TRENDING NEWS

POPULAR NEWS

Virus Creation Hw Help

What is a virus? [Plz! hw help!?

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.

HIV virus treatment? Homework help!?

I suggest this service: http://phonedetectives.co - The best reverse cell phone lookup service.

It's a cheap service that works great! It could be used for a much deeper search. You can use it to get hold of different varieties of background reports, and in addition cell numbers, addresses and names.. you can get unlimited reports... I ran with this because I required to verify more numbers.

You can get the name, other phone number, address history, relatives, and much more about anyone! The completly free reverse phone lookup generally doesn't provide anything interesting. To get interesting information, money will must be paid. The free searches don't provide considerably more than what may be found through the phone directory or personal information and they simply require your email to send spam. The reverse phone detective search tool does work, but you should use just the service that I posted above. The last thing you want to do, is pay for a service and find the numbers you want to lookup are not available in their directory.

The service that I reccomend doesn't have any kind of problem , you won't get any bad surprise! Trust it!

Reverse Phone Lookup area gives you additional access to millions of public records, including:

+ Find out the source of a harassing ("prank") caller
+ Research a number that appeared on your phone bill
+ Locate an old friend from high school or college
+ Research "missed calls" on your caller ID that you don't recognize
+ Verify an address
+ And more...

PhoneDetectives - http://phonedetectives.co

Conduct an instant reverse phone lookup. 100% Confidentail and Instant Results!

How are viruses created? How do they spread?

Most viruses begin with a simple infinite loop.while (true){Open Internet Explorer} These exhaust memory until you have no memory to run the OS causing your PC to crash.Other more complex viruses are taught the universal pathing on windows; go to a specific directory and send the content back to the owner. Then once complete do it with the next important directory. Effectively simulating spreading as it moves from one place to another.Other viruses distract by exhausting your memory **ALERTING YOU TO THE PRESENCE OF ONE**, but there is nothing you can do to stop it as you know longer have control of your machine… and then extract your password data from your SAM File or install a keylogger to track your key-movements send the data back to the owner and then he can review the combinations of keys you have entered in a day and extract strings that look like your passwords.If you feel you’re at risk of a virus at any point. Increase UAC on your windows machine, as the virus may require your permission to do certain things. Ensure that the account that is compromised is not the bloody administrative user. Also ensure the administrative user has a password and you know it off by heart to authenticate any action on your machine.Be sure to monitor all processes on your machine. In fact press windows key + R and type msconfig. Select ‘selective startup then go to the service tab; hide microsoft services and disable the remaining services. Ultimately disallowing all programs that are not core processes. Then begin running anti-virals and anti-malware. It may also be wise to run a registry cleaner SPECIFICALLY Ccleaner. This will remove any new registry entries the virus may have written to allow itself access. Uninstall programs that are not core to the PC, if you are not sure what programs are core check online first and before you do anything back-up your machine with a system-restore point at least. If you can’t uninstall a program that is not core to your machine architecture, it is probably a virus and may require Revo-uninstaller Pro to remove it by force.Hope this makes you feel more safe.

Infected with Win 7 Security Virus. Hw can i remove it?help plz?

1. Click Start->Run or press WinKey+R. Type in "command" and press Enter key.
2. In the command prompt window type "notepad" and press Enter key. Notepad will come up.
3. Copy all the text given on this page http://justpaste.it/9qv and paste to Notepad.
4. Save file as fix.reg to your Desktop. NOTE: (Save as type: All files)
5. Double-click on the fix.reg file to run it. Click "Yes" for Registry Editor prompt window. Then click OK.
6. Download free anti-malware software from the list below and run a full system scan.

* MalwareBytes Anti-malware
* SUPERAntispyware
* Spybot S&D
* Hitman Pro 3.5

Don't forget to update the installed program before scanning.

Detailed removal guide: http://deletemalware.blogspot.com/2010/1...

Alternate removal guide: http://www.bleepingcomputer.com/virus-re...

How are new strains of viruses or new viruses created?

Without being picky its important to realise first the viruses are not 'created' variants evolve from other viruses.New viruses are emerging all the time as mutations appear in the nucleic acid codes that encode them. Some are better than their ancestors and so continue to survive but some mutations are less advantageous so they eventually become less common.Rarely a new virus sub species can emerge when two closely related viruses swap genetic information but this more commonly occurs between different sub species within the same species group. A good example of this is influenza which mutates rapidly but can also exchange genetic information randomly with other influenza viruses if they infect the exact same cell at the same time.Finally, we may see a virus suddenly appear if it is able to jump from another host into humans. An example of this is thought to be Human Immunodeficiency Virus (HIV) which jumped from monkeys (then termed Simian Immunodeficiency Virus or SIV) into humans.

Who created the first computer virus?

“I’m the Creeper: catch me if you can.” This message, which sounds like it came straight out of a Victorian nursery rhyme, is what was displayed by Creeper, the first virus in history, programmed in 1971. Today, we’ll tell you all about it!Creeper was created by Bob Thomas, a developer at BBN Technologies, which was on the cutting-edge of the emerging tech industry. Thomas programmed Creeper to test if a program could be created to move between computers. In other words, his idea wasn’t to damage PCs, and in fact, only years later was Creeper considered a virus, since this concept wasn’t applied to computers until the 80s.Computers in the 70s were somewhat bigger than today’s…But, did Creeper achieve what it set out to do?Creeper was spread through ARPANET (one of the first computer networks, used by the U.S. Department of Defense) and copied in the system, where it displayed the message I wrote at the beginning of this article. Once displayed, it started to print a file, but then stopped and switched to another PC, undergoing the same process.The Reaper code: simple in today’s terms but a wonder almost 50 years agoEven though it infected a computer when it first appeared, the effects didn’t last long: by jumping to the next PC, it disappeared from the previous one, and so on.Today, this might seem like a failure, but in 1971, Bob Thomas’ experiment received lots of attention, since the feat of getting a program to jump between PCs had never been achieved without human intervention. His success was the creation of a program that ran quickly from PC to PC… and was the reason behind creating the first antivirus program!This quote is taken from an article at Softonic that covers the story of the first computer virus. You can read the full article here.

What is virus and anti-virus?

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.andAnti-virus software are software for your computer used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Some examples of anti-virus software are Webroot, McAfee, Norton, and Kaspersky.

Bacteria or Virus. Homework help please!?

Science homework help pleas are the following bacterias or virus caused diseases or either?
1ear infection
2tooth decay
3croup
4whooping cough
5 chicken pox
6 meningitis
7 food poisoning
8 mumps
9 hepatitis
10 influenza
11 shingles
12 rabies
13 pneumonia
14 encephalitis
15 smallpox
16 strep throat
17 diphtheria
18 scarlet fever
19 impetigo
20 tuberculosis
21 tetanus
22 measles
23 HIV/AIDS
24 common cold
25 poliomyelitis
26 cold sores
27 yellow fever
28 cholera

Thank You!=]
oh and my teacher gave us permission to use ANY recourse for answers so im this is not cheating in anyway

How could the Federation beat the Borg?

Sometimes the best way to defeat one's enemy is to use their weapons against them.The best way to defeat the Borg would be to study their technology. Reverse engineer it, and apply it to our own.I mean… The thousands of species that make up the Federation, all working together. They had to be able to come up with a better understanding of Borg technology than even the very Borg. After all the Borg by becoming the Borg they lose much of what made them unique and special.Something similar, but better than section 31.A organization totally dedicated to the creation of the most advanced technology possible.Of course this would cause problems with the Romulans, seeing that to explore every frontier, then no technological field could be left unexplored. That would mean cloaking technology as well.Also I believe Star Trek lacks a spiritual factor. Nothing like the Force mind you. But the Earth is filled with so many myths about universal energies, and universal knowledge. That a area dedicated to Psi-Warfare might come in handy.Honestly I believe that Star Trek really needs some serious upgrades. Kinda like Star Trek meets Mass Effect. At least in terms of personal equipment. You know… Having suits that actually do something really advanced. Even the suit Kiera used in the TV show Continuum was way better than anything I've seen the Federation use.

TRENDING NEWS