answersLogoWhite

0

well....... vampires don't exist......... and you need to say more at risk than what a werewolf or ghost? but in books vampires seem to be the biggest risk in a attack......

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

How do you identify a victim of a vampire?

were the bite wound is, its bloody and the victem will become more paler and paler


What happens to a vampire that drinks the last drop of blood from a person?

According to Anne Rice the vampire then shares in the death of that person - not a 'fatal' occurrence for the vampire but definitely an unpleasant one.Other authorities quote no such affinity and the vampire then goes on to find somebody else more giving.


Which bat is the mammal in the world that feeds entirely on blood sucked from it's prey?

The answer is the vampire bat. Vampire bats sleep during the day in a completely dark place, hanging upside down. They typically gather in groups, usually with 100 individual bats if not more. Vampire bats only come out to hunt during the darkest parts of the night. They usually drink the blood of sleeping livestock, but have been known to take blood from humans as well. They usually spend 30 minutes drinking their victim's blood. They don't drink enough blood to harm the victim, but their bites can become infected and lead to disease. They approach their prey on the ground by landing a few feet away, then crawling to the victim. Vampire bats live in the tropics and can be found in Mexico, South America, and Central America. You can find out more on the national geographic website.


Is a succubus a human?

No,, Its A Vampire. The Legends Say They Would Suduce There Victim Before Killing Them. This Made The Hunt More Enjoyable. Also,, See Incubus.


What type of attack uses more than one computer to attack the victim?

A Distributed Denial of Service (DDoS) attack uses multiple compromised computers to flood a target with traffic, overwhelming its resources and rendering it inaccessible to legitimate users. In this type of attack, a network of infected devices, often referred to as a botnet, is coordinated to send a large volume of requests or data to the victim simultaneously. This collective effort amplifies the impact of the attack, making it difficult to mitigate.


What were the reasons for the world war 2 attack?

Can you narrow it down? There was more than one 'attack' during WW2.


What is phishing attack?

A phishing attack is launched by a malefactor sending out emails designed to look like they are coming from a legitimate trusted source such as the victim's bank, the tax collector, the phone company, law enforcement, PayPal, etc. The victim is asked to visit a site that looks like a legitimate web site for the trusted entity where they are usually asked to enter sensitive data such as account passwords, personal ID numbers, bank account numbers etc. that can then be misused by the evil-doer to steal money from or incur debt in the name of the victim. Sometimes the attack will be designed to implant malware on the victim's computer which can then be used to steal more information from the victim or take control of the victim's computer for further use in nefarious schemes.


How to prevent a vampire attack what are the dangers and the warnings?

Living in the real world, where there are no actual vampires, is a pretty effective method. Dangers would, I suppose, include getting bit by a vampire. There are lots of warnings you aren't in the real world and thus might be vulnerable to possible vampire attack. Examples might include the Sun rising in the West, more than one moon in the sky, the presence of unicorns...


How do you turn into a vampire without being bitten?

in fantasy novels, a vampire spawn does not always need to be bitten. sometimes, the vampiric virus is within the vampire's saliva and thus, anyone the vampire bites, whether they just drink from them or kill them with a bite, the victim will rise as a vampire spawn. in other cases, the vampire gives the victim some of their blood to drink and after ingesting it, they will carry the vampiric virus. this is true in the real world application. a vampire's bite is just as septic as any other human mouth, so the method of biting to turn someone doesn't work and can give someone a very nasty infection at the bite area. if a real world vampire wants to give someone else the vampiric affliction, they donate blood which the victim ingests. the real world application of the vampiric affliction is a disease of the blood, so it can be given to others thru blood transfer. the normal precautions of blood donation (disease screening, either curable or constant) also play an important factor, similar to donating blood to a hospital. not much vampire blood is needed to turn another person; sometimes it takes more than a mL, sometimes not. it depends on how well the victim's body handles the first dose of blood. at most, a coffee cup of the vampire's blood would assure anyone that drinks it would carry the virus.


What a phishing attack?

A phishing attack is launched by a malefactor sending out emails designed to look like they are coming from a legitimate trusted source such as the victim's bank, the tax collector, the phone company, law enforcement, PayPal, etc. The victim is asked to visit a site that looks like a legitimate web site for the trusted entity where they are usually asked to enter sensitive data such as account passwords, personal ID numbers, bank account numbers etc. that can then be misused by the evil-doer to steal money from or incur debt in the name of the victim. Sometimes the attack will be designed to implant malware on the victim's computer which can then be used to steal more information from the victim or take control of the victim's computer for further use in nefarious schemes.


What is attacking?

A phishing attack is launched by a malefactor sending out emails designed to look like they are coming from a legitimate trusted source such as the victim's bank, the tax collector, the phone company, law enforcement, PayPal, etc. The victim is asked to visit a site that looks like a legitimate web site for the trusted entity where they are usually asked to enter sensitive data such as account passwords, personal ID numbers, bank account numbers etc. that can then be misused by the evil-doer to steal money from or incur debt in the name of the victim. Sometimes the attack will be designed to implant malware on the victim's computer which can then be used to steal more information from the victim or take control of the victim's computer for further use in nefarious schemes.


When do octopus eat?

I have no idea what your question is. Be more specific. If you mean, "When do Vampire Octuopus' eat?". There are no vampire octopus'