Vulnerabilities

Vulnerabilities

I have installed a new game named as Need For Speed Rivals. It's a very good game but the problem I am facing with this game is worsening it and troubling me. I have a perfect and working sound card and all the sound settings are fine. When I play this game no sound is heard and the in game sound is also working fine. Similarly, I can play music and other games but not of this game. Is it because of some virus? Helpers are welcomed.

  • 363 views
  • 2 answers
  • 0 votes
  • 648 views
  • 1 answers
  • 0 votes

My PC is running really slow. I want to format some disk drives. Actually, one of my drives has many files and folders and the drive is infected as warned by my Anti-Virus. I think that I should format the drive but will this remove the viruses which have settled inside the drive?

  • 356 views
  • 1 answers
  • 0 votes

I know that viruses can play best roles to damage software of any digital system but I'm not sure whether they really damage hardware or not. Have any viruses been detected which are said to have damaged the entire system? What should be done to bid farewell to this kind of vulnerabilities?

  • 485 views
  • 1 answers
  • 0 votes

what is the importance of ASLR in anti virus component? In a situation whereby ASLR is absent in some anti virus program components and a potential denial-of-service issue when scanning nested archives, how critical can these be to the overall security of the user? What is the best approach to an anti virus prog without ASLR?

  • 374 views
  • 2 answers
  • 0 votes

What are the vulnerabilities inherent in anti virus programs? With the ways anti virus software use largest system resource and privileges, an attack lunch at the anti virus prog can cause a great problem to the anti virus prog and the overall system it claims to protect. How can these vulnerabilities be exploited by attackers and how can it mitigate?

  • 357 views
  • 1 answers
  • 0 votes

How does pushdo Trojan infest system? My system is showing some kind of behavior recently, when I contact a friend about the behavior he said that the behavior may be cause by pushdo Trojan. How complex is this Trojan than the other Trojans? What is the best security strategy can be implemented against the Trojan?

  • 402 views
  • 1 answers
  • 0 votes

What does zero day or zero hour attack or threat means? What are its targets? Can a zero day attack be targeted at private or some to large corporation? Can someone be vulnerable through the opening of e-mail attachment? What rigorous security and personal strategy can be implemented to prevent a zero day or zero hour attack? What different vectors are used in zero day attacks?

  • 461 views
  • 2 answers
  • 0 votes

A few days ago, I have encountered a problem. Don't remember exactly what I was doing, but my laptop just went into the bluescreen of death as I have found out it is called. I just turned it on again, but after a while, the screen came back. This is the first time I have faced this issue, and I have absolutely no idea why this is happening. The laptop is an Acer and it has all driver up to date and everything. Can you please explain to me what is the bluescreen and how to get rid of it? Any method or help would be appreciated.

  • 640 views
  • 2 answers
  • 0 votes

Hi guys.  My desktop was recently attacked by a Win32 virus and disabled some system restrictions.  I run the RRT Sergiwa Antiviral Toolkit and perform the necessary tasks.  I checked my system and the restrictions are still disabled.  Can someone help?  Thanks in advance.

  • 535 views
  • 2 answers
  • 0 votes

Articles

Blogs

Tips