1001 1010 1011 1100 ...

1 10 11 100 101 110 111 1000 1001 1010 1011 1100 ...

1 10 11 100 101 110 111 1000 1001 1010 1011 1100 ...

How do you set a virus on someone else's computer?

Click start>click run type in msconfig and then press enter. Goto the start up tab and uncheck everything except your anti virus.click ok and reboot. When you come back to the desktop check the box 'do not show this message again" and click ok .

You need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suite and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

* Trend Micro HouseCall * Kaspersky free online virus scanner * Windows Live OneCare safety scanner * BitDefender Online Scanner * ESET Online Antivirus Scanner * F-Secure Online Virus Scanner * avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

I want to download a computer virus?

Although this question can be interpreted as weird, some sanity can be found. There are several virus databases that makes study of different viruses possible. However, questioning something like this in this kind of way makes you not qualified for the link. Try http://www.virus-database.com/.

Are optical disk disks are random access storage devices?

floppy disks are read/write storage devices, they are a backing store, a non-volatile long term storage which will not lose data when power is lost.

Random access storage is the original term for RAM, the random access memory term was used a a marketing term and has stuck since.

Another Answer

YES - floppy disk are Random Access storage devices.

What influenced the use of binary number system as the basis of computer language?

It makes the computer circuits much simpler. It is fairly simple to have circuit elements that can have two different states, and to do operations (like addition or multiplication) on those states.

How does computer use binary code?

Binary is a counting or numbering system with only 2 symbols - "0" and "1". When ever we count something, we start with nothing or "0". This is an important fact that is common between all numbering systems. We always start with 0 things and add from there. This is important because if all numbering systems didn't have this specific starting point, we could not translate between them.

The way binary works is this: starting with nothing we have "0", then we add one object to get "1". If we add another object, we force an overflow into the next column like this: "12 + 12 = 102" then "102 + 12 = 112"..."112 + 12 = 1002"

This is the same thing that happens in any numbering system. When the symbols are all used in the first column, adding another object forces an overflow into the next higher column of power. In Decimal, we are used to "1010" following 9, as in 9+1. In binary, there are only two symbols, so it overflows to the next higher column rather fast. The following is how we count in binary with four bits (Binary Digits)...

0000

0001

0010

0011

0100

0101

0110

0111

1000

1001

1010

1011

1100

1101

1110

1111

"1111" is the max count for four bits. In order to count another object, we have to use the next higher column... 10000.

Why binary system use in computer?

Because CPUs (heart of computer) main part consists of triggers - electronic devices that can be in one of two possible states: charged, discharged. So, one trigger can store one binary digit. Combining triggers in rows we can store big binary digits. Adding combinational logic we can perform basic ariphmetics.

How do you completely remove documents from your PC?

In order to make sure the files are permanently deleted from your computer you must use a special software to do so.

An example of such a software are:
http:/www.deletefilespermanently.com

Change icons on windows desktop?

You can only change the desktop items if they are in folder form (you have to have created a folder yourself ). You can do this by right clicking on the desktop > then new > then folder.

Once you have your folder and have given it a name. Right click the folder and select properties > then you should see a customize tab > then towards the bottom of that window should be a section called "folder icons" in that box should be "change icon" click that and you can select an icon of your choice.

What is a List of computer viruses with their functions?

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Hope i helped!

How can you fix a computer virus on your computer?

Depending on what Anti-Virus software you use will tell you where the virus is and also delete it and store it away in a vault. AVG one of the well known and partly free softwares that can be downloaded locates and can delete the virus. Hope this answers your question.

Does this computer have a virus?

There are some indicators that a computer might be infected which are available at Microsoft site
Scan your system regularly with antivirus and antispyware.
Update your softwares frequently.