answersLogoWhite

0

Searchpage Viruses

Searchpage viruses force the web browser to display only a particular web page. Manually heading to another website will not work as the browser will only go back to the same page.

170 Questions

Viruses can be classifies by all of these methods except?

List the features you think they are not.
Viruses are classified mainly on their genetic material, such as DNA or RNA with its strand specificity single stranded or double stranded.

Did the Trojan horse really happen?

The Trojan horse story is told to be a myth. This means that it is a made up story, possibly loosely based on some facts from long ago.

What are three ways viruses are classified?

Resident Virus

This type of virus is a permanent as it dwells in the RAM. From there it can overcome and interrupt all the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed etc.

Examples: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in as well as directories that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Examples: Vienna virus.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples: Way, Trj.Reboot, Trivial.88.D.

Boot Sector Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot sector viruses is to ensure that floppy disks are write-protected and never starting your computer with an unknown floppy disk in the disk drive.

Examples: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the path that indicate the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected it becomes impossible to locate the original files.

Examples: Dir-2 virus.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies.

Examples: Elkern, Marburg, Satan Bug and Tuareg.

File Infector Virus

This type of virus infects programs or executable files (files with .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Examples: Cleevix and Cascade.

Companion Viruses

Companion viruses can be considered as a type of file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus) or act immediately by making copies of themselves (direct action virus).

Some examples include: Stator, Asimov.1539 and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to store all the information about the location of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Examples:

Multipartite Virus

These viruses spread in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files.

Examples: Invader, Flip and Tequila

Web Scripting Virus

Many web pages include complex code in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by anti-viruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is program which disguises itself as a useful program or application.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched and the results can be destructive.

Besides, there are many other computer viruses that have a potential to infect your digital data. Hence, it is a must that you protect your data by installing a genuine quality anti-virus software.

What are the necessary hardware and software requirements to connect your computer to the local isp and the local isp to other isps to create form international network?

a modem that connects to your PC either directly or through a router/switch/hub, windows.

The modem must be connected to the internet, either through Coax', phone-line or other.

How do you remove the blue search bar?

I had exactly the same thing and it is the most annoying thing in the entire world. On the right hand side at the top of the screen it should say 'tools', click on it and then it should say 'Manage add-ons', click on that and on the left hand side it says 'Search providers'. Click on 'Babylon' and at the bottom it says 'Disable suggestions' click on it and then it should also either say 'Google' or 'Bing' above 'Babylon', so click on that and click 'Enable suggestions'.

Discuss the advantages and disadvantages of deflation?

As deflation is a decrease in the price level, there is also a proportional increase in the purchasing power of a dollar. Those who have saved money will be able to buy more than previously, and banks will earn more (real) interest on loans made. Those who borrow money, however, will be be paying a higher (real) rate of interest (even with a fixed rate loan).

Can you wipe your hardrive without rebooting your computer?

Insert hard drive CD when you start up your computer. Check box when it asks you if you want to delete and re-use your hard drive. When completed, insert your OS CD, and money in the bank... if you want a quick re-format, dont insert the hard drive CD on startup.. just insert the OS CD on start up.. it will do a quick reformat that will give you results until you can find your hard drive CD if you dont have one.

You can also use DBAN or wipedrive - both these free and paid for products will erase / wipe your hard drive to DOD standards.

Be more specific please. If you mean deleting all the files, the best method i would suggest is to reinstall the OS.

How do you lay traps in two worlds?

if you have it in your inventory then it should be on the bar on the lower part of the screen, just click on the number on your keyboard.

How get rid of hometorchbrowser.com start page in Google Chrome?

To get rid of hometorchbrowser in Google Chrome, the first step is to click on the 'Customize and Control Google Chrome' menu (it is the image of a wrench or three lines, depending on the version of browser you have).

Click on 'settings'.

Under the "Search Engine" tab, click "Manage Search Engines". Delete anything related to Torch Browser, then set your default search engine back to Google.

After that, under the "On Startup" settings, click the link that says "set pages", then again, remove anything related to Torch Browser. Then adjust this setting how you personally prefer.

The next step is to click on the Start menu then go to Control Panel. When you are on the control panel, click "Uninstall a program", then wait for the menu to fully load.

When it is fully loaded, search the list for any software related to Torch Browser and click "Uninstall".

The final step is to download Malware Bytes (it is free) and run a scan for any traces that may have remained.

In the future, be careful what you download and read all installation instructions carefully so you know what you're agreeing to install on your machine.

Does IMVU leave viruses?

I have downloaded IMVU 3 times on my old computer. There first time, it lasted 3 days then I had to delete it because it stopped me from accessing the Internet and it made my computer slower. The second time, it lasted about 3 weeks then I had to delete it because of the same things (it did last a little longer though). The third time it lasted about 4 to 5 months but then about 6 months later when IMVU was still on my computer, my computer just blanked out for no reason and wasn't ever fixed, I'm just glad i had insurance!

If you are browsing on a personal banking website and get a salami attack is your banking info in danger?

This would depends on what were the symptoms of the salami attack,

Also it would depend on what antivirus ,firewall ,anti spyware and browser you had at the time of the attack.