answersLogoWhite

0

📱

Downloader Viruses

This category is for questions about malware that automatically downloads spyware and infects the users system without the user's knowledge or permission.

500 Questions

What are the major sources of computer viruses?

User Avatar

Asked by Wiki User

viruses can be destructive once it enters your computer system. You can easily noticeits effect such as slow processing-applications; presence of anonymous files, abnormal computer behavior, and the worse part will be the corruption of your files and the operating systeminstantly.These are just some of the effects of computer viruses. There are viruses, which can actuallysteal personal information on your computer without you noticing it. If there is no anti-virusinstalled on your workstation, it is very hard to prevent the replication of these programs (yes,viruses are also programs created by crazy people) and its effect on your computer.However, you can prevent file corruption and theft carried by viruses by means of assessing the protection of your computer, especially if it is connected to the Internet. Analyze and do thenecessary adjustments to your computer to avoid future problems.1. Version of operating system you are using. Are you using Windows-based operating system or Open Source Applications? If you are using Windows, then it is more prone to viruses comparedto other operating systems because most viruses target Windows computers because lots of people are using it.If this is the case, install an anti-virus program and update its system regularly to capture and prevent newer programs from entering the computer. Always update your operating system for security patches provided by the manufacturer to make it stronger and secure in fighting viruses.2. People using your computer. If you are not the only one using the computer, there are lots of possibilities that viruses may compromise your system. If possible, try to limit the number of people using your computer or never let others use it to lessen the possibility of virus intrusion.3. Websites you visit. Be careful in visiting virus prone websites such as porn websites, or other similar sites, which may be tempting but you do not know it will be the source of viruses you donot expect. Always think first before you do any act in visiting various websites.4. Email attachments. There are lots of emails we receive each day that we do not want. As a precaution, never try to open unknown emails, download its attachments, or visit their links evenif it is tempting. It might be some kind of a virus.These factors can be a great help in preventing computer viruses from disrupting the normaloperation of your computer. Always update your anti-virus program, security patches, andsoftware updates on your operating system to serve as armor in blocking unwanted programsfrom corrupting your files.

Can computer virus infect a human?

User Avatar

Asked by Wiki User

Absolutely not. Computer virii are a way of describing logic-deconstruction programs in layman's terms. They are entirely non-biological, and incapable of affecting the human system in any measurable fashion.

How do you protect my computer from the cookie virus?

User Avatar

Asked by Wiki User

Usually not. A text file should is not able to transmit a virus, which is what a cookie almost always is. It needs to be an executable file. However your internet broweser may have flaws that would cause it to execute code in a cookie... and in that way it could transmit a virus.

What do you do if your computer has been infected by a virus?

User Avatar

Asked by Wiki User

Install the operating system disk.It cleans the files you saved since last install but during the install prompt will ask you good questions to keep things in order.What do to you got to lose anywayYou are trying to get back the system.

Start up the system in safe mode. It worked for me!!

There are three most common solutions which i practise. First one is to install operating system on second partition (bare sistem only with antivurs), (works with XP/2000) and clean your infected partition, after cleaning your virus on infected partition you can safley remove your second system (or leave it for other time :), second one is to install Linux on other partition and clean it safely from there (similar as the first solution), and third one is to unhook your hard drive and attach it to other uninfected computer as slave drive and disinfect it from there (most common and simplest solution).

-dmc

For support within the United States and Canada, call toll-free (866) PCSAFETY (727-2338).

This is the Microsoft virus line, the call is free if you call them they will walk you though the steps for virus removal

Get a boot disk with a virus scan program on it.

If you're using XP - turn the computer on, when the windows screen comes up, unplug the computer. plug it back in, turn it on, and theres a choice that comes up to use the last good configuration

Other OS's - I don't know

Prevention and treatment of the computer worms?

User Avatar

Asked by Wiki User

Sadly, the most effective way to mitigate computer worms and virus attacks it to not connect your computer to the Internet. If you do connect to the Internet, however, use the best anti-virus software you can find, and run it regularly. Further, do not open files from unknown sources, no matter how tempting they are.

Can Movie Star Planet give your computer virus?

User Avatar

Asked by Wiki User

It all depends on the site security settings. If you receive a virus it may not be specifically from the site itself per say, you will most likely receive it from the movie or whatever it is that you download from the site.

What happens when you get the ILOVEYOU computer virus?

User Avatar

Asked by Wiki User

  • It copied itself several times and hid the copies in several folders on the victim's hard drive.
  • It added new files to the victim's registry keys.
  • It replaced several different kinds of files with copies of itself.
  • It sent itself through Internet Relay Chat clients as well as e-mail.
  • It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.

Are horses real?

User Avatar

Asked by Wiki User

Yes. Sea-horses are real. There is actually a site with quite a bit of information on them. I will attach it so you may learn more about them if you wish.

What are the top 10 viruses of the computer?

User Avatar

Asked by Wiki User

The top ten viruses are:

1- Stuxnet (2009 - Present)

It is built and designed mainly to target industrial system. The United States of America used it to infect a nuclear Powerplant in Iran causing it to shutdown with major radiation leaks inside the powerplant itself.

2- Conflikter (2009 - Present)

This worm crawled its way into millions of Windows-based PCs around the world, creating a massive botnet army of remotely controlled computers capable of stealing financial data and other information.

3- agent.btz (2008 - 2009)

This piece of malware's claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command.

4- Zeus (2010 - Present)

There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today's cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents.

5- Poison Ivy (2005)

PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user's computer. Malware like PoisonIvy is known as a "remote access trojan," because it provides full control to the perpetrator through a backdoor.

6- Mydoom (2005)

MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.

7- Fizzer (2003)

Just a normal worm but a very successfull one...

8- Code Red (2001)

Compared to modern malware, Code Red seems like an almost kinder, gentler version of a threat. But when it swept across computers worldwide in 2001.

9- Love Letter/I love you :L (2001)

Yes... It was a love letter that infected computers and deleted the OS of it...

10- Vmware Trojan (Present)

Latest virus that claims to have infected over 50,000 Windows based computers and over 200,000 Macs.

Can a petunia reproduce and if so what type?

User Avatar

Asked by Wiki User

Begoinias reproduce by their seeds and need energy to make more seeds.

How can you block your computer from a virus?

User Avatar

Asked by Wiki User

download a pop up blocker from yahoo or google

== == If it is spyware a pop up blocker will not stop the popups

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

Who discovered the computer virus at first?

User Avatar

Asked by Wiki User

The first virus was made in Chauburji, Lahore, Pakistan, 1986

Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.

What a virus cannot do on its own in computers?

User Avatar

Asked by Wiki User

Like a real world virus, computer viruses heavily rely on a "host" file in order to propagate. In the wild, if a computer virus cannot attach and inject itself into a host file, it will just roam around and eventually get destroyed by an antivirus program. Computer viruses cannot replicate without a host. Worms on the other hand are independent programs that can replicate freely without the need of a host like a virus. When it comes to lethality though, a virus is more destructive than a worm.

What is the major difference between Biological Virus and Computer Virus?

User Avatar

Asked by Wiki User

No. Computer viruses only affect computers. Biological viruses affect animals and humans.

How do viruses occur?

User Avatar

Asked by Wiki User

u get virus' from the dumbest things

one thing is from downloads,

and another is copy and pasting files

also playing games from sites like addicting games, mofunzone, and armor games...

How does a computer virus get on your machine?

User Avatar

Asked by Wiki User

It is a program or command that can get in from infected software or e-mails. You can keep these nasty and time consuming devils off of your computer by doing 3 things. Get the free firewall called Zone Alarm, Get the free program Ad-Aware and run it often. Finally get the free program Hijack this. These 3 freebies will keep trash off of your computer.

How do computer viruses infect and spread in computer systems?

User Avatar

Asked by Wiki User

A virus has a specific string or line of code. When a virus enters a system, it is usually coded to infect a certain part of the computer, for example, the boot sector. When a virus reaches its destination, it injects the code. The virus itself isn't harmful, the code it injects is. Viruses don't replicate. Worms do that.

Why do they geld horses?

User Avatar

Asked by Wiki User

The castration of a male horse is a complex operation. If you love your horse, please consult a veterinarian. Gelding is NOT an operation that you can carry out at home. It is excruciatingly painful for the horse if not done with proper anaesthesia and the quietest animal will probably injure you badly.

If you just cut off the testicles, you will cause such severe haemorraging that you could even kill the horse. Vets go through a complicated procedure to remove them and sometimes just crush the spermatic cord without removing the testicles.

Whichever method is used, it is absolutely not a job for anybody except a competent, qualified vet. Do not risk hurting your horse and yourself by trying to do it without the proper knowledge and equipment.

Do not try to do this on your own. I have seen a vet in the process of gelding a horse. it is difficult even for trained vets. if you try to by yourself, even if you are a skilled horseperson, unless you are a vet it is not smart at all to geld it yourself. Call a vet. You and/or your horse would go through horrible pain or death. Do not blame the horse if he is in pain.

What is the first step you take when your computer is infected by a virus?

User Avatar

Asked by Wiki User

Quarantine an infected system. Then use use antivirus software and antiadware software to do a general cleanup. If the system is highly infected and will later hold sensitive data, consider backing up the data, reformatting the hard drive, and reinstalling the OS and applications. In fact, Microsoft recommends this to be the safest way to deal with highly infected systems.

What are the benefits of computer viruses?

User Avatar

Asked by Wiki User

There are none. Viruses are never technically 'alive'. They are tiny microbes that enter the body and only start reacting to the environment once they have entered a protein molecule. They then use the molecule duplicate themselves and spread around the body. They have no life processes like other microbes, such as bacteria or fungi. They are the 'zombies' of the microscopic world.

How you can know your system is infected by virus?

User Avatar

Asked by Wiki User

I would suggest you run housecall it will scan your computer for viruses and tell you what they are if there are any. It is free and found it to work very well http://housecall.trendmicro.com/. After doing that if there are viruses found you should run Adaware. This can be downloaded from download.com and is also free.

Try the following programs-they will stop all unwanted stuff from getting on your PC-I went to www.webattack.com and found a way to remove it by doing the following-clicked on green link at the top of the page stating "FREEWARE",then clicked on virus tools/or you can search on that site for this program-"Avast home edition".It is the best freeware program,that i have ever used and removed the virus in no time.The Funweb A is a Trojan horse virus,and when Avast picked it up was goung under another name-i think that's why everybody have difficulty in removing it,and cant find anything under funwe A ,coz it is going under another name.Avast has also detected and removed 2 other virus infected files on my PC!It is important to do a live update of avast virus deff and to set program to run a full system scan.Do download the full free home adition and not just the computer cleaner.Its AMAZING and kicks budd! : )Thank you so much Avast!!!!Two programs going really well with Avast and also freeware on the same site is Ad-Aware spy detector and Zone Alarm firewall.I have all three and they work together like magic!: )GREAT STUFF!!!!Try it,you wont look back!just scan the whole PC.

.

You can detect the Trojan horse by following these steps .

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer ,

What do computer viruses do to your computer?

User Avatar

Asked by Wiki User

They do different things. The most recent "viruses" are really technically called "worms". These programs are usually loaded as attachments in emails, and then silently send out emails to everyone in your contact list. Other viruses attach part of their code to your device drivers, or commonly used programs, so that whenever you run that program it runs as well. Some will delete or rename important files, some will broadcast your information out to other computers, and some will attempt to perform operations that could damage your hard drive, etc.

List of computer virus?

User Avatar

Asked by Wiki User

trojan. this is a bad bad one i have ahd i before. basicly it hides it self in files ( like the trojan horse) and can delete, copy files or worse destroy your machine. however if u do a full scan it will pick them up and u can get rid of them. but this is a common one

What can you do to prevent a computer virus?

User Avatar

Asked by Wiki User

Before you browse to the internet the best and safest way to do is to install anti-virus. There are many anti-virus in the market, you can have free trials or purchase you own copy. Be picky when you buy anti-virus software.