answersLogoWhite

0

📱

Downloader Viruses

This category is for questions about malware that automatically downloads spyware and infects the users system without the user's knowledge or permission.

2,120 Questions

Prevention and treatment of the computer worms?

Sadly, the most effective way to mitigate computer worms and virus attacks it to not connect your computer to the Internet. If you do connect to the Internet, however, use the best anti-virus software you can find, and run it regularly. Further, do not open files from unknown sources, no matter how tempting they are.

Can Movie Star Planet give your computer virus?

It all depends on the site security settings. If you receive a virus it may not be specifically from the site itself per say, you will most likely receive it from the movie or whatever it is that you download from the site.

What happens when you get the ILOVEYOU computer virus?

  • It copied itself several times and hid the copies in several folders on the victim's hard drive.
  • It added new files to the victim's registry keys.
  • It replaced several different kinds of files with copies of itself.
  • It sent itself through Internet Relay Chat clients as well as e-mail.
  • It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.

Are horses real?

Yes. Sea-horses are real. There is actually a site with quite a bit of information on them. I will attach it so you may learn more about them if you wish.

What are the top 10 viruses of the computer?

The top ten viruses are:

1- Stuxnet (2009 - Present)

It is built and designed mainly to target industrial system. The United States of America used it to infect a nuclear Powerplant in Iran causing it to shutdown with major radiation leaks inside the powerplant itself.

2- Conflikter (2009 - Present)

This worm crawled its way into millions of Windows-based PCs around the world, creating a massive botnet army of remotely controlled computers capable of stealing financial data and other information.

3- agent.btz (2008 - 2009)

This piece of malware's claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command.

4- Zeus (2010 - Present)

There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today's cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents.

5- Poison Ivy (2005)

PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user's computer. Malware like PoisonIvy is known as a "remote access trojan," because it provides full control to the perpetrator through a backdoor.

6- Mydoom (2005)

MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.

7- Fizzer (2003)

Just a normal worm but a very successfull one...

8- Code Red (2001)

Compared to modern malware, Code Red seems like an almost kinder, gentler version of a threat. But when it swept across computers worldwide in 2001.

9- Love Letter/I love you :L (2001)

Yes... It was a love letter that infected computers and deleted the OS of it...

10- Vmware Trojan (Present)

Latest virus that claims to have infected over 50,000 Windows based computers and over 200,000 Macs.

Can a petunia reproduce and if so what type?

Begoinias reproduce by their seeds and need energy to make more seeds.

How can you block your computer from a virus?

download a pop up blocker from yahoo or google

== == If it is spyware a pop up blocker will not stop the popups

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

Who discovered the computer virus at first?

The first virus was made in Chauburji, Lahore, Pakistan, 1986

Two programmers named Basit and Amjad Farooq Alvi, .replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had " Brain" for a volume label.

What a virus cannot do on its own in computers?

Like a real world virus, computer viruses heavily rely on a "host" file in order to propagate. In the wild, if a computer virus cannot attach and inject itself into a host file, it will just roam around and eventually get destroyed by an antivirus program. Computer viruses cannot replicate without a host. Worms on the other hand are independent programs that can replicate freely without the need of a host like a virus. When it comes to lethality though, a virus is more destructive than a worm.

How do viruses occur?

u get virus' from the dumbest things

one thing is from downloads,

and another is copy and pasting files

also playing games from sites like addicting games, mofunzone, and armor games...

How does a computer virus get on your machine?

It is a program or command that can get in from infected software or e-mails. You can keep these nasty and time consuming devils off of your computer by doing 3 things. Get the free firewall called Zone Alarm, Get the free program Ad-Aware and run it often. Finally get the free program Hijack this. These 3 freebies will keep trash off of your computer.

How do computer viruses infect and spread in computer systems?

A virus has a specific string or line of code. When a virus enters a system, it is usually coded to infect a certain part of the computer, for example, the boot sector. When a virus reaches its destination, it injects the code. The virus itself isn't harmful, the code it injects is. Viruses don't replicate. Worms do that.

Why do they geld horses?

The castration of a male horse is a complex operation. If you love your horse, please consult a veterinarian. Gelding is NOT an operation that you can carry out at home. It is excruciatingly painful for the horse if not done with proper anaesthesia and the quietest animal will probably injure you badly.

If you just cut off the testicles, you will cause such severe haemorraging that you could even kill the horse. Vets go through a complicated procedure to remove them and sometimes just crush the spermatic cord without removing the testicles.

Whichever method is used, it is absolutely not a job for anybody except a competent, qualified vet. Do not risk hurting your horse and yourself by trying to do it without the proper knowledge and equipment.

Do not try to do this on your own. I have seen a vet in the process of gelding a horse. it is difficult even for trained vets. if you try to by yourself, even if you are a skilled horseperson, unless you are a vet it is not smart at all to geld it yourself. Call a vet. You and/or your horse would go through horrible pain or death. Do not blame the horse if he is in pain.

What is the first step you take when your computer is infected by a virus?

Quarantine an infected system. Then use use antivirus software and antiadware software to do a general cleanup. If the system is highly infected and will later hold sensitive data, consider backing up the data, reformatting the hard drive, and reinstalling the OS and applications. In fact, Microsoft recommends this to be the safest way to deal with highly infected systems.

What are the benefits of computer viruses?

There are none. Viruses are never technically 'alive'. They are tiny microbes that enter the body and only start reacting to the environment once they have entered a protein molecule. They then use the molecule duplicate themselves and spread around the body. They have no life processes like other microbes, such as bacteria or fungi. They are the 'zombies' of the microscopic world.

How you can know your system is infected by virus?

I would suggest you run housecall it will scan your computer for viruses and tell you what they are if there are any. It is free and found it to work very well http://housecall.trendmicro.com/. After doing that if there are viruses found you should run Adaware. This can be downloaded from download.com and is also free.

Try the following programs-they will stop all unwanted stuff from getting on your PC-I went to www.webattack.com and found a way to remove it by doing the following-clicked on green link at the top of the page stating "FREEWARE",then clicked on virus tools/or you can search on that site for this program-"Avast home edition".It is the best freeware program,that i have ever used and removed the virus in no time.The Funweb A is a Trojan horse virus,and when Avast picked it up was goung under another name-i think that's why everybody have difficulty in removing it,and cant find anything under funwe A ,coz it is going under another name.Avast has also detected and removed 2 other virus infected files on my PC!It is important to do a live update of avast virus deff and to set program to run a full system scan.Do download the full free home adition and not just the computer cleaner.Its AMAZING and kicks budd! : )Thank you so much Avast!!!!Two programs going really well with Avast and also freeware on the same site is Ad-Aware spy detector and Zone Alarm firewall.I have all three and they work together like magic!: )GREAT STUFF!!!!Try it,you wont look back!just scan the whole PC.

.

You can detect the Trojan horse by following these steps .

1 Download and intall the Malwarebytes on your computer .

2 Update your Malwarebytes .

3 Scan your computer for all the malwares in your computer .

4 Remove all the malwares , found while scanning with the malwarebytes .

5 Restart your computer ,

What do computer viruses do to your computer?

They do different things. The most recent "viruses" are really technically called "worms". These programs are usually loaded as attachments in emails, and then silently send out emails to everyone in your contact list. Other viruses attach part of their code to your device drivers, or commonly used programs, so that whenever you run that program it runs as well. Some will delete or rename important files, some will broadcast your information out to other computers, and some will attempt to perform operations that could damage your hard drive, etc.

List of computer virus?

trojan. this is a bad bad one i have ahd i before. basicly it hides it self in files ( like the trojan horse) and can delete, copy files or worse destroy your machine. however if u do a full scan it will pick them up and u can get rid of them. but this is a common one

What can you do to prevent a computer virus?

Before you browse to the internet the best and safest way to do is to install anti-virus. There are many anti-virus in the market, you can have free trials or purchase you own copy. Be picky when you buy anti-virus software.

Compare and contrast a computer bug and a computer virus?

A bug is a glitch in a program caused by a design flaw. Bugs can cause programs to crash or not work properly. A virus, on the other hand, is a program which was designed to cause problems on your computer. Viruses may steal your information and transmit it to another person, or they may be used to allow another person to take control of your computer.

Do mares and geldings get on?

It makes no difference if mares and geldings are together when a mare is in heat. A gelding is a castrated horse and he has no sex drive or ability to impregnate a mare. Therefore a gelding would be like just another horse to a mare in heat.

How can Information spillage be prevented?

labeling all files, removable media and subject headers

What is fullform waiter?

One who, or that which, waits; an attendant; a servant in attendance, esp. at table., A vessel or tray on which something is carried, as dishes, etc.; a salver.

Does the powder toy give your computer viruses?

Yes. Because when i downloade it it was fine (i have avast and avg) then when i put in fullscreen it found malware and stuff so dont download!