answersLogoWhite

0

📱

Downloader Viruses

This category is for questions about malware that automatically downloads spyware and infects the users system without the user's knowledge or permission.

2,120 Questions

You should always update your antivirus software?

Because people are making new viruses to damage computers. I am pretty sure that ever minute 10 new viruses are made. Every second Tuesday of every month Microsoft creates patches for Windows.It is commonly called Patch Tuesday. Viruses made in this day are called zeo-day viruses. its best to update early

How do you remove Trojan virus form the computet?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware

4. Run the anti spyware remove programs spybot

5. Run a complete scan with free curing utility Dr.Web CureIt!

What is a List of computer viruses with their functions?

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Hope i helped!

How can you fix a computer virus on your computer?

Depending on what Anti-Virus software you use will tell you where the virus is and also delete it and store it away in a vault. AVG one of the well known and partly free softwares that can be downloaded locates and can delete the virus. Hope this answers your question.

How do you remove the hard drive from a Toshiba 460cdt?

Look at the front of the machine beside the activity LEDs. You'll see a panel. Turn the machine over and unscrew the panel, theres only one screw holding it on. Now, it takes some working to actually get this cover off, but it will come off eventualy. Inside there you'll find the harddrive, its just a simple matter of unscrewing it and pulling the cradle out.Refitting is the reverse of removal.

What are effects of computer virus?

complete take over of your computer

complete wipe out of hard drive

pilferage of:

username

passwords

address book contact list

ANY number [ Soc. Sec.,Bank Pin,ect ] copied and compromised

loss of bank account

loss of all financial accounts

What are the different types of malicious codes in computers?

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

See related link for source.

Does java give your computer a virus?

Java applications operate within a form of virtual machine or sand box, protecting your computer from the operations performed by the executed code... unfortunately, there are ways around every system, and you must always make sure that you run Java applets only from trusted sources.

Note: Java and Javascript are not the same thing, and Javascript can more easily be used to compromise your privacy and security without your knowledge.

Why scan for computer viruses?

You should scan for computer viruses because they can be harmful to your computer and your own personal information that you have stored on your PC. The most common viruses known as Trojans and worms can steal confidential information from your computer. You can get viruses only by clicking in on a website, and you should therefore be careful with trusting unknown websites and you should scan your computer for viruses often.

How do you get to xp restore system?

There are several ways to get to the Windows XP system restore. The easiest way to do so is by going to the help center in the control panel. Another way to access the system restore feature is by booting the computer with the Windows XP CD.

What was the most destructive computer virus?

The World's Worst Viruses Check out our list of nasty computer viruses--and find out how to save your PC from infection. Frank Thorsberg Friday, August 23, 2002 1:00 AM PDT Earthworms are a boon to the backyard gardener and healers still use leeches to thin a sick patient's blood, but no good has ever come from a computer worm or virus. Computer viruses have become increasingly dangerous and quick-spreading in the last couple of years, wildly proliferating through cyberspace and causing billions of dollars in damage. Some of the distinctions between different types of malicious code are now blurred, but the classic computer virus is a piece of sneaky code that tells your PC to do something that you usually wouldn't want it to do. Without your knowledge, a virus could wipe out the programs and data on your hard drive or even let someone take over your machine remotely. A virus replicates by embedding itself into programs or system files. Worms are another type of devious program that, today, typically spread via e-mail or Internet chat programs. With the help of unprotected users' address books, worms such as Klez spread explosively--disrupting networks and businesses. The oldest worms didn't change system files or obliterate data. But as worms got more sophisticated, the newer ones started to behave more like viruses, doing considerable damage. For example, Klez can delete files and create the mechanism to run itself on system startup. A third general classification of malevolent code is the Trojan horse. This destructive program poses as an innocent application or file, such as a screen saver or photo. Unlike worms and viruses, Trojan horses don't replicate. Some viruses and worms won't destroy your data, while others do tremendous damage. For example, the LoveLetter virus overwrote files and inserted viral code on hard drives around the globe two years ago. "As far as what [virus writers] can do, the sky is the limit," says April Goostree, virus manager for McAfee.com. "In the antivirus industry, we never say 'never' anymore. Because as soon as you do, you are going to be proven wrong. It's anybody's guess about what the next virus will do." Here's a look at ten of the most malignant viruses and worms of all time. 10. Surreptitious Sircam Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam. 9. Red Raider Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack. The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red. 8. Bad Benjamin Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin. 7. Numbing Nimda Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool. 6. Tennis Anyone? The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova. Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands. 5. (Expletive Deleted) Explorer The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message. 4. Maniacal Magistr Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr. 3. Malevolent Melissa The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested. So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa. 2. Klez the Conquerer The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez. 1. Love Hurts LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.

Whata is the fullform of antivirous?

That is the full form - it is neither an abbreviation nor an acronym.

An anti-virus program is one which is used to remove existing viruses or to prevent them from infecting a computer in the first place.

What is a logic bomb?

A logic bomb is a type of malware designed to execute when a certain event or program is executed. Logic bombs run in memory so that they can constantly detect whether the event needed for them to deliver their payload is true.

What is the term for a duplicate computer file?

If you are referring to copies of files that get saved to different folders on your hdd or ssd by accident or on purpose, they are called duplicate files or exact duplicates. People use programs called duplicate finders, such as Easy Duplicate Finder, Auslogics Duplicate File Finder and Gemini, to delete duplicate files.

Does factory resetting your computer get rid of viruses?

If you choose factory reset setting, you will wipe out everything on your computer. You will have to pay a tech to reload it with the basics, unless you have the drivers. You will get rid of the virus if you restore your computer to an earlier date, before you down loaded the virus.

How do you uninstall AntiVirus Plus?

Use MalwareBytes anti-malware or Spyware Doctor. You may also so remove it manually.

Open task manager and terminate the following processes:

AntivirusPlus.exe

dop.exe

then delete these files:

AntivirusPlus.exe

AntivirusPlus.grn

rundll32.exe

dop.exe

Finally, delete registry values:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\

CurrentVersion\Run "AntivirusPlus"

Does WeeWorld give you a virus?

Yes, it does. It sends a worm that has all the adds on it and that causes a virus. That worm can do very bad damage to your computer OR your laptop. Also, the adds that pop up on your screen, don't click them because they will add more adds to that worm.

Does this computer have a virus?

There are some indicators that a computer might be infected which are available at Microsoft site
Scan your system regularly with antivirus and antispyware.
Update your softwares frequently.

Free user-name and licence key for Trojan remover?

Get free download and install anti-virus software program like AVG or Microsoft Security Essentials for virus, trojan or any malware removal and stay protected from virus threats.

What are some precautions against computer viruses?

This is no easy task. I would normally say that they are unavoidable since there are so many on the internet. However, I assume that the best way to avoid computer viruses is to be careful as to what you download off the internet. As rudimentary as that may sound, computer viruses can only enter if you allow them to enter. Therefore, be careful. Mcafree isn't a bad defense system either, I suppose you can try that too.

Does Skype give you viruses?

Skype does not give you viruses but before you download it make sure that you don't have any viruses already.If you do have viruses already in your computer or laptop than clear them because Skype can make the virus bigger.

How virus are being programmed?

They are programmed in programming languages or scripting languages like Visual basic , c , c++,java , vb script or java script.

Can all computer viruses be detected?

Yes, anti-virus software automatically detect all viruses on this condition that the anti-virus software installed should be updated timely for the latest viruses. Ashish Srivastava, Rashmi khand, Lucknow