Question about Microsoft Windows XP Professional

1 Answer

How can I protect in real-time a network drive from Viruses, etc?

I have a public network hard drive (independent). If someone with an infected computer uses the drive it can often get full of virus, autorun.inf, etc. I haven't found software that will real-time protect the drive as it would a fixed drive. Can anyone tell me how I can do this?

Posted by on

  • jivannaveen May 14, 2010

    I have avira pro but it doesn't monitor a network driver

×

Ad

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    President:

    An expert whose answer got voted for 500 times.

  • Contributor
  • 1,070 Answers

Hello Brother,
You may Need to Purchase an Antivirus for Better Performance.
Go to this Site Click and Choose your need. And first only try the Antivirus for 30 days.To obtain Free Licence Click here(you need to Enter this key for Downloading).After installing Scan your PC.if you still cant Remove threat ,then you need to Purchase.And make sure Always Update your Antivirus for Better Performance.
Or try Free Software Click here(Avira) or Purchase Click..
Make active your Antivirus Active all time...
Another Solution here

  • Click this Link
  • Extract this file
  • Run it
  • You will see a DOS command
  • Continue
  • Auto run Problem will be Solved
Go to this link for More Information If this Helped you RATE me..Thanks for Contacting FixYa..

Posted on May 14, 2010

  • shafi
    shafi May 14, 2010

    Why don't you Tried last Solution brother...??
    First do modes as i said........Hope you will find it.....

×

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of.(from cars to computers, handyman, and even drones)
click here to download the app (for users in the US for now) and get all the help you need.
Goodluck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

C:\windows\system32\KHATRA.exe error problem. from XP sp/2


Hi. WARNING !!!! KHATRA.EXE is a VIRUS!!

I HIGHLY reccomend that you go to microsoft's website, and download microsoft security essentials.

This is a highly efficient anti-virus/anti-spyware, and anti-malware program, that not only will keep your computer clean, it will provide real time protection against all known threats!


Khatra.exe is actually part of a group of files that will be located in the located in the windows/system32 directory

Khatra.exe, gHost.exe, and xplorer.exe

Here is the solution on how to remove them

Download this program, it is called Stopzilla, and it will clean and disinfect your entire system.

Here is a link for the program: http://www.virusremovalguru.com/software/stop.php

It is really good for this type of viruses.

It also will not conflict with microsoft security essentials, so you will have anit-spyware and anit-virus that can run independent scans at the same time!

I hope this helps.

If you cannot access the internet, due to the infection, use someone elses computer, download the files for both programs, and burn them onto a cd, this way you will also have an emergency rescue type disk, should this happen again.

Jan 24, 2011 | Computers & Internet

Tip

How to remove a virus - free virus protection/removal software


<span>How to Remove a Virus With Software Recommendations</span><br /><br />In this tech article I will go over methods to protect and remove viruses from your computer. Viruses can cripple a computer and steal your personal information. You should protect your computer at all times and learn what and what not to do on the internet. <br /><br /><span>Free Virus Protection Tools</span><br />The following programs are free and highly recommended. <br /><br /><a href="http://www.safer-networking.org/en/index.html">Spybot Search and Destroy </a>- This tool will scan and clean your computer from spyware. It will also run actively in the background to protect against infection. <br /><br /><a href="http://www.malwarebytes.org/">MalwareBytes </a>- You can use MalwareBytes to remove all forms of viruses from your computer but it cost extra to have the real time protection. Nonetheless, a very good tool and free to use. <br /><br /><a href="http://www.avg.com/us-en/free-antivirus-download">AVG Anti-Virus</a> - The basic software is free and provides protection against viruses and spyware. It also has link scanning which can come in handy. <br /><br />It is important to keep these software utilities up to date with the latest virus definitions needed to protect and clean your computer. <br /><br /><br /><span>Removing Viruses</span><br /><br />-If by some chance you are already infected or the programs happen to let your computer get infected(not likely) then you need to take certain steps in order to completely remove the virus. If you have <span style="font-weight: bold;">System Restore</span> active in Microsoft Windows, you can restore the computer to a state before the infection. Afterwards, do complete scans of the computer using the programs above.<br /><br />-Malware will stop anti virus programs from running, and other basic computer functions needed to remove viruses like Task Manager and System Restore. If you are at a point of infection where you can't use any of your basic computer functions. You will need to boot the computer into Safe Mode without Networking(no internet). Once you boot into safe mode, run system restore or your virus removal programs. <br /><br />-You can boot into safe mode by continually pressing F8 as the computer is booting up. Then choose the Safe Mode option. <br /><br />-Be careful when using Facebook. There is a new trick going around to spread nasty viruses. Basically, the facebook app pretends to show you who your top friends are. There are no programs that can do this so if you see anything like this come your way, do not click it. Also, do not login to any facebook login except at the main facebook site. If you click on a link in facebook it may take you to a fake login page so be wary.<br /><br />-Be careful when clicking attachments in emails. Only open attachments from people you trust. Be sure to scan the attachments before you actually run/open them on your computer.<br /><br />-Be careful when downloading programs from websites you are not familiar with.<br /><br />-Make sure to keep Microsoft Windows up to date. New viruses and exploits are created monthly and Windows updates is a first line of defense.<br /><br />With these tools and tips, you should now be better protected against virus infection. I hope this article was informative. Be sure to check out my other tech articles by clicking on my profile name and then click Tips inside of my profile. <br /><br />Regards,<br />G33k<br /><br /><br /><br /><br /><br /><br /><br /><span>Keywords</span><br style="font-weight: bold;" /><span style="font-weight: bold;">How to remove a Virus, how to remove virus, remove a virus, how to remove a computer virus, how to remove malware, remove virus, removing viruses, Trojan remover, free virus removal, free virus software, free virus removal software, free virus removal tools, free virus tools, virus protection</span>

on Jun 22, 2011 | Computers & Internet

Tip

Features of Quick Heal Antivirus


<p>Scans and Cleans already infected PC before installation.<br /> <p>Sensor technology detects worms even before virus definition are created for them and also successfully removes the changes done by them. It will protect your pc from Internet Malwares and protect your pc against viruses while you are surfing the Internet i.e. Adware, Spyware, Riskware, Hack Tool etc.<br /> <p> <br /> <p>Quick Heal scans and cleans both incoming and outgoing email messages and scans compressed files and compressed executables files.<br /> <p> <br /> <p>Quick Update module updates Quick Heal and protects your machine against recent viruses. Incremental update and updates your Quick Heal quickly and keeps you protected. It has an integrated protection for MS Office 2000/XP. It maintains comprehensive log of all activities like updates, boot up, sensor scan. Smart memory scanner traces and displays the infecting application name in the event of infection.<br /> <p> <br /> <p>Some other features are Self Protection - Self Protection feature protects Quick Heal files, folders, configurations and registry entries against malicious activities, and also from getting tampered.<br /> <p> <br> <p>USB Drive Protection - Malwares that spread by exploiting the autorun feature of removable devices are on the rise, and USB drives (memory stick, flash drive, portable hard drive) have now become carriers of autorun malwares. USB Drive Protection safeguards your system against such malwares by disabling the autorun feature.<br> <p> <br> <p>Browsing Protection - The Browsing Protection feature protects your computer from threats occurring through malicious websites.<br> <p> <br> <p>Entertainment Mode - Suppresses prompts across all Quick Heal modules and reduces system load which makes activities like playing games, watching movies or presentations uninterrupted without compromising the security of the computer.

on Mar 26, 2011 | Quick Heal Technologies Quick Heal...

1 Answer

Kinds of computer virus


from your question, what are the kinds of computer viruses, here is the detailed explanation:

Computermag-glass_10x10.gif viruses are generally defined as a program inputted into a computer that allows replication of the program installed. As it replicates, the program intentionally infects the computer, typically without even the user knowing about the damage being done. A virus, unlike worms or Trojan horses, needs an aid to transfer them to computers. Viruses usually take a large amount of computer memory, resulting into system crashes. Viruses are categorized to several parts based on its features.
Macro Viruses A macro virus, often scripted into common application programs such as Word or Excel, is spread by infecting documents. Macro viruses are known to be platform-independent since the virus itself are written in language of the application and not the messagebox_info.png operating system. When the application is running, this allows the macro virus to spread amongst the operating systemsmag-glass_10x10.gif. There are thousands of macro viruses that exists, and each are considered major threats. Examples of these viruses are: Melissa.A and Bablas. pc.
Network Viruses Network viruses rapidly spreads through a Local Network Area ( messagebox_info.png LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQLSlammer.
Logic Bombs The messagebox_info.png logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.
Companion Viruses Companion viruses takes advantage of MS- messagebox_info.png DOS. This virus creates a new file with typically the messagebox_info.png .COM extensions, but sometimes the .EXD extension as well. When a user manually types in a program they desire without adding .EXE or any other specific extention, DOS will make the assumption that the user want the file with the extension that comes first in alphabetical order, and thus running the virus. The companion virus is rare among Windows XP computers as this particular operating system does not use the MS-DOS.
Boot Sector Viruses messagebox_info.png Boot sector viruses generally hide in the boot sector, either in the bootable disk or the messagebox_info.png hard drive. Unlike most viruses, this virus does not harm the files in the hard disk, but harm the hard disk itself. Boot sector viruses are uncommon at this day and age because these viruses are spread rapidly by floppy disks and not on CD-ROMs.
Multipartite Viruses Multipartite viruses are spreaded through infected media and usually hides in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system

Oct 04, 2010 | Computers & Internet

1 Answer

How do i get the security tool screen to quit coming up. and over riding programs that says i have viruses, and wants to sell me protection


The programs coming up that say you have viruses and want to sell you protection sound like the real problem here. Sounds like you have some spyware that is disguised as something like WinAntiVirus 2009, or AntiSpyware 2009, etc. These will constantly seem to scan and report multitude of false infections trying to get you to buy them. The real problem is the program itself, it is the spyware. I would start by going here first to check: http://www.surfright.nl/en/hitmanpro. Malwarebytes.org also has good antispyware checks.

Mar 02, 2010 | HP Computers & Internet

Tip

Malware Part 1: Viruses, Trojans, Worms, Spyware, Adware


Malwares or Malicious softwares are programs that are made intending to sabotage and destroy your computer or penetrate, spy and steal your information on your computer. These Malicious Software could be categorized into 5 major groups Viruses, Trojans, Worms, Spyware and Adware. What, are the differences between these 5 types?

Viruses are programs that act like biological viruses. They replicate or make a copy of themselves in another host. Using an infected host, like USB Flash disks or drives, viruses infect your computer and wait until you insert another flash disc to infect. While waiting in your computer, viruses, depending on their code, could either slow down the system, mess up your file system, or even destroy your files.

Trojans are programs that do not replicate or copy themselves. Trojans are software that are made by would be hackers to spy on your computer and create what they call back doors. These programs are intentionally placed on your computer directly, where there is physical contact with the computer, or indirectly, where a copy is sent through your Email or even by an infected Flash Drive. The trojan would then be on your computer but it will neither replicate nor crawl to other computers connected to the infected computer.

Worms, on the other hand, are the ones that have the capability to crawl to any computer connected to the infected computer. Worms infect computers through the local network and even through the public networks. Worms infect others by scanning your network and infecting any computer connected to your network. Other Worms would scan your email software for email addresses and send a copy of themselves to your contacts and act like it was sent by you. Worms also have the capability to destroy your files depending on the code programmed into it. Worms also has the effect of slowing down your network speed since it would scan your network and send copies of itself. Worms eat up a lot of bandwidth in a network.

Spyware and Adware are almost the same. The difference of these two is the intent and the usage. Spyware as its name implies is used to spy your computer for any vulnerabilities. Adware on the other hand is used to constantly bug you with Advertisements. Normally known as Unwanted Pop-ups. Both, however, can infect you by websites, that without your permission, that copy or install these unwanted software into your computer. Spyware and Adware, are sometimes also considered as Trojans by other Antivirus Software since it does not replicate or crawl in the network but does damage to your computer.

Whichever type, these Malicious Software, is harmful to your computer and is a threat to your personal security. It is best to be able to early detect these software and be able to purge them out of your system. As prolonged, exposure to these Malicious Software is very damaging which could cause you to lose your data.

In Malware Part 2: Malware Detection and Removal, we will discus how to detect malware and some basic techniques in removing these Malicious Software.

on May 11, 2010 | Computers & Internet

Tip

How to protect Computer from Virus & Spywares


Most people these days understand what a virus is and how harmful it can be, but they are still somewhat unsure how computer viruses spread. The truth is that there are dozens of different ways in which a virus can spread from computer to computer, but let’s take a look at the most frequent ways in which people run into viruses, spyware and Trojans on the Internet.

1. Email attachments: Golden rule is that if you don’t know what an attachment is, don’t open it. You don’t have to take such drastic steps to protect yourself, however; simply use common sense when opening attachments in your email.

2. Rogue Websites: It is depressing to know that you may become infected with spyware or a virus by doing nothing more than simply visiting a website, but it is true. Many adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. To stop these rogue websites, adjust the settings on your antivirus software and firewall so that no outside connections can be made and no programs can be installed without your express permission.

3. Networks: If your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn’t much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone’s antivirus software is up to date so that the invading bug can be removed as quickly as possible.

4. Phishing Schemes: Learning how computer viruses spread is important to keep yourself, and your personal information, safe online. Phishing schemes are one of the chief ways in which people end up with their identity stolen and a computer fill of viruses. A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company. You are asked to click a link and log in, but the truth is that you’ve just given away all of your personal information. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer. smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.

5. Infected Software: One of the great things about the Internet is how many free games and programs there are out there, but these free programs often come at a price. Too many rogue websites intentionally infect their freeware (like Kazaa) with trojan viruses so that you unknowingly infect your computer every time you download a free game or piece of software. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.

6. Hackers: The Internet today is a much more law abiding place than it was ten years ago. Not only did most people not have antivirus protection and firewalls that could stop incoming attacks, most people didn’t even know what they were. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.

7. Instant Messaging: It is difficult to find a computer in this day and age that doesn’t have at least one instant messaging service installed on it. Unfortunately, these programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don’t recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay.

8. Fake Anti Virus Software: This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of antivirus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.

9. From Mobile Devices & External USB Devices: Mobile phones get infected by Bluetooth transfer etc. When u connects the mobile to computer you can be affected by those viruses even if you connect infected external USB flash desk or hard desk. Keep one antivirus software for mobile. Keep your antivirus software up to date at all times and you should be able to wrestle control back from any Internet bug.

10. Friends and Relatives: The social networking site Facebook has had to battle this very problem when their serves get a bug and automatically send out emails to everyone on the system that are infected. Often times, these emails are extremely generic sounding and come with suspicious attachments, but people often open them anyway since they have come from a friend or from a site they trust, like Facebook. Remember, if you get an attachment with an .exe extension or a .dll, don’t ever open it.

Learning how computer viruses spread is the best way we can put an end to their reign of terror online. It is only with the right knowledge and the best antivirus software that Internet users everywhere can beat online bugs for good.

on Apr 13, 2010 | Computers & Internet

2 Answers

Okay listen, our computer had viruses last night. So I used malware bytes antivirus to remove them and then turned the computer off and went to bed. But then in the morning my relative didn't know I had...


uTorrent or file sharing software do put you more at risk of virus infection due to their unrestricted nature. Personally I've come to the opinion that no matter how careful you are about what you download its not worth the risk.

Other sources of infection do of course exist, hijacked web pages and virus infected emails are common vectors. Tracking down the exact source of infection after the event can be difficult.

Nov 25, 2009 | Dell XPS M1530 Laptop

Tip

10 reasons why PCs crash-You must know tip 6


6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus made by Symantec ( www.symantec.com).

on Mar 04, 2010 | Computers & Internet

Tip

WAYS COMPUTER VIRUSES ARE SPREAD


There are different ways in which a virus can spread from computer to computer, but let's take a look at the most frequent ways in which people run into viruses, spy ware and Trojans via the Internet.

Adult Websites: adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. This adware will often allow for other programs with even more nefarious purposes to be installed and before you know it, your computer will be swamped. To stop these rogue websites, adjust the settings on your antivirus software and firewall so that no outside connections can be made and no programs can be installed without your express permission.

Email attachments:It has been discovered that since the advent of email attachment by Microsoft's Outlook Express.it is been used as medium by which viruses can be transferred from user to user. It is advised that if you don't know what an attachment is, don't open it. simply use common sense when opening attachments in your email.

Boot disk Infected
:a virus can still be spread if an infected disk is in your hard drive and you attempt to restart. When you start your computer, your machine will always check your drives to see if a disk with boot information is present. If one is, your computer will likely automatically attempt to boot from the disk and not from your drive. If a virus is present in the boot disk, it will often be activated and you will become infected. Always know the origin of any disk you put into your drive.
Local Area Networks. If your computer is connected to a home network or if your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn't much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone's antivirus software is up to date so that the invading bug can be removed as quickly as possible.
Softwares. Downloading files or softwares from the internet can create an access to virus infection on you pc. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.
Phishing : A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company, people end up with their identity stolen and a computer fill of viruses. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer The smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.

Chatting Messagers:
These programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don't recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay
Hackers. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.
External Mobile Devices. There really is no way to stop such an infection from happening, since we all buy peripherals that work with our computer, but we can ensure that we have the tools ready to go if an infection should happen. Keep your anti virus software up to date at all times and you should be able to wrestle control back from any Internet bug.


Fake Anti Virus Software.
This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of anti virus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.

When we know how spread, we can put an end to their reign of terror online. It is only with the right knowledge that Internet users everywhere can beat online bugs for good.

on Feb 22, 2010 | Computers & Internet

Not finding what you are looking for?
Microsoft Windows XP Professional Logo

54 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2889 Answers

Piyal Perera
Piyal Perera

Level 3 Expert

528 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18409 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...