Question and answer
5 ways a program can autostart
These are the ways to autolaunch a program in Windows, check them all and clean them up to have a more efficient system: 1. Calling Windows as win filename.exe from autoexec.bat 2. Including it in winstart.bat 3. [ Using the commands LOAD=filename.exe or RUN=filename.exe in win.ini, under the [windows] section. 4. Using the command Shell=Explorer.exe filename.exe in system.ini,
under the [boot] section. 5. Copying it or linking it in the directory C:\WINDOWS\Start Menu\Programs\StartUp. The actual name changes according to the language of Windows and it's stored in the Startup entry of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders. ]
Get an answer
Original conversation
User: What are the 5 ways windows can auto start a program?

User: 5 ways a program can autostart

Weegy: These are the ways to autolaunch a program in Windows, check them all and clean them up to have a more efficient system: 1. Calling Windows as win filename.exe from autoexec.bat 2. Including it in winstart.bat 3. [ Using the commands LOAD=filename.exe or RUN=filename.exe in win.ini, under the [windows] section. 4. Using the command Shell=Explorer.exe filename.exe in system.ini, under the [boot] section. 5. Copying it or linking it in the directory C:\WINDOWS\Start Menu\Programs\StartUp. The actual name changes according to the language of Windows and it's stored in the Startup entry of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders. ]
DEANA|Points 731|

User: When the "Swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely difficult to be removed. What were all the registry changes and why did those changes make it so difficult to remove?





Weegy: The Swen.A worm is a mass-mailing worm that uses its own mailing engine to spread itself. It can spread through email, newsgroups, file sharing networks like Kazaa and IRC, as well as shared network drives. [ It poses as a legitimate "security" email from Microsoft telling the user to download and install the "September 2003, Cumulative Patch" update to protect yourself from problems. The only problem with this is there isnt an official "September 2003, Cumulative Patch", and Microsoft never sends patches like this via email. Microsoft releases patches on their Windows Update Service for customers to download not through email. The worm also attempts to kill most antivirus and personal firewall programs running on the computer making the system vulnerable to other viruses spreading on the Internet. The worm can arrive as an email attachment. The subject, body, and From: address of the email may vary. Some examples claim to be patches for Microsoft Internet Explorer, or delivery failure notices from qmail. The Swen worm sends a copy of itself to the address found on the infected computer (it searches for email addresses found in .html, .asp, .eml, .dbx, .wab, .mbx files on the hard drive). The FROM, SUBJECT, and attachment names can vary. The worm may use an incorrect MIME Header exploit, mentioned in Microsoft Security Bulletin MS01-020, to ensure that it is automatically executed when the mail is viewed. Every attachment has one of the following filenames with a random number appended to it. The file is either an exe file or a zip file. Patch Upgrade Update Installer Install Pack Q It also produces a fake MAPI32 error message on occasion that appears to try to steal usernames, passwords, pop3 and smtp server information. The virus will then attempt to log into the users account and delete any of the emails sent by the Swen.A worm. ]
Expert answered|migzptz|Points 102|

User: What were all the registry changes the "SWEN" Virus made to the registry



Question
Asked 7/20/2011 10:38:46 AM
0 Answers/Comments
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
20,202,555 questions answered
Popular Conversations
Solve the inequality 9(x - 3) 13/5 x 67/5
Weegy: 9(x - 3) User: Solve the inequality 8(x + 1) > 7(x + 2). x -22 x 6 Weegy: 8(x + 1) > 7(x + 2) 8x + 8 > 7x ...
3/31/2015 6:43:39 AM| 4 Answers
Solve. –5(1 – 5x) + 5(–8x – 2) = –4x – 8x
Weegy: –5(1 – 5x) + 5(–8x – 2) = –4x – 8x; -5 + 25x - 40x - 10 = -12x; -5 - 15x - 10 = -12x; -15 - 15x = -12x; ...
3/31/2015 8:56:36 AM| 3 Answers
Which is a part of the female part of the ...
Weegy: b
3/31/2015 9:03:40 AM| 3 Answers
Evaluate the expression for x = -3. x^2 - 2x + 4
Weegy: The answer is x=5. User: Solve for c. ab - c = 9 Weegy: -2(2x + 5) - 3 = -3(x - 1) -4x - 10 - 3 = -3x + 3; ...
3/31/2015 10:35:54 AM| 3 Answers
Marie Camargo was a French ballerina.
3/31/2015 5:42:44 AM| 2 Answers
President Nixon opened informal relations with China and initiated ...
Weegy: Asked Did congress know about nixons plan to bomb cambodia in 1969 and said it was the same as Who knew about ...
3/31/2015 6:11:09 AM| 2 Answers
y 4 · y 6 User: Simplify. 1.5m 7(-4m 5)2
Weegy: The simplified expression of 1.5m^7(-4m^5)^2 = 24 m^17. User: Simplify. (-4a 3)3·a 4 Weegy: (-4a^3)^3 * ...
3/31/2015 6:52:19 AM| 2 Answers
What is the length of the hypotenuse of a right triangle whose legs ...
Weegy: The length of the hypotenuse of a right triangle whose legs have lengths of 5 and 12 is 13. User: What is the ...
3/31/2015 7:00:49 AM| 2 Answers
Weegy Stuff
S
L
P
L
P
P
P
Points 15 [Total 9175]| Ratings 0| Comments 15| Invitations 0|Offline
S
L
Points 6 [Total 3609]| Ratings 0| Comments 6| Invitations 0|Offline
S
P
C
L
P
L
1
P
Points 2 [Total 7879]| Ratings 0| Comments 2| Invitations 0|Offline
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
S
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
S
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
S
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
S
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
S
Points 0 [Total 0]| Ratings 0| Comments 0| Invitations 0|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2015 Purple Inc.