1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
10

All users on the network have antivirus software; however, several users report that they have what an administrator described a

s a "browser redirection virus." How can the users have this virus if they have updated antivirus software installed?
Computers and Technology
1 answer:
nika2105 [10]4 years ago
4 0

Answer:Users on a network can be affected by a ' browser redirection virus' if they open some browser being targeted by which they have subconsciously downloaded some free software called 'freeware' containing the virus on.

Explanation:

'Browser redirection virus" is actually a browser hijacker which may take over some functions like search engines, etc on a  browser used to download some freeware from the internet. It is often referred to as a Potentially Unwanted Program. Various browsers such as Safari, Google Chrome,Internet Explorer, Mozilla Firefox, etc may be targeted by persons with malicious freeware on the internet and while a user may knowingly download the freeware he/she needs, he/she may  have unknowingly downloaded some malware alongside, such as this Browser Redirection Virus. It basically redirects your home page, whenever you open the  browser, to the programmed ones  of  the attacker such as some other search engine, advertising sites, affiliate sites for products marketing, etc.    

The updated antivirus on the user system does not positively detect this as it is not a virus actually but some potentially unwanted program attached to the freeware downloaded from the internet by the user. This Potentially Unwanted Program is uploaded and attached online by some unscrupulous persons basically for some financial gains as it redirects your own page to those of  their own affiliates.

Hope this helps.

You might be interested in
Joining two or more objects in a publication is known as _____.
icang [17]
The answer is grouping
7 0
3 years ago
In the following code, what is the first line that introduces a memory leak into the program?
Fantom [35]

Answer:

The answer is "Line 13".

Explanation:

In the given code first, a header file is included for using basic function, In the next line the main method is defined in this method two-pointer variable is declared that is "numbers1 and numbers2", in which variable numbers1 holds a value that is "NULL".

  • In the next line, both variable uses malloc() function that is used to allocate memory in heap, and in this function, sizeof() function is used that print its size and also increase its value.
  • In the next step, a pointer variable numbers1 assigns a value and another variable numbers2 assigns numbers1 variable value and changes the numbers1 variable.
6 0
4 years ago
What is a taskbar?
shutvik [7]
To me, the answer would be A menu that list options available in a particular program.
Because, It a list of instructions you can make your computer do like copy, paste, and print.
4 0
3 years ago
Drive.
barxatty [35]

Answer:

22

Explanation:

5 0
2 years ago
Is sonic better than piranha plant
nevsk [136]

Yes, well, in my opinion at least, Sonic will always be better than Piranha Plant.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is correct? A. The columns will be listed in the results in the same order they are stored in
    7·1 answer
  • Which of the following is the fundamental unit of the virtualized client in an IaaS deployment? a)Workload b)Workspace c)Work un
    8·1 answer
  • Which step is done first to replace existing text in a text box?
    10·2 answers
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • Which two of the following skills are important for a meteorologist
    12·1 answer
  • When writing an algorithm, the step after carrying out your plan is "sharing results."
    5·2 answers
  • 12. Realizar un algoritmo que genere un número aleatorio, el usuario debe adivinar cual es el número generado para esto tendrá 3
    10·1 answer
  • What are the five generations of computers?​
    13·1 answer
  • Match each item with a statement below.
    8·1 answer
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!