answersLogoWhite

0

Dialer Viruses

An auto-dialer virus is a type of computer malware which causes the infected computer to repeatedly dial 1-900 numbers, which charge by the minute. Questions about auto-dialers, how to avoid them, and how to clear up the mess with your phone company (or ISP) belong here.

151 Questions

What is a virus only goal?

A virus is going to try and slow your computer down and get personal information of the peoples account on the computer with the virus.So they can scam you and use your personal information (Like bank numbers , important messages sent in messages)

What is the function of virus?

There are virusses for multiple purposes:

*Virusses who want to destroy your computer

*Virusses who send random documents of your computer to your e-mail contacts

*Virusses who want to send spam-mails from your computer to a big number of mail-accounts

*Virusses who just wants to slow down your computer

*Virusses who try to log the bank-login you type or the credit-card numbers

*... The function of a biological virus is to reproduce itself, as it is for any living organism.

Do vertebrates reproduce asexually?

Some do and some don't. It just depends on what kind of animal it is...

Viruses can be classifies by all of these methods except?

List the features you think they are not.
Viruses are classified mainly on their genetic material, such as DNA or RNA with its strand specificity single stranded or double stranded.

What are three ways viruses are classified?

Resident Virus

This type of virus is a permanent as it dwells in the RAM. From there it can overcome and interrupt all the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed etc.

Examples: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in as well as directories that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Examples: Vienna virus.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples: Way, Trj.Reboot, Trivial.88.D.

Boot Sector Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot sector viruses is to ensure that floppy disks are write-protected and never starting your computer with an unknown floppy disk in the disk drive.

Examples: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the path that indicate the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected it becomes impossible to locate the original files.

Examples: Dir-2 virus.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies.

Examples: Elkern, Marburg, Satan Bug and Tuareg.

File Infector Virus

This type of virus infects programs or executable files (files with .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Examples: Cleevix and Cascade.

Companion Viruses

Companion viruses can be considered as a type of file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus) or act immediately by making copies of themselves (direct action virus).

Some examples include: Stator, Asimov.1539 and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to store all the information about the location of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Examples:

Multipartite Virus

These viruses spread in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files.

Examples: Invader, Flip and Tequila

Web Scripting Virus

Many web pages include complex code in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by anti-viruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is program which disguises itself as a useful program or application.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched and the results can be destructive.

Besides, there are many other computer viruses that have a potential to infect your digital data. Hence, it is a must that you protect your data by installing a genuine quality anti-virus software.

What Happened to Annie's Parents in Little Orphan Annie?

A car accedent killed Annies mom and dad.

in the musical they died in a fire

The Hoosier Poet, James Whitcomb Riley is the original creator of Little Orphant Annie. Little Orphant Annie is really Little Orphant Allie. Her name was Mary Alice Smith. She was born September 25, 1850 in Union County, Indiana.

In truth - she wasn't an orphan in the real sense of the word. I am not quite sure what happened to her mother. However, when Mary Alice was four - either her parents separated (it was referred to as a "marital disunion") or her mother died. Mary Alice's father could not take care of a small child and sent her to live with his mother, Alice Smith in Hancock County, IN.

Her father did not die until much later. He remarried and Mary Alice had half siblings, but there is no evidence that she ever went to live with her father and his new family.

She came to live with the Riley Family in Nov/Dec 1861. She only stayed less than a year, and then went to work in a tavern as a maid. She married a local farmer and lived the rest of her life on the farm.

Mary Alice's father, Thomas Smith, died at the Veteran's Home in Lafayette on June 21, 1898.

Can you watch hulu programming shows with a dial up connection?

Yes, you can watch Hulu programming with a dial-up connection, but it is not recommended. Dial-up connections are typically very slow, which can result in buffering and poor video quality. Streaming services like Hulu require a faster internet speed for optimal viewing experiences, ideally at least 3 Mbps for standard definition. Therefore, while it's technically possible, the experience is likely to be frustrating.

Does any one have an idea about the song nachu mein saari saari raat if so can you please upload that and give you the site?

heya.....

yea its sung by shubha mudgal

n u can download it if u go to the site cooltoad.com - click on 'music' - den click on 'hindi' under da section 'world' and den type da name of da song i.e. nachoon sari sari raat in da search bar

or better yet heres da link: http://music.cooltoad.com/music/song.php?id=140590

And den click on 'download'

P.S. u may hv to create an account on cooltoad.com but dats quick and easy to do and its free

Hope this helps

What is xfire?

To put it simply. Its the same exact thing as AIM(AOL Instant Messanger) except you can use it while playing games. IF you play alot of games GET IT!! U CAN JOIN CLANS AND MEET NEW PEOPLE THAT PLAY YOUR GAME AND OTHER GAMES u can chat in it without closing game screen scroll lock +x

What are the spikes and what is their function?

A part of the viral envelope/ capsid which are proteins is known as spikes. They help evade the defenses of the host cell are obtained from their protein.

My 1994 Chrysler LeBaron 3.0L V6 won't shift above second or 3rd gear Any ideas why?

I have a 94 lebaron as well and had a related problem. It may or may not be of use to you. I can tell you that if a transmission speed sensor is bad (there are 3 speed sensors in the transmission) the computer puts the car into a "safe mode", where it will not shift past 2nd gear. There could be another reason the computer would do this, but if your speedometer is also not working, i would say its a speed sensor. They are about $20 at autozone, and are easily replaceable with no special tools. The one i needed was white, the other 2 are black i think. If you look under the car from the front, just in front of the drivers side tire, you should see it. Turn the tires to the left for an easier view.

How can you remove the hacker that's hacked your computer?

<ctrl> + <alt> + <del>

open process manager

end process used by hacker

he is no longer running

delete program once found

How are some viruses able to rproduce without DNA?

Some viruses, like retroviruses and certain RNA viruses, can reproduce without using DNA by directly utilizing their RNA. Retroviruses, for instance, reverse transcribe their RNA into DNA using the enzyme reverse transcriptase, which then integrates into the host's genome. Other RNA viruses can replicate their RNA genomes directly within the host cell's cytoplasm, hijacking the host's cellular machinery to produce new viral particles. This allows them to bypass the need for DNA in their reproductive cycle.

How do you remove dialer 10 BL?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

On a client's computer, AVG reported this virus in a file V.015~1.DAT in \windows\profiles\\Application Data\Microsoft\Internet Explorer\ (on Win 98SE).

AVG couldn't remove it, and I couldn't delete it manually because it was in use. I didn't discover what using it, so I just deleted the file in Safe Mode.

How do you load jar games on samsung gravity t?

Type in the file path of the jar file into the web browser.

Is koyote soft a virus?

Koyotesoft makes some free audio and video tools which are useful and seem to work well. However, the applications try to install some other things you may not want. They are not viruses but most of us are better off without them.

Specifically, what I have seen from Koyote is Dealio Toolbar and the Spigot browser. Dealio is adware and a browser hijack which keeps changing your homepage to one that tries to sell you stuff. Spigot browser I'm not familiar with, but I suspect it's one that constantly flings ads and is not especially secure.

Toolbars are generally annoying and not that useful; avoid installing them at all costs. Koyote allows you to opt out of installing their adware, but you need to check the Advanced option in their setup screen. Uncheck everything that looks like a toolbar or browser add-on and you'll be OK.

What happens at the end of Annie?

At the end of the film of Annie, Daddy Warbucks adopts Annie and lives with him from now on. It is pretty crap!!!!

What is reproducing asexually?

Reproducing asexually is reproducing with one parent, and therefore creating two totally identical organisms. Bacteria, archaea, and a few other species reproduce asexually while plants, animals, fungi, and most protists reproduce sexually. Although plants may self-pollinate, this is not the same as asexually reproduction, because the offspring still may not be exactly like the parent because of genetics, so self-pollination is a type of sexual reproduction.

How do you solve hidden files does not appear After effected by virus?

Type the following line in the notepad: attrib -h -s -r /s /d *.*

then 1 - save the file with "bat" extension

2 - copy the file onto your flash drive

After, you just execute the new created file (on the flash drive), and your hidden folders will appear.

Does Second Life have any viruses?

No. Second Life (SL) is completely safe, if you download directly.

There are alternate SL Viewers that are user created that can be used in place of the official one referenced above. Those could contain viruses.

As a normal precaution: Make sure to run any program (executable) files through a virus scanner before installing.