Question about Computers & Internet

1 Answer

Iwant to kill exploit solve now - Computers & Internet

Posted by on


1 Answer

  • Level 1:

    An expert who has achieved level 1.


    An expert that hasĀ over 10 points.

    Problem Solver:

    An expert who has answered 5 questions.

  • Contributor
  • 7 Answers

Install an anti virus

Posted on Feb 03, 2009


1 Suggested Answer

  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

a 6ya Technician can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repair professionals here in the US.
click here to Talk to a Technician (only for users in the US for now) and get all the help you need.

Posted on Jan 02, 2017


Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:

1 Answer

I have a problem i think a virus entered my mobile and it consumes the battery life of my mobile and also it some stuff like volume pops out even do i dont want it to and it just bothers me how annoying...

Although there are some exploits for some phone operating systems which exploit vulnerabilites to get data off the phone, they are rare and usually require executables. With these exceptions there are generally no viruses on phones in the manner you suggest.
Your phone runs on Android, which has a tendency to allow many apps to run at once if they are not closed. Try restarting your phone regularly to clear the cache of running programs, and delete any unwanted apps. It may also be worth installing a "task killer" app (search the app store) to remove apps that may be using power you don't want them to.
HTC phones are also quite power hungry in general, and battery life gets worse as the battery ages. You may just need to charge the phone more to solve this problem, though the battery can be replaced with a new one

Mar 29, 2011 | HTC Touch Diamond Smartphone

3 Answers

1hits kill zombies

Gus2 ko mag ka 1 hit kill zombies

Feb 19, 2011 | Crossfire Fixed Low Pressure N2 Peanut...

2 Answers

What's trojan horse .I found that name in after my scan.

The Trojan is a type of virus. You know, like the Trojan Horse legend ... the Greeks sheltered in a huge wooden horse presented as a gift to the people of the city they were trying to conquer and when the people of the city brought the horse in, the greeks killed them all. The same idea is with this Trojan virus. It hides in an suspicious program and when you run that program it starts to do some damage.

Oct 07, 2010 | Computers & Internet

1 Answer

I try 2 play a Lifetime downloaded demo game and computer keeps saying, cant run multiple instances of this application, but I am not, that I know of. What does this mean and how do I fix it?

1. try restarting comp
2. if the game is already running the name of it such as "game.exe" will show up in the processes tab of your task manager. kill the process and try to play the game again
3. the game is being confused with another program or critical system process (this can be caused if the game is actually a rather poorly written virus trying to exploit operating system and/or other processes)
4. if you do not find the game process in the list then I will need more information about the game and/or where to get it so I can test it myself.

May 20, 2010 | Dell Computers & Internet

2 Answers

Iwant my old yahoo classic back...i hate the new yahoo...iwant th


To switch to Yahoo! Mail Classic (Old Yahoo), on you Yahoo Mail page click the Options link in the upper right corner between Help and Mobile, then click the Switch to Yahoo! Mail Classic link.

More details:

Hope this solves your problem. For more details, click on this link Thanks.

Nov 12, 2009 | Yahoo Mail

1 Answer

Snow Leopard 10.6 Anti Virus

I recommend to instal McAfee VirusScan for Mac. McAfee VirusScan for Mac includes detections for exploits, viruses, trojans, worms, and spyware that threatens Macs, PCs, and Unix systems. On access scanning provides realtime protection while drag and drop scanning facilitates a quick check of newly downloaded files. McAfee VirusScan for Mac retails for approximately $37 per license with discounts for bulk purchases

Aug 27, 2009 | Computers & Internet

1 Answer

Software to hack wep

Verifying your network security isn't a trivial task.

Although WEP has some know vulnerabilities which can be exploited WPA is significantly stronger, and can generally only be broken by brute force password cracking or other nefarious means.

You have not indicated your operating system however the following web page has numerous links and descriptions of some of the software available for Unix and Windows

Mar 02, 2009 | D-Link AirPlus Xtreme G DWL-2000AP...

1 Answer

I have compressed folders to save disc space,

Well honest answer is..., its almost impossible to do anything to improve that pc of yours. 128mb ram and 256mhz cpu and 12gb HDD, im sorry to say but better to kill that on for good.

If you install another anti virus program make sure that you uninstall the one you alredy have installed, never use 2 antivirus program together

Good luck to you

Jan 28, 2009 | Compaq Armada M700 Motherboard

1 Answer

W32 Virus

Kaspersky AntiVirus is Best ....

Download Kaspersky Antivirus and your problem will be solved...

Dec 20, 2008 | Microsoft Windows XP Professional

1 Answer

Bloodhound Exploit Virus

The Bloodhound.Exploit.6 virus is a Microsoft Internet Explorer/Outlook Express vulnerability discovered in February 2004. The vulnerability results from the incorrect handling of HTML files embedded in CHM files. (CHM is the Microsoft-compiled HTML help format.) However, because of Norton Antivirus' (and other antivirus programs) ability to detect virus patterns, this heuristic detection of viruses can sometimes lead to false positives.  

In most cases the antivirus program detects the virus in Temporary Internet files that have been downloaded from a web page. Such as:

C:\Documents and Settings\UserName\Local Settings\Temporary Internet Files\Content.IE5\KXURSTI7\10523[1].htm 

In these cases, the Bloodhound.Exploit.6 ends up being a false positive detection of a virus. It looks like a virus to the scanner, but in reality it isnt. Now although the exploit is a real threat and can cause damage to a system, these false positive diagnoses from the antivirus software usually are the cause. I have had web pages and even corrupted Hijackthis logs cause this false positive from the antivirus program.

If Norton Antivirus' AutoProtect Settings are set to High for Bloodhound, the program will produce false positives for many files. The default level is recommended for most protection.

Oct 18, 2008 | Televison & Video

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

34 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers


Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14162 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides