LT   EN   RU  
Wednesday 23 October 2019 Straipsniai.lt - Independent and informative portal
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 66080961
Pages in Straipsniai.lt: 40735
  Viruses
 
avast! Virus Cleaner

If you have deleted a virus or worm file associated to a vital file type - and now you cannot run your applications anymore, avast! Virus Cleaner may help you as well. All you have to do is run avast! Virus Cleaner "somehow". If, for example, only the association for .EXE files has been corrupted, you may run the avast! Virus Cleaner by renaming it to a .COM file. The other extensions you may try are .SCR, .BAT, .PIF (on...

Computer Virus Help

A computer virus is a program that requires a host in order to make copies of itself on computer disks. Viruses may infect (copy to, and spread from), program files, programs in disk sectors, and files that use macros. The ability to self-replicate distinguishes viruses from programs that do not, and this parasitic nature is neither an accident, nor a computer glitch. All viruses are created by people who know how to write computer programs. The first theories about the possibility of creating a self-replicating program date back to 1949, and experimental viruses were first programmed and tested in the...

e-Mail Viruses ("Worms") & Junk ("Spam")

As the Internet has grown in popularity, e-mail has evolved from a convenience enjoyed by a few to a necessity for almost everyone. The vandals who used to write virus programs, which are spread by infected files and disks, have changed their tactics to take advantage of the universality of e-mail. They now write "Worm" programs, and have invented new ways to use e-mail to spread them. An e-mail "Worm" is a stand-alone computer program, similar to a virus, in that it spreads from one computer to another. However, unlike a computer virus, a "Worm" does not need a host (program)...

Trojans, Viruses & Worms

AntiCMOS infects the hard disk's Master Boot record, and the Boot Sector of floppy disks. If an infected floppy disk is in the A> drive at boot-up, the virus program in the Boot Sector (Sector 0) will be read into memory. The virus then takes control of the system, and infects the hard disk. AntiCMOS does not infect files, and reserves 1Kb of memory in an infected computer; CHKDSK will report 1Kb less total system memory than normal. It infects floppy disks that are either read or written to, if they are not already infected, or write-protected. When AntiCMOS infects...

JPG (JPEG) Viruses

What is a "Proof of Concept" virus, and should you be worried about this one? A "Proof of Concept" virus is one that is written by a person with advanced programming skills, to demonstrate that something new can be accomplished. Most often, they are sent to an anti-virus vendor, as if to say, "So there!" and no others are created, except by amateur vandals who produce and circulate hacked copies. The reality of going from a proof of concept to an everyday concern takes time, and does not always work. Concept (the first Macro virus) was gleefully presented to the...

Preventing Virus Problems

Keep a log of what you do to learn which applications are most important to you. Although you can restore them from their installation CDs, that does not mean they'd work the way they do now. So if you have re-configured any, you'd need to find out how and where they store that data, in order to back it up. Make backup copies of files on your hard disk. All hard disk files would be best. Some files may already be backed up (in effect) on original installation disks, but most important are the files you create with your applications....

Viruses Multiply Like Rabbits

There are more than 55-65,000 different viruses created by 10-12,000 programmers on the World Wide Web. The number of writers of destructive programs is growing every day, as it is fairly easy to create a virus. However, there are very few of those who fight viruses. The writers of viruses live in almost all industrialized countries of the world. Viral epidemics outbreaks took place in the countries which did not have well developed Internet systems. As an example, such epidemics...

How Computer Viruses Work

Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become. For example, the thing making big news right now is the Mydoom worm, which experts estimate infected approximately a quarter-million computers in a single day. Back in March 1999, the Melissa virus was so...

Making The Time Fit The Crime

The computer virus may just be the modern plague that afflicts the upcoming millennium. The "infection" numbers are staggering. The annual damage cost associated with viruses was estimated at over $1 billion for last year and is expected to rise to $2 to $3 billion in the upcoming year. One survey found that 98 percent of North American businesses have been infected by the over 6,000 types of viruses that are currently cataloged. One virus, Concept, is believed to have infected nearly one half of all companies nationwide within one year. While once seen as pranks or the products of...

Viruses. What They Are, How They Get There and How to Protect Your System.

Guilty. With that word, on January 22, 1990, Robert 1. Morris Jr. became the first person to be convicted under a new federal law designed to protect computer systems from malicious break-ins and viruses. Morris was responsible for the "worm" unleashed November 2, 1988, on computers connected via the ARPANET electronic network. Thousands of computer systems locked up as the worm reproduced itself and spread to other computer systems. Indeed, the worm was so prolific that many systems were forced...

Map