Tag Archives: boot
The 5 Most Common Types of Viruses
Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.
Trojan Virus
Worms
Macro Virus
Boot Sector Virus
File Infector Virus
Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
Worm A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.
Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.
Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.
File Infector Virus As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.
How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.
The 5 Most Common Types of Viruses
Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.
Trojan Virus
Worms
Macro Virus
Boot Sector Virus
File Infector Virus
Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
Worm A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.
Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.
Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.
File Infector Virus As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.
How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.
How to perform Windows Vista password recovery safely and quickly?
As a common pc user, do you have the habit to set password for Windows Vista so as to stop unauthorized users to access to your private files on computer? Have you ever forgotten your Windows Vista password, like forgetting the password you reset for computer after one logs on with your previous original password? What do you do to perform Windows Vista password recovery and regain access to computer?
Do you reinstall your computer when you find your Windows Vista password lost? I believe that few of pc users want to choose this method as there often are some precious images and files stored on computer. If you dont intend to reinstall the computer, Windows password recovery software is an available option for you to reset Windows Vista password. It can help you to perform Windows password recovery safely and quickly with a bootable CD/DVD or USB flash drive. And it doesnt require installation in your computer.
In the following passage, Ill introduce you how to reset Windows Vista password with Windows Password Recovery. Follow the guide to recover lost or forgotten Windows password if your computer operating system is Windows Vista.
Step 1. Download and burn bootable CD/DVD with ISO image file. Download Windows Password Recovery and decompress it. Youll find an ISO image file, and then use it to burn a bootable CD/DVD with burner software. And after burning, insert the burned CD/DVD in the computer you want to perform Windwos vista Password recovery. Note: The recommended burner is BurnCDCC, but you can also use other popular burners like Nero, Sonic, Roxio.
Step 2: Set BIOS to boot from CD ROM Before resetting Windows Vista password, you need to set BIOS to from CD at first. If you dont know how to, please do as follows: 1st. Start computer and press F2 or Delete to enter BISO setup during the initial startup screen. Note: The key pressed to enter BIOS is different based on manufacturers, but F2 or Delete are the most common keys. 2nd. Use the arrow keys to select the Boot tab, and then select Boot Device Priority and press Enter. 3rd. Choose first boot device to CD/DVD, and then press F10 to save settings. The computer will restart with the changed settings automatically.
After the computer restarted after BIOS setting, you can see the interface of Windows Password Recovery under Windows PE. All the user names will be displayed, and the passwords show unknown or empty. Unknown means you have a password for the user name, maybe you lost it. Empty means you do not have a password for the user name, you can login the account without password.
Step 3: Select one account which you want to reset its password, and then click Reset button. Step 4: Click Yes to confirm you action. The password will be removed in a minute, which means you can log on your Windows Vista again without password.
In fact, instead of recovering your original password, this Windows password recovery software allows you to remove your original password, and then reset Windows Vista password. It is very easy-to-use Windows password recovery software, especially suitable for those who have little computer skill to reset lost or forgotten password.