• HELP! My personal settings have dissapeared!

    Somebody was on my system and viewing pages they should not have been and now I have a virus. A window comes up that says Resident Shield Alert c:\windows\system32\phc5j4j0ee5l.bmp,it also says threat name is "trojan horse Generic_c.0YJ. I've tried doing a system restore, but that didn't work and...

    Professional Solutions5 pointsBadges:
  • My Microsoft Word Docx file got damaged due to a virus

    My word Docx file got damaged due to virus infected Docx file, I have crucial important data lost so how to repair corrupted Docx files. If you have any solution for recover and repair my corrupted Docx file, please assist me.

    KimiUzumake5 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • Registry Replace

    Recently, on my laptop, I got a few viruses. Some of the registry keys have been notoriously difficult to remove. These are strains that AVG anti-virus, Spybot Search and Destroy, McAffee, and Trend Micro weren't even able to get rid of...and I had to do manually. With that in mind, I'm sure there...

    Schmidtw11,330 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • Expiro Invading Network

    The Expiro virus has invaded my network. What should I do?

    RamseyB2,115 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • What are some of the best practices in handling computer viruses?

    I know this might sound like a broad question but I'm looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I'm not looking to talk about the prevention of viruses but...

    ITKE346,470 pointsBadges:
  • Skipped Items

    Why when I run a full scan, there is a large number of, "skipped items"? Does this mean that these items are not being evaluated for possible viruses?

    jackkrol5 pointsBadges:
  • My software is being detected as a virus

    I've recently created a program but after a few hundred downloads, my Nod32 antivirus is detecting it as a Win32/Agent.NFIWJLP trojan. Can someone help me before my program doesn't get deleted by the antivirus software? My program mimics the user's interactions with the PC at a scheduled time....

    ITKE346,470 pointsBadges:
  • Are older viruses removed from virus definition files?

    I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...

    ITKE346,470 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE346,470 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Uninstall virus

    How do I uninstall the MWdefender from a computer?

    kokedi30 pointsBadges:
  • Virus

    What languages are virus's most written in?

    guslepe265 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • virus or malware

    I have a pop-up reminder that I need to know if it's a virus/malware or something else. Can i send a screen shot?

    mesak5 pointsBadges:
  • removing virus

    how can remove virus from computer .

    nc1234545 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • I just narrowly avoided getting scammed (corrupted files)

    I got a phone call from people impersonating some kind of tech support company. I was redirected to http://www.ammyy.com where I downloaded an .exe file which granted them remote control of my computer, and they then proceeded to use said program to run a scan for viruses, spyware and corrupt...

    0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following