Does Frostwire and Bearshare give a computer viruses?

1 Answer

Answer :

Nope. All these services are bascially doing the same thing which is letting lots of people share files with each other. Those files could be anything and there is no guartantee that just because the file name says that its the first 36 minutes of HP7part1 that it actually is.

Related questions

Description : Why wont my Frostwire connection work?

Last Answer : because its illegal?

Description : Does BearShare work with the Microsoft Zune?

Last Answer : answer:What type of files are you trying to add? MP3 files should work. So should unprotected AAC and WMA files. Videos get tricky. Some might work and others will need to be converted to a supported file format.

Description : Can computer viruses be transmitted over a silent voice mail message on Skype?

Last Answer : There’s a first time for everything. Leaving you a “silent” voice mail is one computer sending a digital file to yours, which is how a virus spreads. I’d run a scan to hunt for a possible virus, and not open any vmails from people you don’t know.

Description : If I use Mozilla Firefox will my computer still get viruses, and if so, how can I check my computer for viruses and malware?

Last Answer : Try some anti-virus software and scan your computer… AVG has a nice free anti-virus… I also recommend Norton… Just run the scan , and it will scan for anything that may be possible as a virus…

Description : Humans infected with computer viruses; what are your thought?

Last Answer : MIND CONTROL!!!!!!

Description : Why do people make computer viruses?

Last Answer : Why do people slash tires, grafitti up their cities, toilet paper a neighbor's tree and leave the top loose on the salt shaker at a restaurant? To be malicious. That, and a profit motive (for datamining ... the two best answers I can think of, for your question. I have never sent one. Just FYI.

Description : How can I get rid of annoying Pop-up ads and viruses?

Last Answer : What device, operating system, and browser are you using? I have a Dell, Windows 10, Firefox browser. i added AdBlock Plus, NoScript, and set my preferences for no pop ups. All this is free and they work great. .

Description : How can I get rid of the viruses in my USB?

Last Answer : It might be the case you’re using free version of antivirus. In that scenario it will only detect them without removing.

Description : Anyone here use deviantART? Are they clean of viruses these days?

Last Answer : I have never had a problem with it.

Description : Is my cellphone, attached to my pc, more prone to viruses?

Last Answer : What cell phone are you using?

Description : Do you need Registration to REMOVE viruses on Stopzilla?

Last Answer : I would assume they certainly would let you remove the viruses, BUT YOU CAN MAKE SURE BY WAITING

Description : Give examples of: 1. Diseases caused by viruses in plants: 2. Diseases caused by viruses in animals:

Last Answer : Give examples of: 1. Diseases caused by viruses in plants: 2. Diseases caused by viruses in animals:

Description : Attenuated viruses are those that _____. a. can be used to treat viral disease. b. give rise to viroids and prions. c. multiply in cells but at a low rate. d. have been treated with chemicals such as formaldehyde.

Last Answer : c. multiply in cells but at a low rate.

Description : Are there computer viruses that prevent you from going to certain sites?

Last Answer : Nevermind. Now I can reach the sites. Maybe there was a problem with my Internet provider.

Description : Should i delete my computer viruses from the vault or leave them alone?

Last Answer : Get rid of them. The only reason for the vault to exist is a holding tank for any false positives AVG might pick up. Unless you see something in there that is clearly something you want to keep, get rid of it.

Description : Which software do you use to keep your system intact from computer viruses? -Technology

Last Answer : Antivirus software is used to keep your system intact from computer viruses.

Description : List the different types of computer viruses. -Technology

Last Answer : 1. File system viruses2. Boot sector viruses3. Macro viruses

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above

Last Answer : Phishing

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : _____is a computer program that is loaded into a computer without the owner's knowledge: a) Hack Material b) Viruses c) Both of Above d) None of These

Last Answer : b) Viruses

Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These

Last Answer : b) Bugs

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses