Q. help i need help with this
What is the Ajax virus??
What is the Berlin virus??
What is the Bow virus???
What is the cinderella virus???
what is the cracker jack virus?
What is the crazy imp virus?
What is the Doodle virus?
What is the black knight virus?
What is the Anthrax virus?
What is the acme virus???
if you no any of these please answer them and tell me which virus it is and the affects on software and hardware
What is the Ajax virus??
What is the Berlin virus??
What is the Bow virus???
What is the cinderella virus???
what is the cracker jack virus?
What is the crazy imp virus?
What is the Doodle virus?
What is the black knight virus?
What is the Anthrax virus?
What is the acme virus???
if you no any of these please answer them and tell me which virus it is and the affects on software and hardware
Answer
Ajax:
It displays advertising pop-ups based on the searches made by the user through Google. It is downloaded when visiting a certain website.
Cinderella:
Cinderella II was found in the end of 1992 in Finland. It's partially based on the original Cinderella virus.
Cinderella II activates after it has infected 1000 files. At this time it tries to overwrite part of the hard disk but fails due a programming error. After this it prints the text "Cinderella II" until the machine is rebooted.
Crazy Imp:
This virus has not been fully analyzed yet. It is able to hide increase in length of infected files, but it is not a full "stealth" virus.
Doodle (Yankee Doodle):
Yankee Doodle is an overwriting, memory resident, file infecting virus. It infects .COM and .EXE files.
Black Knight:
Black Knight is a computer virus written for the Commodore Amiga. It is a simple bootvirus (A bootvirus is a small program which copies itself unauthorized to the bootblock of unprotected floppy disks. The bootblock of a floppy disk contains 1024 byte of programcode. This code is the first thing the AmigaDOS executes if you put in a floppy disk.).
Anthrax:
The self-propagating worm is carried in an email which is written in Spanish, with the words 'Antrax Info' in the subject line, according to a report on Reuters.
When activated the worm will email itself to every address in the users' address book. However, according to anti-virus vendor Sophos it was around long before the current anthrax-related scares and major anti-virus vendors already protect against it.
Acme:
Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name. Acme is a variant of Clonewar, a spawning virus. Acme is also perhaps a descendant of the small single-step infector Zeno, which is not to be confused with the Zeno programming language.
Ajax:
It displays advertising pop-ups based on the searches made by the user through Google. It is downloaded when visiting a certain website.
Cinderella:
Cinderella II was found in the end of 1992 in Finland. It's partially based on the original Cinderella virus.
Cinderella II activates after it has infected 1000 files. At this time it tries to overwrite part of the hard disk but fails due a programming error. After this it prints the text "Cinderella II" until the machine is rebooted.
Crazy Imp:
This virus has not been fully analyzed yet. It is able to hide increase in length of infected files, but it is not a full "stealth" virus.
Doodle (Yankee Doodle):
Yankee Doodle is an overwriting, memory resident, file infecting virus. It infects .COM and .EXE files.
Black Knight:
Black Knight is a computer virus written for the Commodore Amiga. It is a simple bootvirus (A bootvirus is a small program which copies itself unauthorized to the bootblock of unprotected floppy disks. The bootblock of a floppy disk contains 1024 byte of programcode. This code is the first thing the AmigaDOS executes if you put in a floppy disk.).
Anthrax:
The self-propagating worm is carried in an email which is written in Spanish, with the words 'Antrax Info' in the subject line, according to a report on Reuters.
When activated the worm will email itself to every address in the users' address book. However, according to anti-virus vendor Sophos it was around long before the current anthrax-related scares and major anti-virus vendors already protect against it.
Acme:
Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name. Acme is a variant of Clonewar, a spawning virus. Acme is also perhaps a descendant of the small single-step infector Zeno, which is not to be confused with the Zeno programming language.
How do computer viruses spread? will the info i backed up infect a new computer?

Ember Halo
i just found out that my computer was riddled with viruses & spy ware--to the point that it's basically trash & the hard drive needs wiped & reformatted to even have the possibility of being functional again...
i'm not sure what kinds of viruses they are, but the guy stopped looking after finding 3 particularly nasty ones & 2 versions of spy ware... and he's concerned that a virus might even disguise itself as part of the hard drive & end up "hiding" during the wipe & reformatting, only to replicate & mess up the computer again...
anyhow, i have another computer & so i'm getting rid of the bad one--thing is, i'm worried that my pictures & other data & programs that i backed up might contain the viruses & then infect my new computer? is there a risk of introducing the viruses in this manner?
i'm not familiar with viruses, so if this is a stupid question, please humor my ignorance! thanks!!
the thing is--the infected PC won't even start UP anymore--none of the data on it is retreivable at this point. i did back up many files a while ago, before i started having such problems with it... the only stuff i have left is all on ZIP drives & CDs. i really want to save the info (mostly the pictures & home business records) but am scared of infecting the new comp... :(
Answer
not an ignorant question at all. viruses take on many forms and some even have the ability to replicate themselves after a complete wipe. If you backed stuff up while infected its most likely the backup file is infected too and should be destroyed as well. most viruses are designed for the damage factor,meaning to disable the operating system or dirupt its function so most viruses will not infect pictures or files that cannot execute their program. they will lodge in winlogon file windows.exe and file that is needed to start the computer since these files are mainly .EXE files. so the virus will disguise itself as a say; example : iexplore.exe file. when you start internet explorer the virus will execute and infect the area it was targeted to infect.
not an ignorant question at all. viruses take on many forms and some even have the ability to replicate themselves after a complete wipe. If you backed stuff up while infected its most likely the backup file is infected too and should be destroyed as well. most viruses are designed for the damage factor,meaning to disable the operating system or dirupt its function so most viruses will not infect pictures or files that cannot execute their program. they will lodge in winlogon file windows.exe and file that is needed to start the computer since these files are mainly .EXE files. so the virus will disguise itself as a say; example : iexplore.exe file. when you start internet explorer the virus will execute and infect the area it was targeted to infect.
Powered by Yahoo! Answers
Comments :
Post a Comment