Search results
Jump to navigation
Jump to search
- {{Short description|Windows-platform based Malware}} ...line Portal''' ('''LOP''') is [[malware]] that is installed on [[Microsoft Windows]].<ref>{{cite magazine |url=https://books.google.com/books?id=8DcEAAAAMBAJ& ...2 KB (260 words) - 16:48, 27 April 2024
- {{Short description|Trojan horse for the Windows platform}} {{Infobox malware ...5 KB (603 words) - 04:48, 12 October 2024
- {{Short description|Computer malware}} ...service attack]]s that can disable NetBIOS services on [[Microsoft Windows|Windows]] machines. It was written by [[Sir Dystic]] of [[Cult of the Dead Cow|CUL ...2 KB (294 words) - 12:45, 9 July 2024
- {{Short description|Microsoft Windows software}} | operating_system = [[Microsoft Windows]] ...3 KB (424 words) - 03:30, 1 March 2025
- {{Short description|Windows-platform based computer malware}} ...ion by [[antivirus software]]. Alternatively, the dropper may [[download]] malware to the target computer once activated. ...4 KB (487 words) - 14:31, 3 June 2024
- {{Short description|Windows NT operating system component}} ...wever, these operations have been moved to [[kernel mode]] starting with [[Windows NT 4.0]] to improve performance.<ref>{{cite web ...5 KB (672 words) - 23:03, 6 April 2025
- * Early Launch Anti-Malware, a [[Features new to Windows 8#Startup security|Windows 8 feature]] ...900 bytes (120 words) - 18:22, 10 June 2024
- {{Short description|Windows platform based trojan}} ...resented as an [[sound|audio]] and [[video codec]] for [[Microsoft Windows|Windows]]-based [[Personal computer|PCs]]. It exists in various variants with name ...4 KB (495 words) - 03:49, 20 June 2024
- '''Concept virus''' refers to two different pieces of computer [[malware]], each of which has acted as a [[proof of concept]] for a new method of pr ...' (2001), named Concept Virus by its author, one of the first multi-vector Windows viruses. ...647 bytes (100 words) - 21:59, 29 December 2023
- '''Archiveus''' is a [[computer virus]] for [[Microsoft Windows]] operating systems that is used as a method of [[extortion]]. It is a [[Trojan horse (computing)|Trojan horse]]-type [[ransomware (malware)|ransomware]] virus that encrypts the user's files. The user must then purc ...2 KB (267 words) - 09:06, 8 September 2024
- | name = Windows Live OneCare Safety Scanner | logo = Windows Live OneCare logo.png ...4 KB (585 words) - 03:35, 28 July 2024
- {{Short description|Malware and adware detection tool}} |operating_system = [[Microsoft Windows]] ...4 KB (580 words) - 23:20, 19 May 2024
- ...publisher=SS64.com |access-date=2016-05-24}}</ref> It also writes to the [[Windows Security Log]]. ...s by exploiting a [[buffer overflow]] in the LSASS on [[Windows XP]] and [[Windows 2000]] operating systems. ...3 KB (385 words) - 13:51, 24 June 2025
- {{Short description|Windows-platform based spyware removal tool}} | operating system = [[Microsoft Windows]] ...3 KB (320 words) - 16:00, 11 January 2025
- {{Short description|Freeware download manager for Windows}} | screenshot = FlashGet 1.9.1012 under Windows "Longhorn" Server.jpg ...5 KB (651 words) - 00:34, 25 March 2024
- | Type = [[Microsoft Windows|Windows]] [[Category:Windows malware]] ...2 KB (313 words) - 22:42, 29 April 2024
- ...ype of [[malware]] (malicious software) that infects PCs using [[Microsoft Windows]]. ...fected. Once executed, the worm can corrupt and overwrite the most common Windows file types, .doc, .pdf, .zip, and .xls, among others; the data are changed ...2 KB (284 words) - 22:09, 29 April 2024
- {{Short description|Network services in Microsoft Windows}} ...crosoft intended WFP for use by [[Firewall (computing)|firewall]]s, [[anti-malware|antimalware software]], and [[parental controls]] apps. Additionally, WFP i ...4 KB (547 words) - 18:55, 6 June 2025
- ...]] or [[Computer virus|virus]] program that installs itself on [[Microsoft Windows]] based computers. It first appeared in May 2003. ...tle=Encyclopedia entry: Spyware:Win32/Coolwebsearch.H |publisher=Microsoft Malware Protection Center}}</ref> The program can change an infected computer's [[w ...4 KB (586 words) - 23:49, 24 May 2025
- ...ts.|url=http://www.eweek.com/c/a/Security/Strider-HoneyMonkey-Trawling-for-Windows-Exploits|newspaper=eWeek|date=19 May 2005}}</ref><ref name=TheARegistrerHon .... Once the program leaves a site, this log is analyzed to determine if any malware has been loaded. In such cases, the log of actions is sent for further manu ...5 KB (715 words) - 08:44, 27 May 2025