answersLogoWhite

0

📱

Downloader Viruses

This category is for questions about malware that automatically downloads spyware and infects the users system without the user's knowledge or permission.

2,120 Questions

How do youremove a keylogger file on your computer?

1.Press the "Ctrl," "Shift" and "Esc" keys at the same time to start the Task Manager.

2.Click the "Processes" tab in the Task Manager's window.

3.Select "AKProg.exe" from the list of processes and click "End Process" button at the bottom of the window.

4.Close the Task Manager.

5.Go to the "Start" menu, "type "regedit" in the "Start Search" box and hit "Enter" to start the Registry Editor.

6.Browse to the following in the Registry Editor's window:

"Microsoft" > "Windows" > "Current Version" > "Policies" > "Explorer" > "Run" > "Application"

7.Click the "Application" folder at the end of the string and then delete the "AKProgram" value in the right pane of the Registry Editor's window.

8.Close the Registry Editor.

9.Go to the "Start" menu, type "cmd" in the "Start Search" box and hit "Enter" to start the command line window.

10.Type "regsvr32 /u hkdll.dll" in the command line window and hit "Enter" to unregister the DLL. Type "regsvr32 /u hprog.dll" in the command line window and hit "Enter" to unregister the DLL.

11.Close the command line window.

12.Go to the "Start" menu, type "hkdll.dll" in the "Start Search" box and hit "Enter." Delete all search results.

13.Repeat Step 1 for "hprog.dll," "AKProg.exe," "AKProg.exe.manifest," "Actual Keylogger Help.lnk," "Actual Keylogger.lnk," "Uninstall Actual Keylogger.lnk" and "Actual.lnk."

14.reboot your computer.

How do you remove fake viruses?

You can remove rogue antivirus software manually. However, this is a risky option especially if you are not too familiar with your system files and computer registry. You can damage your system if you accidentally delete a wrong file.

The best and easiest option is to remove bogus antivirus software automatically. This involves the use of a reliable malware removal tool. Remember that even highly experienced computer users are looking for information on how to get rid of such software automatically. They seek the help Internet security services to delete the virus from their computers.

In order to avoid harming your system and to completely eliminate the such fake software from your machine, you should follow the solutions and approaches implemented by most computer users. You must get the most reliable and updated information about rouge software. It is also important to learn how to remove fake antivirus software using an automated anti-malware tool.

Can you get viruses from visiting YouTube?

Not necessarily, as long as you watch videos that have the small "play" triangle looking icon on the video you are fine. It will play the video through yahoo but if you click on a video that doesn't have one that's were your virus will come from.

Name a computer virus that actively attacks and antivirus program or programs in and effort to prevent its detection?

Oooh, I got a nasty virus that did that. It went by many names, but the form it appeared in to me was "Win7 Home Security 2012". It also goes by names such as "WinXP Home Security 2012", "WinVista Home Security 2012", et cetera, depending upon your operating system. I'm sure it's not the only virus that does this, but the nasty booger invaded my real security program, and told me that my security was infected, and to get rid of it.

So, er, yeah. I do hope this ramble actually answered your question.

Computer that originates a message to send to another computer is called what?

The most common term for the originator of a message is source, followed by sender, transmitter, originator, and many more. The most pervasive word likely varies according to where you are and the dictates of your local dialect.

What is the Update license key for avg 8.5?

8MEH-RK82S-PWO92-C33BA-Q7RAA-GEMBR-ACED i got it very hardly enjoy :p

3 ways by which a computer virus is prevented?

You need 3 programs to defend your computer

[1] Anti virus to keep the viruses out (use ONLY ONE )

[2] Firewall to keep the bad guys out(use ONLY ONE )

[3] Anti Spyware to keep the malware ,pop ups ,password stealer out

* Run Malwarebytes Anti-Malware

* Run Superantispyware

* Run a complete scan with free curing utility Dr.Web CureIt!

What is one of the main impacts of technology in the the information age?

There was a massive impact on the human population after the Information era. People became much more aware of their surroundings and actions for example.
Software has become the key element in the evolution of computer based system and products. Over the past 60 years, software has evolved from a specialized problem solving and information analysis tool to an industry in itself. But early programming culture and history have created a set of problem that persist even today. Software has become the limiting factor in the continuing evolution of computer based systems. Software is composed of programs, data, and documents. Each of these items comprises a configuration that is created as part of the software engineering process. The intension of software engineering is to provide a framework for building software with higher quality.

What do you do after you install virus scan software?

# Update your anti-virus software.

# Run a full scan of your system using the anti-virus software. # Once the scan is successful and the system is clean go to the next item. If not remove all threats and infections before you proceed.

# Do a disk clean up. click start>all programs>accessories>system tools> disk cleanup. # Defragment your drive. click start>all programs>accessories>system tools> disk defragmenter. #

Which ways can a virus inject itself into its target?

Computer viruses are either 'attached' to an email - or hidden on a CD-ROM or floppy disk. When someone opens the email or inserts a disk without scanning it - the virus has a chance to infect the new computer.

Why do computers need virus protection?

A long time back, you could escape without having antivirus programming. The web and email didn't even exist in those days. The best way to get an infection was either by utilizing a tainted floppy circle or maybe from an extensive corporate system. These days, we're all associated. Our PCs are constantly turned on and programmers and sorted out wrongdoing syndicates have chosen to exploit this wonder. Antivirus can be grouped into two classes:

Free: At slightest a couple of good brands of free antivirus are out there. Avira and AVG are likely the two most surely understood. AVG's essential infection assurance offers ongoing examining and booked filtering. Likewise, it indicates to keep you safe while on interpersonal organizations keeping in mind downloading applications. Avira Antivirus tech Support Number is another surely understood brand of antivirus arrangement which offers a free form too. With Avira you have the advantage of constant examining and planned outputs too. Constrained backing is offered with both items.

How does a Trojan horse get into your computer?

A "Trojan Horse" has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, now often associated with "malware" computer programs presented as useful or harmless in order to induce the user to install and run them. To learn more also read http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse

Information use from http://en.wikipedia.org/wiki/Trojan_horse

How do you get rid of a virus on your computer?

If you have internet access, you can run a free online scan, such as on the Trend Micro (Housecall) or Symantecs (Norton) website. The best time to do this is if you have Windows XP is in safe mode with networking (you can get to this by pressing F8 before the windows splash screen, when you first turn on the computer) then navigate in your browser to the site, and follow the instructions. after the virus have been found and clean, you need to purchase a nore permanent solution. there are 1500 new virus variations, and you need updated software on your machine at all times.

Or in simpler terms, download a anti-virus software and use it. If you don't have internet access, find a anti-virus software at a local computer store and install it in your computer.

---

You need to run these 5 essential steps to remove all the spyware on your computer.

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer .

Answer">AnswerYou need to run these 3 essential programs to remove all the spyware on your computer.

If you do not have an internet security suit and only an anti virus

1. Run Malwarebytes Anti-Malware

2. Run a complete scan with free curing utility Dr.Web CureIt!

3. Run the anti spyware removal programs spybot or Superantispyware

Browsers

Use Mozilla firefox or the google chrome browser for browsing unsafe websites

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Run an online virus scan like

Trend Micro HouseCall

Kaspersky free online virus scanner

Windows Live OneCare safety scanner

BitDefender Online Scanner

ESET Online Antivirus Scanner

F-Secure Online Virus Scanner

avast! Online Scanner

update your software by running

Secunia Online Software Inspector

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

Uses of antivirus?

Viruses and Trojans have signatures written for them. By this I mean, when a virus has been discovered, programmers will write a blocking code that is installed in the anti virus program. When you update your anti virus program this new "virus signature" will be recorded in your anti virus program. Then when the virus comes a calling, your anti virus program will recognize the virus and initiate the blocking code so the virus can not install itself in your system.

So with out the signature of the virus, the virus can enter your computer. So updating your anti virus program daily is very important! Some of the top anti virus programs have a new Technology called Heuristic Technology.

This Heuristic Technology dose not need the signature of a virus to block it. The way it works is Heuristic Technology looks for careerists of viruses and will block it just for looking unusual. This is the way of the future. Hackers are getting smarter, our defence must follow. If you care to read more you can on my site trojanhorseremoval.org

Does anyone have the Antivirus 2009 license key?

Antivirus 2009 is the newer version of the Antivirus 2008 and is there to scam you. Also just like its older version, its makes your system slow, brings unwanted popups and can also make your system infected with some serious trojans. So its advisable to remove it as soon as you get infected.

REMOVAL STEPS

1. Open task manager(Ctrl+Alt+Del). Locate and end the process av2009.exe using right click and selecting 'end process' option.

2. Now go to C:\Program Files(Assuming that you have windows installed in C drive) and delete the entire folder named antivirus 2009.

3. As seen in the second picture, Antivirus 2009 makes a fake Windows security center. So we need to remove that. So go to C:\windows\system32 and delete the file scui.cpl

4. Now delete all the shortcuts on desktop and start menu made by Antivirus 2009

5. Empty recycle bin

Now we need to do some registry editing. Please complete the following steps carefully as improper registry editing could lead to system instability.

6. Go to Start Menu->Run-> Type regedit and press enter

7. Navigate to

HKEY_CURRENT_USER\Software\39148080807332159842981568027496

Delete the key ( i.e. the key with a long number which may differ in your PC but will be very long)

8. Now Navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

and delete name(long nos.) with data as C:\Program Files\Antivirus 2009\av2009.exe

9. Navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\Antivirus 2009

Delete this key i.e. Antivirus 2009

Your PC is clean

For with pic removal visit here.

http://wehackvirus.blogspot.com/2008/07/remove-antivirus-2009.HTML

Is malware bytes a safe program?

I would strongly recommend Malwarebytes Anti-Malware. It is a free software application that allows you to clean your PC and prevent it from malware. There is also a paid version with more advanced features if you like this software, it protects your computer nonstop from the moment it is turned on.

How does a computer virus attack to your computer?

Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.

When you listen to the news, you hear about many different forms of electronic infection. The most common are:

Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).

E-mail viruses - An e-mail virus moves around in e-mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your HDD). Trojan horses have no way to replicate automatically.

Source(Which the first author forgot to recognize): http://www.howstuffworks.com/virus.htm

Does iTunes slow your computer down?

Technically, iTunes doesn't mess up your computer or laptop just as long as you download it from apple. If you have windows vista, you should upgrade to windows 7 professional and download Microsoft security essentials, or run a scan before downloading anything. Hope this helps!

Does youtube2mp3 converters give you viruses?

Found malware when i downloaded a video from youtube2mp3, but it was in the site of video2mp3 so make sure you don't click any other links.

Why do computer have hard disk?

Hard Disks (or hard drives) are mainly used for Primary Storage. Typically most of the data on the computer, and the operating system, are stored on the harddrive. Without a hard drive or similar long-term storage, you would have to store data in RAM. RAM is volatile (temporary) memory which clears when the computer is turned off. Whereas hard drives will store data reliably without power, provided the hard drive and computer are functioning correctly.

Hard drives may also be utilized as overflow space if the computer runs out of RAM. Which harddrives are much slower (typically 50-100 MB/s) than RAM (1,600-8,000 MB/s) it is also far, far larger. Most harddrives are from 80 GB to 2,500 GB these days. This allows virtually limitless space for RAM to overflow to, and allow the system to keep functioning in the event of a RAM shortage. Computers typically only have 4 to 32 GB of RAM.

What virus shuts down computers?

Certain worms that get into your computer shut down your computer when the worm loads. One specific worm is the MSBLAST.exe and W32.Blaster...

and also if you search on YouTube you can find people renaming files and creating a fake virus message which shuts down your computer.

How do you find out which computer virus you have?

Your AV software should tell you that. You DO have AV software installed don't you?

You could also try running an online virus/adware scanner like one of these:

X-Cleaner

Trojan Scan

HouseCall

Spyware Begone

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

Does gimp have any viruses?

YES, if you downloaded it from a site called "Trusted Software"! This installer does actually install the gimp, but also 5 other things, 2 of which are malware! the "freeze.net " thing especially!

How do you delete a name from the leapster 2?

To delete a player profile, go to the player profile screen and press and continue to hold down the following buttons in sequence: Home A button Left arrow Then, touch the X icon that appears at the bottom of the screen and follow audio instructions. Note: You can only delete a name when all three name slots are filled.