The system tools folder is typically found?
This is highly dependent on the operating system. Further, most operating systems rarely require you to find their utilities where they are stored but you can generally just invoke them the normal way for your OS.
For Windows they are likely scattered all over C:\WINDOWS.
Linux will usually keep its system utilities in /sbin and /usr/sbin.
Exe is a file extension for an executable file, which contains a program file that is capable of being executed or run as a program in the computer. When an Exe file is opened, it makes the operating system to run the program. Exe files can easily get corrupted by hackers, so always make sure to receive exe files only from trusted sources so that they do not contain a virus. Malware programmers or cybercriminals write different types of malicious programs and name them with .exe extension to spread virus over the internet.
File-intelligence is a malware search engine site. It provides detailed description of the existence of exe files with different file names.
Can all computer viruses be detected?
Yes, anti-virus software automatically detect all viruses on this condition that the anti-virus software installed should be updated timely for the latest viruses. Ashish Srivastava, Rashmi khand, Lucknow
What is smallest addressable unit of storage on a disk?
It is called a block (or sector). The size of the block varies depending upon the size of the disk, advanced preferences (the size of files normally being used on that disk), and the filesystem being used. They normally run from 512Bytes to 64KiB. As disk capacity continues to grow, look for even larger block sizes to come :-)
What are the statistics of a computer getting infected by a virus?
40% of computer users have been infected by a virus.
For a computer application to be called a virus, it must do several things.
Most importantly, it must be able to copy itself into the computer in such a way that the copies can also copy themselves into the computer as well.
After a computer virus is able to spread, the virus programer is able to do other activities depending on his own goals. He might want to have your computer send emails to everyone in your address book. He might want to detect passwords and send the passwords back to himself. He might want to damage the computer in some way by writing damaging code into the operating system or onto the directory of the hard drive.
The most common way that computer viruses attack computer programs is by adding the virus code onto the end of the program so that each time the program is run, the virus code is run as well. The original program might be the operating system or some other application.
When the computer is busy running the virus code, it may not run the original program, or it may cause so much activity that the whole computer slows down or crashes.
How do you remove the virus called 'iexplore.exe - Bad Image'?
Your system has been seriously infected by a rootkit virus.
You won't be able to scan in regular mode. Boot into Safe Mode and scan with "malwarebyte anti-malware", see if it helps
Scan with Avira Antivir in Safe Mode as well.
If you don't know any of these antivirus, google them.
Also, adding my part to this... I had the Bad Image error keep coming up on my PC. Come to find out after google searching, it is a Virus so says a few sources http://www.spywareremove.com/removebadimagevirus.html
IT looks to be malware that can be removed with antimalware software.
Can twitter give your computer a virus?
By registering or entering Twitter it doesn't give you any viruses ,but you should be careful not to click on any "phishing" or misleading links, such as random advertisements or other links that looks weird to you.
How do Internet service providers provide an Internet service?
The function of an Internet service provider is simply to provide Internet service to those who need Internet service. Internet service providers or ISP's, may offer dial-up or broadband service to consumers.
What do you call the option in the Configure Screens Menu?
What is the final option in the configure screen menu
How do you remove the w32 spybot worm?
1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware
4. Run the anti spyware remove programs spybot
5. Run a complete scan with free curing utility Dr.Web CureIt!
Who is the most powerful virus in the world?
It is probaly the armored virus.It can be hard to get rid of and can mafunction your computer.If you found a way to get rid of it and you need to type in your password.Dont think it is easy,It can change your password. It can be the anti - virus virus. Anti Virus Protection is useless againts it and it is where It is made.It can damage your computer and make memory loss
Which forms of storage are referred to as optical media?
An optical storage medium such as a CD or DVD can store audio and video files, respectively. DVD's are also capable of storing images and other data.
Who are major internet service providers?
In today's world of broadband Internet access probably the most important Internet Service Providers (ISP) are the cable companies, such as Comcast or Time Warner, for the home and the phone companies, such as Sprint or Verizon for wireless. A list compiled at the end of 2011 had Comcast as the largest with over 17 million customers.
What are the four kinds of computer viruses?
What do people maximize and minimize on their computers?
Computer users commonly maximise and minimise application windows. Maximising a window usually makes that window fill almost the entire screen. Minimising a window usually shrinks the window down to pretty much just a button placed on the taskbar. That button can then be clicked to restore the window to it's previous size.
== == When it's on, you can type with the numbers that are on the side, but if it's off then you can't use the number pad The reason you might want to do this is, originally many keyboards did not have a number pad that was separate from the arrow keys. The Num Lock key was used to toggle between arrow and number modes for the 10-key pad.
How can i use my cellphone with different service providers?
If your phone is a dual sim phone you can use at least two different service providers.
How does a computer virus attack to your computer?
Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
E-mail viruses - An e-mail virus moves around in e-mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.
Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your HDD). Trojan horses have no way to replicate automatically.
Source(Which the first author forgot to recognize): http://www.howstuffworks.com/virus.htm
How do you hide folders in windows7?
add a $ after the folder name to access the folder map a network drive and use the folder name with the $ Note: If you want to can not see share folder all user. user view only his folder then you can configure Dfs. Methode: Start > Programs > Administrative Tools > Distributed File System or in the Control Panel, open the Administrative Tools folder and click on the Distributed File System icon. This will open the management console where all the configuration takes place.
The first thing you need to do is create a root. To do this, right click the node and select New Root.
Press next on the first window to be brought to the screen where you will have to make the choice of creating either a stand alone or domain root. A domain root will publish itself in Active Directory and supports replication, whereas a stand alone root does not. If you have an AD Domain Controller set up on your machine, I recommend choosing the domain root.
Note: The root would be the top level of the hierarchy. It is the main Active Directory container that holds Dfs links to shared folders in a domain. Windows 2003 allows your server to have more than one root - which wasn't the case in Windows 2000.
The next screen is the one where you have to select which trusted domains will be hosted. Since I only have one domain in my network, only domain.com is visible.
Once this is done you have to select a server on that domain - in my example it is netserv. The FQDN (Fully Qualified Domain Name) of this host server is netserv.domain.com. Start > Programs > Administrative Tools > Distributed File System or in the Control Panel, open the Administrative Tools folder and click on the Distributed File System icon. This will open the management console where all the configuration takes place.
The first thing you need to do is create a root. To do this, right click the node and select New Root.
Press next on the first window to be brought to the screen where you will have to make the choice of creating either a stand alone or domain root. A domain root will publish itself in Active Directory and supports replication, whereas a stand alone root does not. If you have an AD Domain Controller set up on your machine, I recommend choosing the domain root.
Note: The root would be the top level of the hierarchy. It is the main Active Directory container that holds Dfs links to shared folders in a domain. Windows 2003 allows your server to have more than one root - which wasn't the case in Windows 2000.
The next screen is the one where you have to select which trusted domains will be hosted. Since I only have one domain in my network, only domain.com is visible.
Once this is done you have to select a server on that domain - in my example it is netserv. The FQDN (Fully Qualified Domain Name) of this host server is netserv.domain.com.
Note: If you want to more information so you can visit http://www.iyogibusiness.com/
Draw and label the component of a simple computer system and explain their functions?
Motherboard,PSU (power supply unit), RAM (memory), Processor, hard drive, cd/dvd drive,
fans, If the graphics are not onboard, video card, Case.
Why do digital computers use binary numbers for their operation?
Digital computers use binary numbers because that is easier for them, and the easiest way for humans to represent what goes on inside of computers. Computers contain millions of transistors inside the various ICs in the computer. Transistors can generally be on or off. Sure, it is possible for transistors to have a range, but then, in this case, it wouldn't be digital. So since the transistors are used as on-off switches, it is easiest to represent them as binary digits, since they can either be on or off.
How do you find out which computer virus you have?
Your AV software should tell you that. You DO have AV software installed don't you?
You could also try running an online virus/adware scanner like one of these:
X-Cleaner
Trojan Scan
HouseCall
Spyware Begone
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection