what is the ways to infect the system by virus?
Answers were Sorted based on User's Feedback
Answer / arpan dey
1.PEN DRIVES AND INTERNET
2.installing 3rd party softwaes
3.crack,patch,keygen
4.connecting in a lan where other computer's in that network
may contain viruses.
| Is This Answer Correct ? | 10 Yes | 0 No |
Answer / sanjay singh
Very Simple Internet. If you dont have an Idea, just
download and run Antivirus Internet Security 2010 which is
not an Antivirus it is Virus.
| Is This Answer Correct ? | 7 Yes | 3 No |
Answer / princeyadav
1- do not used effected pen drive , DVD & internet.
2- install usb antivirus .
3-download ya buy update antivirus and installed the sdystem.
PRINCE YADAV
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / sumit kandpal
make virus through .bat extension in note pad apart from that there are many code to that are to be written in note pad from which you can even make a virus to crash the windows.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / bharath
Rewriteable media's,open virus related mails(spam mails)and
browse cracking related web sites.
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / afroz alam
1. Copy pen drive file without scan.
2. Use internet & download more file form net.
3. Don't use Anti Virus Software in your PC.
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / nagesh
Trough Any type of USB Device, if that device contanig the
Virus
| Is This Answer Correct ? | 0 Yes | 2 No |
Answer / pravin singh baghel
you can download new antivirus quickheal 11 trial version
to solve this problem.
| Is This Answer Correct ? | 0 Yes | 4 No |
how make a bootable dick
0 Answers Accenture, HCL, Wipro,
what is busy waiting?
Where the system time is stored? In processor or in separate timer ic for that?
directories can be implemented either special files that can only be accused in limited ways or can be implemented as ordinary data files. what are advantages and disadvantages of this approach?
when affected the system from virus , which paths will be it stored in system ?
API used to hide window
2 Answers Microsoft, TCS, Wipro,
Define dynamic memory allocation algorithm?
Let us suppose one application needs 2GB RAM to run and dependent plugins will be load while running application. Here My doubt is how many processes will create for this application. I know the concept of virtual memory, which will provide RAM on demand. My straight forward question is what is the size of the process and is it single process will create by operating system to complete the task of my application.??? Thanks in Advance.
what has triggered the need for multitasking in PCs?
Explain the ways to infect the system by virus?
Explain the reasons for implementing process migration? How is the process address space handled during process migration?
List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes?