Christian Forums

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

21 PC Mysteries

Lewis

Member
The 21 Greatest PC Mysteries--Solved!

Find out why your documents won’t print, where your downloads disappear to, what a .dat file is, how those infernal toolbars invaded your browser, and much more.


xx_donotuse_o-5138152.jpg
Illustration by Ross MacDonaldModern PCs are certainly marvels of technology--and yet for all their advances, computers still do crazy, inexplicable things. With the average machine, there's enough mystery to keep Sherlock Holmes or Miss Marple hopping for a month--and enough frustration to make the average user want to commit murder most foul.
Computing mysteries tend to be less "Who dunnit?" and more "Why won't it?" For example, you may have puzzled over why Windows obstinately re**fused to let you delete a stalled print job, or wondered why you couldn't find the file you just downloaded. But worry not: We've rounded up these and other mindbogglers of the PC universe--and solved them for you.
(For explanations and helpful tips, click the links.)
Where did my downloaded files go? Why can't I find them?

Your browser chooses where downloads go, but you can control the process.
Why doesn't my iPad charge when I connect it to my computer?

Your PC's USB port doesn't supply enough juice--but you can still charge your iPad, gradually.
Why does a video play on my desktop but not my laptop?

If a computer doesn't have the specific decoder for a video format, you can't watch the video. Get the right one.
xx_donotuse_p-5138268.jpg
Illustration by Ross MacDonaldMy printer won't print, and Windows won't allow me to cancel or delete print jobs. What's going on?


Usually this is the result of a communication problem between the PC and printer. Get them talking.
I hear beeps when I turn on my PC. What do they mean?

Those beeps come from the BIOS (a piece of software built into the motherboard). Find out what a "beep code" means.
In a folder full of digital images, I often notice a file called Thumbs.db. What is it, and can I safely delete it?

Thumbs.db is a Windows XP system file that contains the thumbnail cache for a particular folder. You can tweak Windows to get it out of your way.
Why does every digital camera--even the one on my smartphone--insist on storing photographs in a folder called DCIM?

DCIM (for Digital Camera IMages) is the default directory structure for digital cameras--and having such a standard is very useful.
xx_donotuse_t-5138256.jpg
Illustration by Ross MacDonaldMy Recycle Bin has disappeared. How do I go about restoring it?


Whether it was a victim of a glitch or never available in the first place, you can follow a few simple directions to restore the Recycle Bin.
Why does Windows sometimes reboot without my permission, and how do I prevent that from happening?

This problem relates to how Windows installs automatic updates. Fortunately, you can make some tweaks.
Where do all these mysterious Web browser toolbars come from, and how do I get rid of them?

Sometimes spyware installs browser toolbars, and sometimes you do it accidentally during software installation.
How did I end up with QuickTime on my PC, and do I need to keep it?

This media-playback software comes bundled with iTunes and installs along with it.
I have Microsoft Word installed on my PC. Why can't I open the .docx files my friend sent me?

If you use Word 2003 or an earlier version of the program, all you need is the Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats.
xx_donotuse_d-5138260.jpg
Illustration by Ross MacDonaldWhy won't Windows allow me to delete a certain file?


If Windows refuses to delete a file or folder, some application or process is accessing it.
Why do some programs leave files and folders behind even after I've uninstalled them?

Many programs' uninstallers are ineffective. Use a utility that removes not only the application but also all of the pieces it leaves behind.
Why do Adobe Reader and Java update so frequently? Do I have to allow it?

Most Adobe and Java patches are made to plug security holes, so you should update them--or use alternative software.
Is it absolutely necessary to update Windows?

Yes, you should definitely apply Windows updates for security reasons, but you can take a few steps to cut down Windows' nagging.
Does it matter whether I ‘Safely Remove' devices?

Absolutely: If you ignore Windows' requests to "Safely Remove" your storage media, you could end up with corrupted files, un**readable media, or both.
Windows asks me if I want to enable Sticky Keys. What are they, and how should I use them?

The Sticky Keys feature makes certain keyboard functions easier to access.
Why can't I send out a particular file attachment through e-mail?

The file is probably too large. Check out free services that let you work around file-size restrictions.
xx_donotuse_w-5138276.jpg
Illustration by Ross MacDonaldHow can I determine whether an unknown Website is safe to visit?


Read our suggestions on figuring out whether a link is safe from malware or other threats before you click it.
What are the .dat files I sometimes receive in e-mail messages, and how do I open them?

Microsoft Outlook uses a modified version of Rich Text Format to preserve fonts and the like, but it often causes problems for the recipient. We have three suggestions for coping.
PC World
 
PC mystery #22: With 21 PC mysteries why people are still sold on a jack-shoot OS like Microsoft. :lol Get Mac or Linux and your overpriced mysteries will cease.
 
Growing List of Security Threats to Mac OS X Lion

Long gone are the days when Apple lovers could take pride in their virus-free Macs while snickering at PC owners' constant worries about security. Apple's brand new Mac OS X Lion operating system is already acquiring an unhealthy list of reported vulnerabilities less than a week after its official release.

Some Lion vulnerabilities are carry-overs from Snow Leopard, like the "Mac Defender" class of scareware that first surfaced in May. Apple's recent software update to prep Macs running Snow Leopard for Lion installation includes identification and removal of known variants of the malware.

Like Mac Defender, another newly identified OS X threat called the Olyx backdoor appears to be a variant of Microsoft Windows-targeting malware that's simply been tweaked to go after Macs.

Researchers say the remote-controlled Trojan application resembles 2009's GhostNet malware, a threat to Windows-based PCs. And as with the various strains of Mac Defender, some of the most knowledgeable and quickest responses to this latest backdoor threat are coming from Apple's longtime rival Microsoft.

Another threat to Lion (and earlier versions of OS X) that's been identified by password recovery software vendor Passware is a vulnerability that enables passwords to be recovered from Macs via Firewire's use of Direct Memory Access (DMA). Yet another is a laptop battery chip vulnerability—that doesn't appear to have been addressed in any OS X 10.7 updates as of yet—which security researcher Charles Miller of Accuvant Labs says can be exploited to "brick" batteries in several Apple laptops.

Apple's success at gaining market share for OS X (not to mention its leadership in mobile operating systems with iOS) has clearly not come without a cost—whereas malware developers generally ignored Macs when they made up a fraction of the market, now they have every reason to target Apple.
http://www.pcmag.com/article2/0,2817,2389207,00.asp
 
Last edited by a moderator:
Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected, but not immune, from computer viruses. According to advocates like Scott Granneman, Linux provides better protection compared to Microsoft Windows.[1]
There has not yet been a widespread Linux malware threat of the type that Microsoft Windows software faces; this is commonly attributed to the malware's lack of root access and fast updates to most Linux vulnerabilities.[2]
The number of malicious programs — including viruses, Trojans, and other threats — specifically written for Linux has been on the increase in recent years and more than doubled during 2005 from 422 to 863.[3]
Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or cause any serious consequence to the system itself, the malware would have to gain root access to the system.[2] Shane Coursen, a senior technical consultant with Kaspersky Lab, claims, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system ... The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS."[3]
However, this view is not universal. Rick Moen, an experienced Linux system administrator, says "[That argument] ignores Unix's dominance in a number of non-desktop specialties, including Web servers and scientific workstations. A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen."[4]
Some Linux users run Linux-based anti-virus software to scan insecure documents and email which comes from or is going to Windows users. SecurityFocus's Scott Granneman stated:
...some Linux machines definitely need anti-virus software. Samba or NFS servers, for instance, may store documents in undocumented, vulnerable Microsoft formats, such as Word and Excel, that contain and propagate viruses. Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users."[1]
Because they are predominantly used on mail servers which may send mail to computers running other operating systems, Linux virus scanners generally use definitions for, and scan for, all known viruses for all computer platforms. For example the open source ClamAV "Detects ... viruses, worms and trojans, including Microsoft Office macro viruses, mobile malware, and other threats."[5]
[edit] Viruses and trojan horses

The viruses listed below pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be infected. The infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.
It is worth noting that this is true for any malicious program that is run without special steps taken to limit its privileges. It is trivial to add a code snippet to any program that a user may download and let this additional code download a modified login server, an open mail relay or similar and make this additional component run any time the user logs in. No special malware writing skills are needed for this. Special skill may be needed for tricking the user to run the (trojan) program in the first place.
The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who try to ensure that their repository is malware-free. Subsequently, to ensure safe distribution of the software, checksums are made available. These make it possible to reveal modified versions that may have been introduced by e.g. hijacking of communications using a man-in-the-middle attack or via a redirection attack such as ARP or DNS poisoning. Careful use of these digital signatures provides an additional line of defense, which limits the scope of attacks to include only the original authors, package and release maintainers and possibly others with suitable administrative access, depending on how the keys and checksums are handled.
Vulnerability to trojan horses and viruses results from users willing to run code from sources that should not be trusted and to some extent about distributions not by default checking the authenticity of software downloaded while a system was the target of an attack.
[edit] Worms and targeted attacks

The classical threat to Unix-like systems is vulnerabilities in network daemons, such as SSH and web servers. These can be used by worms or for attacks against specific targets. As servers are patched quite quickly when a vulnerability is found, there have been only a few widespread worms of this kind. As specific targets can be attacked through a vulnerability that is not publicly known there is no guarantee that a certain installation is secure. Also servers without such vulnerabilities can be successfully attacked through weak passwords.
[edit] Web scripts

Linux servers may also be used by malware without any attack against the system itself, where e.g. web content and scripts are insufficiently restricted or checked and used by malware to attack visitors. Typically a CGI script (meant for leaving comments) by mistake allows inclusion of code exploiting vulnerabilities in the web browser.
[edit] Buffer overruns

Older Linux distributions were relatively sensitive to buffer overrun attacks: if the program did not care about the size of the buffer itself, the kernel provided only limited protection, allowing an attacker to execute arbitrary code under the rights of the vulnerable application under attack. Programs that gain root access even when launched by a non-root user (via the setuid bit) were particularly attractive to attack. However as of 2009 most of the kernels include address space layout randomization (ASLR), enhanced memory protection and other extensions making such attacks much more difficult to arrange.
[edit] Cross-platform viruses
 
A new area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an OpenOffice.org virus called Bad Bunny.
Stuart Smith of Symantec wrote the following:
"What makes this virus worth mentioning is that it illustrates how easily scripting platforms, extensibility, plug-ins, ActiveX, etc, can be abused. All too often, this is forgotten in the pursuit to match features with another vendor... [T]he ability for malware to survive in a cross-platform, cross-application environment has particular relevance as more and more malware is pushed out via Web sites. How long until someone uses something like this to drop a JavaScript infector on a Web server, regardless of platform?"[6]
[edit] Social engineering

As is the case with any operating system, Linux is vulnerable to malware that tricks the user into installing it through social engineering. In December 2009 a malicious waterfall screensaver was discovered that contained a script that used the infected Linux PC in denial-of-service attacks.[7]
[edit] Anti-virus applications


The ClamTk GUI for ClamAV running a scan on Ubuntu 8.04 Hardy Heron


There are a number of anti-virus applications available for Linux, most of which are designed for servers, including:

 
[edit] Threats

The following is a partial list of known Linux malware. However, few if any are in the wild, and most have been obsoleted by updates. Known malware is not the only or even the most important threat: new malware or attacks directed to specific sites can use vulnerabilities previously unknown to the community or unused by malware.
[edit] Trojans


  • Kaiten - Linux.Backdoor.Kaiten trojan horse[19]
  • Rexob - Linux.Backdoor.Rexob trojan[20]
  • Waterfall screensaver backdoor - on gnome-look.org[21]
  • Droiddream[22]
[edit] Viruses



  • MetaPHOR (also known as Simile)[42]
  • Nuxbee - Virus.Linux.Nuxbee.1403[43]
  • OSF.8759
  • PiLoT[44][45]
  • Podloso - Linux.Podloso (The iPod virus)[46][47]
  • RELx [48]
  • Rike - Virus.Linux.Rike.1627[49]
  • RST - Virus.Linux.RST.a[50] (known for infecting Korean release of Mozilla Suite 1.7.6 and Thunderbird 1.0.2 in September 2005[51])
  • Satyr - Virus.Linux.Satyr.a[52]
  • Staog - obsoleted by updates
  • Vit - Virus.Linux.Vit.4096[53]
  • Winter - Virus.Linux.Winter.341[54]
  • Winux (also known as Lindose and PEElf)[55]
  • Wit virus[56]
  • ZipWorm - Virus.Linux.ZipWorm[57]
[edit] Worms



  • Linux/Lupper.worm[62]
  • Mighty - Net-Worm.Linux.Mighty[63]
  • Millen - Linux.Millen.Worm[64]
  • Ramen worm - targeted only Red Hat Linux distributions versions 6.2 and 7.0
  • Slapper[65]
  • SSH Bruteforce[66]
 
And that's it? That's the list of malware to Linux? That's a VERY short list compared to Windows hundreds of thousands.

As for the Mac "viruses" the examples cited are trojans, i.e. programs that masquerade as a beneficial program based on people's ignorance. But somebody has to consciously download it.

With Microsoft, all one has to do is click on and innocent picture, or accidentally type in the wrong thing in the browser, and an infected site will render the Microsoft OS inoperable INSTALLING itself WITHOUT the user's permission or knowledge, unlike Mac or Linux.

My kids both had a Mac for years and never once had a virus. With the PC laptops, they were infected within the month.

I hate it when Microsofters point out the speck in other OS's eyes when they have this giant plank in their own eyes. There's absolutely, positively no comparison. Macs and Linux get FAR less malware, and even if they do, it's not as devastating.
 
Uhhh Tim, I know how Microsoft is, and I like Linux and I love Mac's and when I can afford a Macbook Pro laptop I am on it. Now you mentioned pulling the plank out of my own eye. Don't others have a right to point things out about Linux or Mac's ? I mean we always here about Bill Gates and company. And that was a old Linux article so by now the attacks against Mac's and Linux has picked up a little. Nothing is perfect. Man always finds a way to tear down what he builds.
 
Just for the clarification and the record here for all to know, I did not mean a plank in your eye specifically. I said "Microsofters" to which the vast majority that I suspect pass on these horror stories are from those associated with Microsoft themselves. Seriously, it was their culture I had in mind, not you. Sorry I came across that way. I am good with you, bro.
 
I bought a 300$ Toshiba laptop 4 years ago, have only used AVAST's free antivirus software, and have only had 1 virus which was able to be removed within 30 minutes. Yea there are gonna be more viruses targeting Microsoft since their products take up most of the market but its not too terribly difficult to avoid viruses. I'm not some diehard Microsoft fan that will never switch over or anything, I'd definitely be open to going to Linux or Apple but at the same time why switch from something that is cheap and run's the software I need.
 
Yea there are gonna be more viruses targeting Microsoft since their products take up most of the market but its not too terribly difficult to avoid viruses....

These are half truths --- just to clear misconceptions. The truth is that yes Microsoft still dominates the PC market. No question. The vast usage is not, however, why they get more viruses. That's a common misconception no doubt created by the Microsoft boys themselves to justify their problem in that area.

Easy to avoid viruses? Sometimes. I am about as savy to all the virus tricks and for the two (aging soon-to-be replaced) Microsoft computers I do have, I'll admit that I do not get viruses often due to my savy understanding ---- about 2 per year.) However, that being said, there are cases where merely clicking on a picture (with a legit sounding web site name) is enough to screw up the computer royally, and other times a web site that one visits forces a redirect with viruses. Even THIS Christian forum infected people already. And all this has nothing to do with being gullible like some prideful people like to boast that they "never" get viruses. I once was like that, and then when my computer got one, boy did it really get one! And all I did was click on a picture.

So, if I want to look at the SAME picture, I just use Linux or Android and it safely views it, and I can calmly shut the thing off so that I have days and days of time to fix the Microsoft computer. And while I'm fixing it, I go back to Linux and the computer behaves absolutely normally until I bring up the Microsoft again to fix it some more (reminds me of certain cars that are always in the garage :lol)
 
These are half truths --- just to clear misconceptions. The truth is that yes Microsoft still dominates the PC market. No question. The vast usage is not, however, why they get more viruses. That's a common misconception no doubt created by the Microsoft boys themselves to justify their problem in that area.

I agree that Microsoft computers are more susceptible to viruses, however I would be hesitant to say that the vast usage has no part to play in that. There are more viruses targeted towards PC's so that does contribute. As to how much or how little it contributes I cannot comment on because I have not done any in-depth research into it. In saying that, I do agree that Microsoft's virus defenses are not as good as its competitors but that is not the only reason they get more viruses.

Easy to avoid viruses? Sometimes. I am about as savy to all the virus tricks and for the two (aging soon-to-be replaced) Microsoft computers I do have, I'll admit that I do not get viruses often due to my savy understanding ---- about 2 per year.) However, that being said, there are cases where merely clicking on a picture (with a legit sounding web site name) is enough to screw up the computer royally, and other times a web site that one visits forces a redirect with viruses. Even THIS Christian forum infected people already. And all this has nothing to do with being gullible like some prideful people like to boast that they "never" get viruses. I once was like that, and then when my computer got one, boy did it really get one! And all I did was click on a picture.

So, if I want to look at the SAME picture, I just use Linux or Android and it safely views it, and I can calmly shut the thing off so that I have days and days of time to fix the Microsoft computer. And while I'm fixing it, I go back to Linux and the computer behaves absolutely normally until I bring up the Microsoft again to fix it some more (reminds me of certain cars that are always in the garage :lol)

Yea that's true, there are definitely some viruses that cannot be avoided when using a PC. My one virus in the last 4 years came from simply going to google :/. Thankfully after about 30 minutes I was able to figure out how to get it off but it was a pain to get rid of.
 
If you are running Windows get the top virus software like Bit Defender, or Webroot Spysweeper or Nod 32. Keep them updated and you will be fine. And for a firewall use Comodo Pro or Online Armor and keep them updated and you will be fine. These are the top Windows protection software programs on the market bar-none. And the Webroot Spysweeper is something to behold and so is Bit Defender. And no Firewall software on the market out does Comodo Pro and in second place is Online Armor. Kaspersky is still a good Firewall, but it has fell into 3rd place. Take my word for it these software programs work for windows and they work well. And that Webroot Spysweeper does not play at all, it stays on the case and is hard to be fooled.

Lewis
 
I agree that Microsoft computers are more susceptible to viruses, however I would be hesitant to say that the vast usage has no part to play in that. There are more viruses targeted towards PC's so that does contribute. As to how much or how little it contributes I cannot comment on because I have not done any in-depth research into it. In saying that, I do agree that Microsoft's virus defenses are not as good as its competitors but that is not the only reason they get more viruses.

Well, let's do a little thought experiment here. Who owns the portable device market right now? Apple, Android and similar OS? Microsoft is not strong in that. If more usage "contributes" to the viruses, then one would think that these ipads, and iphones and other smart devices would be plagued, but they are not. I don't know of anyone who ever had a virus on them, do you?

However, when Microsoft enters that market with similar devices using windows 8 (the same OS as on PC's) I'll bet the farm and livestock that there will "all of a sudden" be a proliferation of viruses on their things. People never had to contend with cell phone or iPad viruses or whatever else, and they will be surprised when they will "all of a sudden" pop up when Microsoft gets more into that market (except they change their OS philosophy fast). Mark my words.
 
Well, let's do a little thought experiment here. Who owns the portable device market right now? Apple, Android and similar OS? Microsoft is not strong in that. If more usage "contributes" to the viruses, then one would think that these ipads, and iphones and other smart devices would be plagued, but they are not. I don't know of anyone who ever had a virus on them, do you?

However, when Microsoft enters that market with similar devices using windows 8 (the same OS as on PC's) I'll bet the farm and livestock that there will "all of a sudden" be a proliferation of viruses on their things. People never had to contend with cell phone or iPad viruses or whatever else, and they will be surprised when they will "all of a sudden" pop up when Microsoft gets more into that market (except they change their OS philosophy fast). Mark my words.

I know someone who has gotten a virus with an Android, none with Iphone though. Only one case may seem negligible however I can only think of 1 person, besides myself, who has gotten a virus on a PC since the introduction of the IPhone. I personally don't believe that smartphones have been around long enough for us to see
any huge impact from viruses yet. I still know numerous people who don't have any sort of smartphone; however, more of my friends do now own such portable devices. If viruses are going to be a problem for IPhones and Andriods, then I imagine we will see that problem begin to emerge soon. It just seems a bit premature to claim such devices are impenetrable.
 
When you give humans time they will come up with something to mess things up.
That goes for Androids, Mac's and anything else.
 
PC mystery #22: With 21 PC mysteries why people are still sold on a jack-shoot OS like Microsoft. :lol Get Mac or Linux and your overpriced mysteries will cease.
you beat me to it!

PC mystery #23 You know Windoz is gonna break down regular and need critical updates everyday to chew up your download limit, you know its gonna get viruses and you might lose all your info. You know it could be broadcasting all your data over the net to some guy in Asia because its not very secure...yet you still buy it!.. And think is good!
 
Last edited by a moderator:
Regarding an Android or Mac Virus, those were actually Trojans, e.g. Mac Defender, and technically are not viruses. They are programs the user is fooled into downloading, but it can't execute by itself such as simple click on a picture, or typing the wrong address by accident in one's browser bar or something like that.

There's actually people out there "who watch what they click" and imply that a virus is somehow the user's fault or lack of intelligence. Nothing could be farther from the truth. Just wait one day until they type something like youtub instead of youtube and these virus sites capitalize on typos. Then they won't find it so funny when their machine just circumvents their control and just obediently installs the malware without their permission unlike Linux, Mac, Android, etc.

Do that with a Mac, Android, Linux, nothing, zip, nada.

I don't have to repeat my story about the brother-in-law who once owned Microsoft computer and kept sending out email viruses to everyone in the family, do I? I actually had to take him off my list. Then smart sister-in-law got tired of it and got him a Mac about 3 years ago and he hasn't had one since.
 
Well, let's do a little thought experiment here. Who owns the portable device market right now? Apple, Android and similar OS? Microsoft is not strong in that. If more usage "contributes" to the viruses, then one would think that these ipads, and iphones and other smart devices would be plagued, but they are not. I don't know of anyone who ever had a virus on them, do you?
It is because an iphone is more like a console (like an xbox) than an android device. Its pretty hard for a console to get a virus. I think android resembles a pc more and is susceptible to intentional software interference (virus etc). I think ipads are secure for that reason too.
 
Back
Top