Question and answer
5 ways a program can autostart
These are the ways to autolaunch a program in Windows, check them all and clean them up to have a more efficient system: 1. Calling Windows as win filename.exe from autoexec.bat 2. Including it in winstart.bat 3. [ Using the commands LOAD=filename.exe or RUN=filename.exe in win.ini, under the [windows] section. 4. Using the command Shell=Explorer.exe filename.exe in system.ini,
under the [boot] section. 5. Copying it or linking it in the directory C:\WINDOWS\Start Menu\Programs\StartUp. The actual name changes according to the language of Windows and it's stored in the Startup entry of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders. ]
Ask a question
Not a good answer? Get an answer now. (FREE)
Original conversation
User: What are the 5 ways windows can auto start a program?

User: 5 ways a program can autostart

Weegy: These are the ways to autolaunch a program in Windows, check them all and clean them up to have a more efficient system: 1. Calling Windows as win filename.exe from autoexec.bat 2. Including it in winstart.bat 3. [ Using the commands LOAD=filename.exe or RUN=filename.exe in win.ini, under the [windows] section. 4. Using the command Shell=Explorer.exe filename.exe in system.ini, under the [boot] section. 5. Copying it or linking it in the directory C:\WINDOWS\Start Menu\Programs\StartUp. The actual name changes according to the language of Windows and it's stored in the Startup entry of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders. ]
DEANA|Points 731|

User: When the "Swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely difficult to be removed. What were all the registry changes and why did those changes make it so difficult to remove?





Weegy: The Swen.A worm is a mass-mailing worm that uses its own mailing engine to spread itself. It can spread through email, newsgroups, file sharing networks like Kazaa and IRC, as well as shared network drives. [ It poses as a legitimate "security" email from Microsoft telling the user to download and install the "September 2003, Cumulative Patch" update to protect yourself from problems. The only problem with this is there isnt an official "September 2003, Cumulative Patch", and Microsoft never sends patches like this via email. Microsoft releases patches on their Windows Update Service for customers to download not through email. The worm also attempts to kill most antivirus and personal firewall programs running on the computer making the system vulnerable to other viruses spreading on the Internet. The worm can arrive as an email attachment. The subject, body, and From: address of the email may vary. Some examples claim to be patches for Microsoft Internet Explorer, or delivery failure notices from qmail. The Swen worm sends a copy of itself to the address found on the infected computer (it searches for email addresses found in .html, .asp, .eml, .dbx, .wab, .mbx files on the hard drive). The FROM, SUBJECT, and attachment names can vary. The worm may use an incorrect MIME Header exploit, mentioned in Microsoft Security Bulletin MS01-020, to ensure that it is automatically executed when the mail is viewed. Every attachment has one of the following filenames with a random number appended to it. The file is either an exe file or a zip file. Patch Upgrade Update Installer Install Pack Q It also produces a fake MAPI32 error message on occasion that appears to try to steal usernames, passwords, pop3 and smtp server information. The virus will then attempt to log into the users account and delete any of the emails sent by the Swen.A worm. ]
Expert answered|migzptz|Points 102|

User: What were all the registry changes the "SWEN" Virus made to the registry



Question
Asked 7/20/2011 10:38:46 AM
0 Answers/Comments
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Home | Contact | Terms | Privacy | Social | ©2013 Purple Inc.
Ad
Popular Conversations
ODBS stands for ______ a. Offline database connection b. Oriented ...
Weegy: ODBS stands for - c. Open database connection
4/20/2014 10:16:42 AM| 4 Answers
introduction of travon martin case
Weegy: Trayvon Benjamin Martin (February 5, 1995 – February 26, 2012) was a 17-year-old African American from Miami ...
4/20/2014 10:14:44 AM| 3 Answers
What is the best wine to serve with chicken?
4/20/2014 1:25:16 PM| 3 Answers
Banks use a large percentage of their checkable deposits for the ...
Weegy: Banks use a large percentage of their checkable deposits for the purpose of B. giving loans User: All of the ...
4/20/2014 12:17:59 PM| 2 Answers
What is an attitude?
4/20/2014 6:00:57 PM| 2 Answers
define ad hominem
Weegy: Ad hominem means appealing to feelings or prejudices rather than intellect. User: define appeal to emotion ...
4/20/2014 10:14:10 PM| 2 Answers
What is Confucianism User: Which of the following is NOT a true ...
Weegy: Please enter the statements, and we will let you know which one is not true. User: Which river is located in ...
4/20/2014 12:19:55 AM| 1 Answers
Weegy Stuff
S
L
P
C
L
P
C
Points 1601 [Total 6988]| Ratings 0| Comments 1601| Invitations 0|Offline
S
L
P
C
P
C
1
L
P
C
Points 1495 [Total 9376]| Ratings 0| Comments 1495| Invitations 0|Offline
S
1
L
1
L
P
Points 499 [Total 7176]| Ratings 1| Comments 489| Invitations 0|Offline
S
L
Points 429 [Total 2876]| Ratings 2| Comments 399| Invitations 1|Offline
S
L
1
1
1
Points 189 [Total 3455]| Ratings 7| Comments 119| Invitations 0|Offline
S
R
Points 178 [Total 290]| Ratings 5| Comments 108| Invitations 2|Offline
S
Points 163 [Total 579]| Ratings 0| Comments 163| Invitations 0|Offline
S
Points 160 [Total 160]| Ratings 6| Comments 80| Invitations 2|Offline
S
1
Points 154 [Total 484]| Ratings 3| Comments 124| Invitations 0|Offline
S
Points 141 [Total 785]| Ratings 1| Comments 131| Invitations 0|Offline