Question about Computers & Internet

1 Answer

Set up botnet in bt5

How to set up botnet in bt5

Posted by on

Ad

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Master:

    An expert who has achieved Level 3.

  • Master
  • 151 Answers


good luck!

Posted on Mar 25, 2014

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi there,
Save hours of searching online or wasting money on unnecessary repairs by talking to a 6YA Expert who can help you resolve this issue over the phone in a minute or two.

Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.

Here's a link to this great service

Good luck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

When i push the e,b,t,a,n ,or r button on my keyboard i get e3 ,bt5,a1, r is shif and nyt


I have often deal damage keyboard, and type of damage keyboard so much. For damage your experience, a variety of ways have been tried, but the result always failed. The best solution is replace keyboard.

Based on experience, three times I fix keyboard, without having to replace with a new keyboard.

First type of damage
All keyboard keys are not functioning, or functioning left side, right side not working
Solution
Remove the keyboard, and cut keyboard cable.

12_4_2011_4_49_23_pm.jpg

Second type of damage
When laptop is powered on, the sound (tiiiiiiiiiiit) so hard. When we press a button, suddenly appeared equal. example;
I press "y", y appears =======================
I press enter, appear =======================
Solution
Press and release button ~ ` , do it
repeatedly, when turning on laptop until laptop access the operating system.
.

12_4_2011_4_57_25_pm.jpg

The result is
1. When laptop turned on, there was no sound. Laptop turns normal.
2. When I press buttons, does not appear equal to. So all buttons normal function
3. There are three buttons that do not function [ { , ] } , \ '


Third type of damage
When laptop is powered, it looks normal. After entering the desktop, buttons z, x, a, s, q, w, e, does not work. If another buttons is pressed, appear equal. example;
I press p, appear p=======================
Solution
Do not turn on laptop (about 3 weeks)
This solution does not make sense, there is no technical explanation, and this solution so strange.

The fact that I experienced
This case occurred on the Acer Aspire 4736z, OS Win XP Prof.
After laptop not turned on, more than 3 weeks, keyboard returns to normal. All buttons are functioning normally. I can not explain technically, but this case never happened.


Solutions for you
The best solution is replace keyboard.

I hope this information useful.

Dec 04, 2011 | Toshiba Computers & Internet

Tip

How Kaspersky Antivirus Works


<p>Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, Trojans, worms, spyware, adware, keyloggers malicious tools and auto-diallers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service. Windows users may download an Anti-Virus Rescue Disk that scans the host computer during booting inside an isolated Linux environment. In addition, Kaspersky Anti-Virus prevents itself from being disabled by malware without user permission via password access prompts upon disabling protection elements and changing internal settings. It also scans incoming instant messenger traffic, automatically disables links to known malware hosting sites while using Internet Explorer or Firefox and includes free Technical Support and free product upgrades within paid-subscription periods. Kaspersky Lab currently offers 1 year, 2 year and 3 year subscriptions.<br /> <p> <br> <p>Kaspersky Anti-Virus 2011 offers a number of new and improved features together with unique protection technologies to address the latest online threats, keeping your PC running smoothly and customize protection according to your activities, like advanced anti-malware technologies that allows installation on infected pcs, heuristics-based analysis monitors, that restricts and blocks suspicious program behaviour, and easy-access Desktop gadget for quick access to program features and settings whenever you need them.<br> <p> <br> <p>Kaspersky anti-virus also include some features like, real time protection against viruses and malware, scanning of web-sites and e-mails for malicious code, protection for your digital identity and vulnerability scan and treatment advice, and some basic features like zero-day attacks and unknown threats, botnets and various illegal methods of hijacking your pc and provide protection from rootkits, bootkits and other complex threats.

on Mar 17, 2011 | Computers & Internet

5 Answers

What is trojan horse virus


A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Please rate the solution if helpful. Thank you

Source: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

Jun 17, 2011 | Computers & Internet

1 Answer

It appears from amessage I received from yahoo that they think I may be a spammer. How do I prove I'm not and never have been one of those people. Now I can't send messages.to my friends.


Your computer might have been compromised and has become a botnet. Run both Hitman Pro and Malwarebytes on your computer and see if it finds any infections.

Also, change your password on your yahoo email account right away.

May 26, 2011 | Yahoo Mail

1 Answer

What link i will download to the Project Blackout Hacks??


http://www.theprohack.com/2010/07/project-blackout-v25-botnets-anyone.html

Mar 01, 2011 | Computers & Internet

4 Answers

Which is the best and free antivirus for my laptop to download now?laptop is very slow


We've been using Avast for a while with no problems. It is good at detecting viruses and it doesn't bog down the system as bad as some other anti-virus programs do.

Feb 16, 2011 | Microsoft Windows XP Professional

1 Answer

An evil. ambiguously named virus disguised as a virus protection had completely taken control of my computer. How do I get rid of it?


This is a conficker

Supposedly there are over 50,000 possible websites the conficker worm will try to contact when it activates, and there may be thousands of botnet computers that are passing it on to whoever is suckered into visiting those websites. But it has done nothing more than install itself and try to prevent its removal - and that will interfere with your use of the computer. What it does when it activates is unknown at this time.

People who have illegal or cracked copies of Windows XP or Vista cannot get critical updates from Microsoft and so they are the ones most likely to be constantly infected and affected.

If the Conficker worm is on a computer it can infect any USB drive plugged into it, and then when that USB drive is plugged into another Windows computer that has AutoRun enabled, the worm will infect the computer.

Make sure your computer has all of Microsoft's critical updates installed.

You can read what Wikipedia has to say:
http://en.wikipedia.org/wiki/Conficker

Microsoft has short technical article here:
http://www.microsoft.com/security/portal...

You can use Microsoft's Malicious Software Removal Tool (if you have it) to scan your drive and USB drives for the files the worm uses and delete them:
http://en.wikipedia.org/wiki/Malicious_s...

Click Start
Click Run
Type MRT
Press Enter.
.
Download MRT from:
http://www.microsoft.com/downloads/detai...

The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows Vista, Windows Server 2003, Windows Server 2008, Windows XP, or Windows 2000
http://support.microsoft.com/kb/890830

We are not paid for free slutions so would expect a good rating from you if you resolved your issue
Please get back to me for feedback

Feb 14, 2011 | Computers & Internet

1 Answer

Block ultrasurf


Hi,

UltraSurf is a hard one to block from ISA itself because it uses the local host computer through port 9666 as it’s proxy to intercept browser requests and encrypt them through 443/SSL traffic through your corporate proxy server. UltraSurf uses a network of anonymous proxies like Botnets that can change dynamically at any given time.

So how can you successfully block it? Well I don’t know if you can totally but you may be able to deter it a bit.
A few ways are:

Policy – Do you have an acceptable use policy in-place? If you do then I would think the threat of job loss and termination should be a darn good deterrent.

At the local host – Using group policy, restrict access to the local host site in IE. That would be 127.0.0.1 and Ultra1 that it resolves to. If you have the capability, restrict TCP port 9666 on the local host outbound. Setting software restriction in group policy is another to prevent the UltraSoft application from running.

On the ISA – Go to http://www.isaserver.bm and download Steve’s blocking anonymous domain sets and configure a deny access rule to help block anonymous proxy access. You won’t totally stop access but the list will defiantly put a damper on accessing the most popular sites.

Collective software ClearTunnel is another ISA add-on to help uncover scrupulous activity.

http://www.collectivesoftware.com/Products/ClearTunnel


Good luck!
Save a tree.

Apr 28, 2010 | Computers & Internet

1 Answer

Lost password


I just had the same issue and I put in 1234 for the password and it connect.

Mar 26, 2009 | Just Wireless Bluetooth Headset Wireless...

2 Answers

How to install windows vista home edition now online for free


Windows Vista is not a free operating system. You need to purchase the license,.

Mar 07, 2009 | Dell OptiPlex GX280 PC Desktop

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

29 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Les Dickinson
Les Dickinson

Level 3 Expert

18424 Answers

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

David Payne
David Payne

Level 3 Expert

14162 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...