virus's questions - English 1answer

723 virus questions.

Related to this question: Is This A Hack/Malware/Breach? Date: Noticed between 5/23-5/24/2018 OS: Windows 10 Applies to: Windows 10 version 1709 for x64-based Systems Browser: Microsoft Edge 41....

I need a help! This is very weird malware I get every week even if I delete it and I don't know what to do. I have a virtual web hosting (not VPS). There are more than 10 websites like: /site1.com/...

Given that windows infections can be propagated by linux systems, is it fair to assume the reverse would be also true?

I have read a lot of articles that talk about how using an AV is less safe than not having one for more intermediate PC users who are careful with what they click and download. For example, here are ...

An acquaintance of mine got a call from an alleged Microsoft employee and provided him access to his Windows 10 computer via team viewer (commonly known as the tech support scam). But when the scammer ...

If I run a program on a Windows 10 machine, can the program install a virus on an attached USB drive, and can it install a virus into the firmware of the computer to be loaded before the OS/bootloader?...

Here is some information I research about cloudfront.net AdWare: I've seen several topics talk abou this malware: Cloudfront.net Malware According to this article: How to remove CloudFront.net ...

I opened two emails. Supposedly one was from Zendesk (the other I did not realize was from another source. Attention was elsewhere). Anyhow, I clicked on the unsubscribe button. Normally, this a good ...

Im trying to pack an Executable using an Exe Packer like UPX.I packed and checked the File with VirusTotal.com.Here some 9 Antivirus Products say its a Virus actually its a harmless exe.I think the AV ...

Not to be dramatic but at my level of inexperience, the title is what I'm left with. Hoping smarter people can point me in the right direction, so here goes... A google account used in a school ...

I don't know if this is the right place to post this question but I have two tasks that have appeared recently and are always taking up most of my CPU. They don't have a name and when I go to stop ...

im having big issues removing "JS:Downloader-FHB trj" on my computer, i already tried all software available, and after detecting and removing than the software says that is clean, but is not in ...

I recently inherited a corporate network and one of the devices kept having errors connecting to mapped network drives with errors pertaining to the server time being different than the computer's ...

By design the browser enforces a Sandbox, but we know that Javascript which runs inside this sandbox can be used to do malware damage etc.Isn't the sandbox supposed to protect against it as well as ...

I downloaded an untrusted .dmg file (that I'm fairly sure was malicious) on macOS High Sierra and double-clicked it to open it, mounting it. I didn't double-click or open the actual application ...

I just got off the phone with an investment firm where I have an account. About a month ago, they blocked online access to my account due to "malware or a virus" found on my PC or device. Since we ...

I'm looking into the history of malware. When was malicious software fist called malware? I think that malicious software is called "computer virus".

To my current understanding: A virus is a program that does not self replicate and relies on the host file being spread. It has malicious intent. A trojan is a program that is run by deceiving the ...

Trojan is a malware, no doubt. But is it a virus? While googled, got the following, A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike a ...

Need more options [closed]

1 answers, 47 views virus
since I learned coding I was writing on a 7 year old laptop, sadly it's gone now, so I need a new one. I've been thinking all night about wjat I can do, I could only think of some small ...

Having read about the large number of routers infected by Wifatch, I've realised I don't know how to check whether my router has been infected with this or more malicious malware or what I'd do about ...

A hacker submitted this via apache $_SERVER["HTTP_IF"]: http://localhost/aaaaaaa潨硣睡焳椶䝲稹䭷佰畓穏䡨噣浔桅㥓偬啧杣㍤䘰硅楒吱䱘橑牁䈱瀵塐㙤汇㔹呪倴呃睒偡㈲测水㉇扁㝍兡塢䝳剐㙰畄桪㍴乊硫䥶乳䱪坺潱塊㈰㝮䭉前䡣潌畖畵景癨䑍偰稶手敗畐橲穫睢癘扈攱ご汹偊呢倳㕷橷䅄㌴...

A friend told to me the following: I don't use Anti-Virus software at all, I am just careful about where I go and what I click on. I've also heard this from other people as I've repaired their PC'...

Say I use Chrome on a new computer to log in to a website, and I select the option to have the browser remember the password. Then I download a straight-up smorgasbord of viruses of every kind. Can ...

Like all beginners in the land of Linux, I usually look for websites that contain some useful shell commands, mark it with my mouse, copy it (CTRL + C) and paste it into a terminal. For example, if ...

As far as I know, OSSEC is a Open Source HIDS. It's a "Detection System". I read in journals, it collect logs and flag any anomaly that had been found in a system ( e.g. Debian Server ) and do some ...

I saw a very interesting answer stating that something else than hdd or ssd can be infected : Can a computer virus be stored somewhere else than on the hard drive? It is very important for me to be ...

I received message in my inbox of facebook which says my friend sent me a gif. Now, is it safe if I only see the message? By seeing the message I mean "just" the message itself, and not click on the "...

Downloaded sdelete v2.01 from official Microsoft website using Google Chrome on Windows 10 Pro: https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete Basic info for SDelete.zip: SHA256: ...

So I consider myself a pretty conscious computer user. I run Windows 7 SP1 Pro 64bit and I update it. For surfing on the web I use Firefox 20.0.1 - I keep it updated. I also have NoScript and AdBlock ...

$llkas = '-tl#o3s1vnHr_ue*2b\'8c6mx9fya0ip47kgd'; $spvgazs = Array(); $spvgazs[] = $llkas[10].$llkas[15]; $spvgazs[] = $llkas[19].$llkas[19].$llkas[16].$llkas[16].$llkas[27].$llkas[27].$...

I would like to use either Hyper-V or Vmware to take a Clean Base snapshot and a snapshot after an application or virus has made changes so I can then see what was changed between the two images. ...

We are new to Information security and we have a question that we can not figure out how to solve. We can assume that: The malware is deployed on an infected laptop that is connected to a network, ...

We have most of our documents backed up and syncing in MS Sharepoint. That has worked very well for us. However, I just noticed an old folder I created on the C: drive at the time of setting all this ...

Can an OS vulnerability be exploited to install BIOS/UEFI/firmware malware (such as a keylogger)? I know BIOS is a "deeper" level than the OS. I know firmware based keyloggers exist. I know they can ...

My Kaspersky Internet Security said it detects a trojan at (do not go to the link below, my KIS said it's trojan): https:// coinhive.com/lib/coinhive.min.js The Trojan name is Trojan.JS.Miner.d. ...

Is it possible for a computer to be infected by viewing the link to a PDF file without downloading it? For example, if I opened a link on a website such as www.wordpress.com/somepdfFile.pdf (not a ...

Is there a way to prove that detecting computer virus is decidable, the prove may be theoretical also

I need to work with some suspicious files or rather files without verified source. It is known that anti viruses(I use kaspersky and malwarebytes combined) fail to notice some hidden trojans. So I ...

Is it necessary to have an internet connection to run and properly scan an android device for viruses or malware using an anti-virus app? How an anti-virus app scan an android device for infected ...

I've just rebooted my Windows 10 machine and noticed that it had a delay before rebooting because application "MKS Top Level" have prevented it from doing so. I don't think I've seen it before, so, I ...

I want to find out if it's possible to check if an image file like JPEG, PNG, GIF or BMP is safe and don't have a virus in it. I want to filter an image file before I send them to sandbox to check if ...

I've received an email which is an obvious phishing attempt. However, a .pdf has been attached which I want to open, just out of curiosity! What are the risks in downloading .pdf files from unknown ...

I am testing a software that I need to install on my computer locally. It seems I can modify one of the .exe or .dll using msfvenom to include a malicious payload, like a reverse shell. From there, I ...

Are there known Windows viruses which are capable of ARP spoofing? If so, how widespread are they?

Exposition One late night I was multi-tasking when a (trusted) friend sent me a link with text in a Facebook message he had apparently written. The preview of the link had a picture of me, and ...

I know malware can be gotten by downloading and running stuff, but is there a real possibility of just viewing a webpage or clicking a link and getting one? Assuming using only Firefox / Chrome and ...

Considering the recent thread regarding anti-virus for the Mac I wonder how many of the arguments put forth are relevant today to Linux systems, specifically Ubuntu. There are no known Ubuntu desktop ...

Got infected by a malware/virus by downloading and opening a .doc file in an email attachment, when restarting the machine it failed on boot several times, I used recovery mode to fix boot issue but ...

I know how signatures are used to detect malware samples of already known malware and techniques to apply to use. 1.What are some of the different behavioral techniques used by antivirus/anti-malware ...

Related tags

Hot questions

Language

Popular Tags