Virus & Spyware
How does pushdo Trojan infest system? My system is showing some kind of behavior recently, when I contact a friend about the behavior he said that the behavior may be cause by pushdo Trojan. How complex is this Trojan than the other Trojans? What is the best security strategy can be implemented against the Trojan?
- 858 views
- 1 answers
- 0 votes
Why is Panda global security 2015 corrupting my files? I recently installed Panda global security 2015 on my personal computer and the security software is corrupting most of my files. I run the application to scan the whole PC, after the scan most of the files won’t open with their default program. How can I resolve this problem?
- 537 views
- 1 answers
- 0 votes
Why is bitdefender total security blocking my internet connection? I recently installed bitdefender total security 2015 on my laptop and I was unable to connect to the internet afterward. I have checked the firewall setting to see if it was responsible, but I did not see any thing to suggest that the firewall is blocking my connection. How do I troubleshoot to find out the reason for this problem?
- 2024 views
- 1 answers
- 0 votes
I have an email client that downloads all my emails, the recently I received an email with a key encryption tha I had to enter in-oder to read. Later the computer started to respond slowly and I suspected it to be a malware, is it possible to get a malware in an encrypted file? if so how can the anti-virus scan for encrypted files without the key for decription? How can I safegurad myself against threats from such malwares
- 648 views
- 1 answers
- 0 votes
I have a Dell laptop that has Windows 7 64 bit as it operating system. I downloaded the Microsoft Security Essentials from the Microsoft website to work as my anti virus. Is Microsoft Security Essentials enough to protect my laptop from the viruses and malware? If not, which are some good and free anti virus programs that I can use?
- 1007 views
- 2 answers
- 0 votes
What does zero day or zero hour attack or threat means? What are its targets? Can a zero day attack be targeted at private or some to large corporation? Can someone be vulnerable through the opening of e-mail attachment? What rigorous security and personal strategy can be implemented to prevent a zero day or zero hour attack? What different vectors are used in zero day attacks?
- 745 views
- 2 answers
- 0 votes
How is stuxnet designed to attack industrial programmable Logic Controllers (PLCs)? What operating system is at the most risk? Can stuxnet be a threat to a corporation that strictly forbids the use of USB drive on its systems? How long can stuxnet stay in a system without causing any damage? Is there any variant of stuxnet?
- 660 views
- 1 answers
- 0 votes
Can Hook based anti spyware work against kernel based keylogger? What is the difference between hook based keylogger and application programming interface (API) based keylogger? Which is more powerful, kernel based or hook based keylogger? If a network administrator want to use keylogger on the network, what keylogger should he use? What is the best protection against kernel based keylogger?
- 527 views
- 1 answers
- 0 votes
What is the major difference between worms, virus, malware and Trojans? Which is the most dreaded? What security and personal strategy are best in fighting viruses, Trojans and worms? Can a system be infected without access to external networks (For example Internet)? What measure should be used in case of infection?
- 547 views
- 2 answers
- 0 votes
What is the difference between anti keylogger and conventional virus software? Which of the two is the best for fighting system keylogger? How do I detect the presence of dangerous or ordinary keylogger in a system with or without antivirus software? Can keylogger reside in a system with good anti virus software?
- 513 views
- 1 answers
- 0 votes