Viruses can be classifies by all of these methods except?
List the features you think they are not.
Viruses are classified mainly on their genetic material, such as DNA or RNA with its strand specificity single stranded or double stranded.
What are three ways viruses are classified?
Resident Virus
This type of virus is a permanent as it dwells in the RAM. From there it can overcome and interrupt all the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed etc.
Examples: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in as well as directories that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.
Examples: Vienna virus.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Examples: Way, Trj.Reboot, Trivial.88.D.
Boot Sector Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot sector viruses is to ensure that floppy disks are write-protected and never starting your computer with an unknown floppy disk in the disk drive.
Examples: Polyboot.B, AntiEXE.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.
Examples: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the path that indicate the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected it becomes impossible to locate the original files.
Examples: Dir-2 virus.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg.
File Infector Virus
This type of virus infects programs or executable files (files with .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.
Examples: Cleevix and Cascade.
Companion Viruses
Companion viruses can be considered as a type of file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus) or act immediately by making copies of themselves (direct action virus).
Some examples include: Stator, Asimov.1539 and Terrax.1069
FAT Virus
The file allocation table or FAT is the part of a disk used to store all the information about the location of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
Examples:
Multipartite Virus
These viruses spread in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files.
Examples: Invader, Flip and Tequila
Web Scripting Virus
Many web pages include complex code in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by anti-viruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is program which disguises itself as a useful program or application.
Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched and the results can be destructive.
Besides, there are many other computer viruses that have a potential to infect your digital data. Hence, it is a must that you protect your data by installing a genuine quality anti-virus software.
What Happened to Annie's Parents in Little Orphan Annie?
A car accedent killed Annies mom and dad.
in the musical they died in a fire
The Hoosier Poet, James Whitcomb Riley is the original creator of Little Orphant Annie. Little Orphant Annie is really Little Orphant Allie. Her name was Mary Alice Smith. She was born September 25, 1850 in Union County, Indiana.
In truth - she wasn't an orphan in the real sense of the word. I am not quite sure what happened to her mother. However, when Mary Alice was four - either her parents separated (it was referred to as a "marital disunion") or her mother died. Mary Alice's father could not take care of a small child and sent her to live with his mother, Alice Smith in Hancock County, IN.
Her father did not die until much later. He remarried and Mary Alice had half siblings, but there is no evidence that she ever went to live with her father and his new family.
She came to live with the Riley Family in Nov/Dec 1861. She only stayed less than a year, and then went to work in a tavern as a maid. She married a local farmer and lived the rest of her life on the farm.
Mary Alice's father, Thomas Smith, died at the Veteran's Home in Lafayette on June 21, 1898.
Can you watch hulu programming shows with a dial up connection?
Yes, you can watch Hulu programming with a dial-up connection, but it is not recommended. Dial-up connections are typically very slow, which can result in buffering and poor video quality. Streaming services like Hulu require a faster internet speed for optimal viewing experiences, ideally at least 3 Mbps for standard definition. Therefore, while it's technically possible, the experience is likely to be frustrating.
heya.....
yea its sung by shubha mudgal
n u can download it if u go to the site cooltoad.com - click on 'music' - den click on 'hindi' under da section 'world' and den type da name of da song i.e. nachoon sari sari raat in da search bar
or better yet heres da link: http://music.cooltoad.com/music/song.php?id=140590
And den click on 'download'
P.S. u may hv to create an account on cooltoad.com but dats quick and easy to do and its free
Hope this helps
To put it simply. Its the same exact thing as AIM(AOL Instant Messanger) except you can use it while playing games. IF you play alot of games GET IT!! U CAN JOIN CLANS AND MEET NEW PEOPLE THAT PLAY YOUR GAME AND OTHER GAMES u can chat in it without closing game screen scroll lock +x
What are the spikes and what is their function?
A part of the viral envelope/ capsid which are proteins is known as spikes. They help evade the defenses of the host cell are obtained from their protein.
My 1994 Chrysler LeBaron 3.0L V6 won't shift above second or 3rd gear Any ideas why?
I have a 94 lebaron as well and had a related problem. It may or may not be of use to you. I can tell you that if a transmission speed sensor is bad (there are 3 speed sensors in the transmission) the computer puts the car into a "safe mode", where it will not shift past 2nd gear. There could be another reason the computer would do this, but if your speedometer is also not working, i would say its a speed sensor. They are about $20 at autozone, and are easily replaceable with no special tools. The one i needed was white, the other 2 are black i think. If you look under the car from the front, just in front of the drivers side tire, you should see it. Turn the tires to the left for an easier view.
How can you remove the hacker that's hacked your computer?
<ctrl> + <alt> + <del>
open process manager
end process used by hacker
he is no longer running
delete program once found
How are some viruses able to rproduce without DNA?
Some viruses, like retroviruses and certain RNA viruses, can reproduce without using DNA by directly utilizing their RNA. Retroviruses, for instance, reverse transcribe their RNA into DNA using the enzyme reverse transcriptase, which then integrates into the host's genome. Other RNA viruses can replicate their RNA genomes directly within the host cell's cytoplasm, hijacking the host's cellular machinery to produce new viral particles. This allows them to bypass the need for DNA in their reproductive cycle.
How do you remove dialer 10 BL?
You need to run these 5 essential steps to remove all the spyware on your computer.
1. Run Deckard's System Scanner (DSS)
2. Run Malwarebytes Anti-Malware
3. Run the anti spyware removal programs spybot
4 Run Superantispyware
5. Run a complete scan with free curing utility Dr.Web CureIt!
Install threat fire which will enhance your antivirus protection
On a client's computer, AVG reported this virus in a file V.015~1.DAT in \windows\profiles\\Application Data\Microsoft\Internet Explorer\ (on Win 98SE).
AVG couldn't remove it, and I couldn't delete it manually because it was in use. I didn't discover what using it, so I just deleted the file in Safe Mode.
How do you load jar games on samsung gravity t?
Type in the file path of the jar file into the web browser.
Koyotesoft makes some free audio and video tools which are useful and seem to work well. However, the applications try to install some other things you may not want. They are not viruses but most of us are better off without them.
Specifically, what I have seen from Koyote is Dealio Toolbar and the Spigot browser. Dealio is adware and a browser hijack which keeps changing your homepage to one that tries to sell you stuff. Spigot browser I'm not familiar with, but I suspect it's one that constantly flings ads and is not especially secure.
Toolbars are generally annoying and not that useful; avoid installing them at all costs. Koyote allows you to opt out of installing their adware, but you need to check the Advanced option in their setup screen. Uncheck everything that looks like a toolbar or browser add-on and you'll be OK.
What happens at the end of Annie?
At the end of the film of Annie, Daddy Warbucks adopts Annie and lives with him from now on. It is pretty crap!!!!
What is reproducing asexually?
Reproducing asexually is reproducing with one parent, and therefore creating two totally identical organisms. Bacteria, archaea, and a few other species reproduce asexually while plants, animals, fungi, and most protists reproduce sexually. Although plants may self-pollinate, this is not the same as asexually reproduction, because the offspring still may not be exactly like the parent because of genetics, so self-pollination is a type of sexual reproduction.
How do you solve hidden files does not appear After effected by virus?
Type the following line in the notepad: attrib -h -s -r /s /d *.*
then 1 - save the file with "bat" extension
2 - copy the file onto your flash drive
After, you just execute the new created file (on the flash drive), and your hidden folders will appear.
What does it mean for Code 507 idle control to show up?
you are important to the government you are important to the government
Does Second Life have any viruses?
No. Second Life (SL) is completely safe, if you download directly.
There are alternate SL Viewers that are user created that can be used in place of the official one referenced above. Those could contain viruses.
As a normal precaution: Make sure to run any program (executable) files through a virus scanner before installing.
Yes, I have been told by my doctor that there is a virus out there that can last about 4 weeks that causes nasal and chest congestion and should be watched for any bacterial infection that may develop. I had this and it started with a thick mucous that dripped from my sinus down my throat and was accompanied by dry mouth making it hard to swallow. It is important to drink plenty of water to keep you hydration and to thin the mucous. Also, it is recommended that you perform a sinus rinse 3-4 times daily. Your doctor can give you the recipe (that involves 8 oz of water with canning salt and baking soda). For temporary relief a nasal decongestant like Neo Synepherine nasal spary will clear you out and help you sleep but do not take for more than three days. Also, phseudophedrine is another daytime option. I found that elevating my bed by about 6 inches helped since it seems that the congestion feels worse when laying down.
Just to add that I have spoken to numerous people who have had this virus and all found it lingered for 3-4 weeks. Mine is now tappered off to just an occasssional cough but all the nasal congestions seems to be almost completely gone. See your doctor if your mucous is thick and turns yellow-green (might be a bacterial infection) and you will need an antibiotic like I did.
More Information:
How do you remove brontok virus?
Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.
Disable System Restore (for Windows XP/Windows Me only).
For Windows XP:
Click Start.
Right-click My Computer, and then click Properties.
Click the System Restore tab.
Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.
How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_nam
Update your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.
Delete the value from the registry.
You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.
How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_nam
Click Start > Run. Type regedit Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.
Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTML
Other alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28
Navigate to the subkey that was detected by the anti-virus and delete the value.
Exit the Registry Editor.
If you are still unable to open your registry, you may try the following steps.
Boot up the infected computer, but do not login to the server, leave it at the login prompt.
Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.
From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.
Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:
"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"
(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)
After completing the above steps, reboot the infected computer.
Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.
Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.
Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTML
Delete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.
Enable the System Restore (for Windows XP/Windows Me only).
Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.
Re-connect your computer to the network once confirmed clean.
IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian GardinerBrontok Virus Manual Removal Instructions
For Windows XP:
The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:
With data:
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.
with data: <path to Win32/Brontok worm>
in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.
with data: "explorer.exe " <path to Win32/Brontok worm>
in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.
with data: <Win32/Brontok file name>
in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot
Note: the default setting for this key is "AlternateShell"="cmd.exe"
Win32/Brontok may attempt to lower security settings by making the following changes:
Adds value: DisableRegistryTools
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.
Adds value: Hidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: ShowSuperHidden
With data: 0
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.
Adds value: HideFileExt
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.
Adds value: NoFolderOptions
With data: 1
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.