The headache of being a computer user is that you have to be always updated about security And whenever we talk about the security issue then we always start thinking about Virus. A virus can be of different types. It can harm your PC soo badly that you can’t even access the data inside your PC. Or maybe it will incorrupt all of the data, delete your system files and make you hopeless completely.
There are also some viruses that we know as a Simple virus. This kind of virus does not harm any computer that badly. But these type of virus can be the source for Pranking with friends or just to show some particuler commands on their PC just to scare them.
We are about to show you one of the virus that can hang your PC. This is very simple to make but as a fresher or non-techky person you might be wondering how this work exactly. So we will tell you how to create a simple virus using notepad and how this works.
Let’s begin with the process to make a simple virus using notepad.
Creating Simple Virus Using Notepad
1. Open Notepad:
Just simply Open notepad just by searching on PC. we are assuming you are smart enough to open notepad.
2. Type the Below Command:
Type the above command in your notepad or copy the above command and paste into your notepad. In the above, phrase you are giving a command to open the example.bat file.
We have taken the file name as example.bat but you can set the name whatever you want. But remember that the .bat extension should be there. Means if you are setting the name as “Virus” then the command should be:
3. Save the File:
After writing the command inside the notepad just simply save the file with the same name as the file name you have written inside the notepad.
You can simply copy the file name you have written after Start inside notepad. For example, if you have written the name of the file inside notepad as Virus.bat then the file should be saved as Virus.bat. Before saving the file set the file type as all files.
If you don’t set the file type as .bat then it will not work. Or if the file name is Virus.bat or whatever you have chosen and then the file type is different then it will also not work.
4. Virus File is ready:
After successfully doing the above steps your file is ready to execute. Whenever you open that file it will continuously open the command prompt and it will not stop. The command prompt will open again and again in a loop.
How This Virus Works:
Let me tell you how it works. But before that let’s take the file name inside that notepad as example.bat so obviously when you save that file it will be example.bat also.
Now, here the file name is “example” and we have given the command to start example.bat file. The only reason that the command prompt is constantly opening, because the name of the file is the same as we have written inside .bat file and that file is opening itself.
You execute that file and it read the inside command then it read the command that refers a file to open and that file is itself. Then it again opens that file through first file command then again it gives command to open that file again and this process goes again and again that makes a huge loop that never ends. This is quite simple right!
The command prompt will not stop opening untill you restart the computer.
The only thing to notice is why someone will click that file to open. So you have to make it clickable by just changing the icon and rename the file. You can change the file name as one of the regular usable software like Chrome, Firefox, my computer, or file explorer.
Changing the File icon and Renaming the file name:
You can not change the direct file icon. But you can change the icon of the shortcut file. So create a shortcut by right clicking the file and click the create shortcut option on the popup window. It will instantly create a shortcut.
After successfully creating the shortcut, now you can proceed to change the icon of that shortcut file. In order to change the icon just follow the below steps:
- Right click the shortcut file and click on properties.
- Inside the properties window you will see an box shortcut just click that.
- On that shortcut window you will find a button below that says change icon click that button.
- A popup window appear where you can browse the icon just by clicking the browse and select the icon image then press OK.
The file icon is changed now. And now only you have to rename the file. And its quite simple.
- Right click the shortcut file and the popup window will appear.
- On that popup window click the option “Rename”.
- Set the file name according to that icon match.
- Press enter.
You are done making the changes(Name and icon) on shortcut file. Now you can easily place that shortcut and original file on your friends or anyone’s PC/laptop you like. And every time they click that file by thinking that they are accessing the normal application file and they will be stuck on that loop.
This is very simple virus and you can create this virus using notepad easily and there is no such integrated environment needed to make this loop virus.
Caution: If you having very low ram and during that loop, other apps are running too than the data in processing on those apps can be lost. Apparently, we are not responsible for the loss of any data. Please try this On your own risk.
If you are having any issue related to making this simple notepas virus then you can ask us in the comment section below.
How to Make a Computer Virus
You’ve probably wondered how to make your personal computer virus. Your computer virus is mostly a piece of software that performs malevolent activity on the computer without the user’s knowledge. There are several convenient methods https://kvbhel.org/reviews/board-of-directors-meeting-software-that-ameliorates-their-performance/ for creating your own virus, and they tend not to require comprehensive knowledge of computer code. You could start creating a computer virus by learning to use Notepad. This way, you can create a great executable anti-virus without any former knowledge of code.
One of the quickest ways to produce a computer virus is to write down thier program in a programming vocabulary such as C++ or Visible Basic. These types of languages enable you to create destructive software pertaining to Windows. This process will take a long time, so it’s critical to experiment with distinctive methods of duplication. There are also tutorials readily available for each vocabulary, making it possible to make viruses in a variety of languages. A polymorphic disease uses code to modify alone when it reproduces itself. This kind of feature is far more advanced than it sounds, and it is implemented differently in different different languages.
Another way to generate a computer disease is by embedding it in to an executable document. Infecting a document using a macro is the easiest way to distribute a virus, mainly because it targets Microsoft company Office items. Web pièce are similar, tend to be injected in web sites with no webmaster’s understanding. Many infections can only always be distributed by exploiting weak points in security, and these types of techniques require considerable abilities.
NOTE: Using an online compiler is not going to work here. Please install Python 2.7x and cv2, argparse modules to actually try out this example.
Heya friends! Welcome back! Before continuing on with Malicious Logic, I request you to have a look at this great and informative article Worms, Viruses and Beyond!!
Now, this article will focus more on applications than theory of computer viruses, worms, and Trojan horses.
But, please note that this article is meant to be used for educational purposes only.I, in no way, promote the usage of viruses, worms, or trojan horses to attack computer systems and causing damage.
Malicious logic is a set of instructions (basically a program) that causes the violation of a security policy of a website/program/application, etc.
UNIX Script
In this example, we are assuming that “.” is in the path environment and the script has been named ls and is placed in the directory.
Analysing the script
This script creates a copy of the UNIX Shell that is setuid of the user executing this program. To understand setuid programs, we first need to understand how User Identity is stored in a UNIX OS.
In UNIX OS, user identity is usually represented as an integer between 0 and generally, 65,535. This number is also referred to as UID (Unique Identification Number). Now, what setuid programs do is that they create processes with UID of the owner and not of a third person executing the program. This means, that an executor will have the rights of the owner… This in itself is a possible vulnerability.
Coming back to our script, so a setuid copy of the UNIX shell was created. Later on, this program is deleted, and then the correct ls command (for listing the files and folders present in the current working directory) is executed.
Trojan Horses
Go back to the previous script… Suppose if someone (root) typed:
If the script was typed deliberately, then it will result in a Trojan Horse.
Virus – A basic format
Most of the computer viruses follow the following basic script:
Basically, every computer virus has two phases –
- Insertion phase – in this phase, the virus inserts itself into the target.
- Execution phase- in this phase, the virus performs some actions.
Let’s take a look at a real virus in Python. Now this is not an actual virus which will cause corruption files, deletion of system files, etc. but just a simple harmless virus.
Today we are going to teach you one of the easiest ways of creating a virus – with notepad. Yes, simply using your notepad you can perform this awesome trick.
In this article we will show you the process to create a virus that eats up the computer memory i.e Memory Eating Virus. And note that this trick is purely only for educational purpose and OnlineCmag is not responsible for any mishaps in your computer.
Steps To Create A Memory Eating Virus
Step 1 : Creating Two New Text Documents
First of all open a folder in which you would want to create this simple virus . Within it create 2 new text documents in it as shown below .
Step 2 : Customize The First Notepad
Open the first notepad and type ” OnlineCmag.bat ” and save it as ” Ocm.bat ” . ( .Bat extension is must )
Step 3 : Customize The Second Notepad
Now open the second notepad and type ” Ocm.bat ” and save it as ” OnlineCmag.bat ” .
Step 4 : Open any one of these files
Now just Double Click on any one of the saved files . That’s It , Now this virus will start eating up the computer memory. As simple as that.
If you trust a file, file type, folder, or a process that Windows Security has detected as malicious, you can stop Windows Security from alerting you or blocking the program by adding the file to the exclusions list.
Caution: Only do this for files that you’re confident are safe. Adding an exclusion for an unsafe program could expose your systems and data to increased risk.
Select Start , then open Settings . Under Privacy & security , select Virus & threat protection.
Under Virus & threat protection settings, select Manage settings, and then under Exclusions, select Add or remove exclusions.
Select Add an exclusion, and then select from files, folders, file types, or process. A folder exclusion will apply to all subfolders within the folder as well.
Go to Start > Settings > Update & Security > Windows Security > Virus & threat protection.
Under Virus & threat protection settings, select Manage settings, and then under Exclusions, select Add or remove exclusions.
Select Add an exclusion, and then select from files, folders, file types, or process. A folder exclusion will apply to all subfolders within the folder as well.
In this article, I will use a PowerShell one-liner script to generate a test file to test if the Anti-Virus runtime solution installed is working as expected.
Table of Contents
What is the EICAR file?
If you are not familiar with the EICAR
(European Institute for Computer Anti-Virus Research) test file, don’t worry it’s safe to use, the only purpose of this file is to trigger the AV.
It is safe to pass around, because it is not a virus, and does not include any fragments of viral code. Most products react to it as if it were a virus (though they typically report it with an obvious name, such as „EICAR-AV-Test“).
The Oneliner script
I’ve chosen a PowerShell script for various reasons:|
- Powershell is included in all Windows OS.
- It doesn’t require high-privileges to run.
- It’s simple to read.
What will happen after running this script?
When you run the Powershell script Microsoft Defender (or your third party AV solution) will prompt that has found a threat:
And the details will display the “EICAR_TEST_FILE” and quarantine the file.
Wrapping Up
Testing an AV with a safe oneliner has multiple benefits, and it’s more than a QA exercise, in fact, you will immediately learn what to expect when a threat is found and you can get familiar and if it’s required document steps for end-users. I personally think that is a very fun way of training and educating users with simple and effective examples.
As usual, this script is available on my GitHub repository.
Author
Associate Professor, Genomics and Molecular Biology; Biomedical Sciences., Bond University
Disclosure statement
Associate Professor Lotti Tajouri is affiliated with Dubai Police Scientist Council.
Partners
Bond University provides funding as a member of The Conversation AU.
Viruses are the most common biological entities on Earth. Experts estimate there are around 10,000,000,000,000,000,000,000,000,000,000 of them, and if they were all lined up they would stretch from one side of the galaxy to the other.
You can think of them as nature’s own nanotechnology: molecular machines with sizes on the nanometre scale, equipped to invade the cells of other organisms and hijack them to reproduce themselves. While the great majority are harmless to humans, some can make you sick and some can even be deadly.
Are viruses alive?
Viruses rely on the cells of other organisms to survive and reproduce, because they can’t capture or store energy themselves. In other words they cannot function outside a host organism, which is why they are often regarded as non-living.
Outside a cell, a virus wraps itself up into an independent particle called a virion. The virion can “survive” in the environment for a certain period of time, which means it remains structurally intact and is capable of infecting a suitable organism if one comes into contact.
When a virion attaches to a suitable host cell – this depends on the protein molecules on the surfaces of the virion and the cell – it is able to penetrate the cell. Once inside, the virus “hacks” the cell to produce more virions. The virions make their way out of the cell, usually destroying it in the process, and then head off to infect more cells.
Does this “life cycle” make viruses alive? It’s a philosophical question, but we can agree that either way they can have a huge impact on living things.
What are viruses made of?
At the core of a virus particle is the genome, the long molecule made of DNA or RNA that contains the genetic instructions for reproducing the virus. This is wrapped up in a coat made of protein molecules called a capsid, which protects the genetic material.
Some viruses also have an outer envelope made of lipids, which are fatty organic molecules. The coronavirus that causes COVID-19 is one of these these “enveloped” viruses. Soap can dissolve this fatty envelope, leading to the destruction of the whole virus particle. That’s one reason washing your hands with soap is so effective!
What do viruses attack?
Viruses are like predators with a specific prey they can recognise and attack. Viruses that do not recognise our cells will be harmless, and some others will infect us but will have no consequences for our health.
Many animal and plant species have their own viruses. Cats have the feline immunodeficiency virus or FIV, a cat version of HIV, which causes AIDS in humans. Bats host many different kinds of coronavirus, one of which is believed to be the source of the novel coronavirus that causes COVID-19.
Bacteria also have unique viruses called bacteriophages, which in some cases can be used to fight bacterial infections.
Viruses can mutate and combine with one another. Sometimes, as in the case of COVID-19, that means they can switch species.
Why are some viruses so deadly?
The most important ones to humans are the ones that infect us. Some families of viruses, such as herpes viruses, can stay dormant in the body for long periods of time without causing negative effects.
How much harm a virus or other pathogen can do is often described as its virulence. This depends not only on how much harm it does to an infected person, but also on how well the virus can avoid the body’s defences, replicate itself and spread to other carriers.
In evolutionary terms, there is often a trade-off for a virus between replicating and doing harm to the host. A virus that replicates like crazy and kills its host very quickly may not have an opportunity to spread to a new host. On the other hand, a virus that replicates slowly and causes little harm may have plenty of time to spread.
How do viruses spread?
Once a person is infected with a virus, their body becomes a reservoir of virus particles which can be released in bodily fluids – such as by coughing and sneezing – or by shedding skin or in some cases even touching surfaces.
The virus particles may then either end up on a new potential host or an inanimate object. These contaminated objects are known as fomites, and can play an important role in the spread of disease.
What is a coronavirus?
The coronavirus COVID-19 is a member of the virus family coronaviridae, or coronaviruses. The name comes from the appearance of the virus particles under a microscope: tiny protein protrusions on their surfaces mean they appear surrounded by a halo-like corona.
Other coronaviruses were responsible for deadly outbreaks of Serious Acute Respiratory Syndrome (SARS) in China in 2003 and Middle East Respiratory Syndrome (MERS) from 2012. These viruses mutate relatively often in ways that allow them to be transmitted to humans.
IT IS NOT MY RESPONSIBILITY IF SOMETING BAD HAPPENS TO ANY DEVICE
- Home
- Comments
- .VBS
- .BAT
Have a good day.vbs
Copy and paste the following into Notepad.
name=inputbox(“Whats your name?”)
msgbox(“Have a good day, “) + name
SAVE IT AS HAVE A GOOD DAY.VBS AND ENJOY!
Passwword protect A .VBS SCRIPT
Copy and paste the following into Notepad.
if pass=”fish” then msgbox(“Correct Password!”) else msgbox(“Incorrect Password!”)
The password for this is fish
Save it as Password.vbs And enjoy!
make a message box (NOTEPAD MODE)
Copy and paste the following into Notepad.
To make the ” hold shift and 2
Inside the (” “) Type what you want it to say
Save it as Message.vbs and Enjoy!
make a message box loop
Copy and paste the following into Notepad.
Save it as Loop.vbs and Enjoy!
hacktool vbs – Message box maker
Copy and paste the following into Notepad.
msgbox(“HackTool VBS – Message box maker”)
msg=inputbox(“Enter a message. “)
Save it as HackTool VBS Message Maker.vbs
HACKtool vbs – annoying message box maker
Copy and paste the following into Notepad.
msgbox(“HackTool VBS – Annoying Message box maker
msg=inputbox(“Enter a message. “)
Save it as Annoy msg.vbs
hacktool vbs – calculator_*
Copy and paste the following into Notepad.
msgbox(“HackTool VBS – Calculator – *”)
Save it as Cal.vbs
hacktool vbs – question maker
msgbox(“HackTool VBS – Question Box”)
msg=inputbox(“Enter a question. “)
msgb=inputbox(“Enter a message box message. ( message will be before answer) “)
msgbox (” “) + msg + (” “) + answer
Save it as Question.vbs
asK A QUESTION (NOTEPAD MODE)
Copy and paste the following into Notepad.
whatyouwanthere =inputbox(“YOUR QUESTION HERE”)
msgbox ( whatyouwanthere )
the text in blue must be the same.
open a program
Copy and paste the following into Notepad.
Save it as run.vbs and enjoy!
Paint is known as “MSPAINT”!
This one opens notepad.
open a program if password is correct
Copy and paste the following into Notepad.
Set shell=CreateObject(“wscript.shell”)
pass=inputbox(“Enter a Password”)
if pass=” 1234 ” then Shell.Run(” Notepad.exe “) else msgbox(“Incorrect Password!”)
The text in blue is what you want the password to be.
The text in red is what program you want to open.
Save it as runpass.vbs and enjoy!
THIS IDEA WAS FROM NOTEPADCODES1, BUT I DID NOT USE ANY HELP OR “WHAT TO DO” ON IT!
how to crash your computer
WARNING – Doing this could result in breaking your computer!
IT IS NOT MY RESPONSIBILITY IF SOMETHING GOES WRONG.
we all know that you can crash your pc by going to youareanidiot.org, but this is just like it – without the virus – and, loads of pop-ups!
Copy and paste the following into Notepad.
save it as crash.vbs and enjoy breaking your computer.
make a cd-rom virus
WARNING – Doing this could result in crashing your computer!
IT IS NOT MY RESPONSIBILITY IF SOMETHING GOES WRONG.
DO NOT USE THIS FILE AS A VIRUS – JUST FOR EDUCATIONAL USE ONLY!
Copy and paste the following into Notepad.
DO
Set owMP = CreateOBject(“WMPlayer.OCX.7”)
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
for i= 0 to colCDROMs.Count – 1
colCDROMS.Item(i).Eject
Next ‘ cdrom
End If
loop
And save it as CdRomVirus.vbs And enjoy.
WITH THANKS TO COMPUTER-TRICKER FOR THE
CD ROM OPENER SCRIPT – I JUST MADE IT LOOP!
Introduction: How to Make an Auto Hacking Wardrive
Step 1: Material List
To do this project, you are going to need:
– U3 usb drive, such as a sandisk cruizer,
– Access to a Windows XP machine.
What makes a U3 usb drive unique is that it emulates a CD rom drive so that it can autorun it’s “launchpad” whenever you plug it into your computer. This is useful because Windows will not allow programs to autorun straight from a USB drive, but it will allow programs to autorun from CD drives and since a U3 usb drive shows up as both, we can use this feature to autorun our USB drive.
Step 2: Download Universal Customizer
Backup everything that’s currently on your USB drive. Then go to this website: http://www.u3community.com/viewtopic.php?t=434 and download the “Universal Customizer” program. This program is going to allow us to replace the U3 Launchpad application with our own autolaunching application. Unfortunately, this program only works on Windows XP, so you’ll have to have an XP machine to run this. When it’s through downloading, extract all of the files to your desktop and open up the “U3CUSTOM” folder. This folder is where we’re going to create our custom autolaunching program
Step 3: Creating the Autorun and Launch Files
Step 4: Converting BAT to EXE
To convert launch.bat to an executable, go to this website http://download.cnet.com/Bat-To-Exe-Converter/3000-2069_4-10555897.html and download the Bat to EXE converter. Open it up and run the exe file. For the “Batch file” field, point to the “launch.bat” file that you created. Then click “compile”. You should now see a “launch.exe” file in your “U3Custom” folder.
Step 5: Creating the USB.vbs Script
Dim oFSO, oDrive,objFolder,oUsbDrive,oDestination, shell
Const USBDRIVE=1
oDestination = “c:\test”
Set oFSO = WScript.CreateObject(“Scripting.FileSystemObject”)
Set shell=createobject(“wscript.shell”)
‘Get USB drive letter
For Each oDrive In oFSO.Drives
If oDrive.DriveType = USBDRIVE And oDrive.DriveLetter <> “A” Then
WScript.Echo “found usb at”, oDrive.DriveLetter
oUsbDrive = oDrive.DriveLetter & “:\”
shell.run oDrive.DriveLetter & “:\PasswordFox.exe”
set shell=nothing
End If
Next
Sub CopyFiles(oPath, oDst)
Set objFolder = oFSO.GetFolder(oPath)
For Each Files In objFolder.Files
WScript.Echo “Copying File”,Files
newDst=oDst&”\”&Files.Name
oFSO.CopyFile Files,newDst,True
WScript.Echo Err.Description
Next
‘Recursive copy, uncomment if needed
‘ For Each oDir In objFolder.SubFolders
‘ CopyFiles oDir.Path, oDst
‘ Next
End Sub
Step 6: Burn the Files to the Virtual U3 CD
Go back up to the main “universal customizer” directory and click “isocreate.cmd”. This will turn our folder into an iso file that we will then put on the USB drive. Now click on “universal_customizer.exe”. Just follow the instructions in the program and it will set up your U3 drive to run our custom created launcher. When it’s through, click done. You will need to pull out your usb drive and plug it back in and it may give you an error, but that’s because we haven’t put any programs on it, which we will do in the next step.
Step 7: Loading the Hacking Programs
You can find some good programs at “nirsoft.net” that are good for retrieving passwords and information. Such as PasswordFox. Just extract the files and copy them to your USB drive. Lastly, we need to create a USB file that runs the program silently and stores the data it collects back on the USB drive. So right click in the USB drive and create a new text file and rename it “batch.bat”. Then right click on it and select “edit”. To launch the program type:
dp0″ before both filenames. Now save the file and test it out. Put it in a computer that has autorun enabled and within a second, you should have an html file saved to your USB drive with the users information.
Step 8: Protection
The best way to protect yourself from this type of hack is to disable any type of autorun feature. To enable/disable autorun in windows xp, go to “start > run” type gpedit.msc and hit enter. Select “Administrative Templates > System” and then double click on “Turn off autoplay” to enable/disable it. In vista and 7 go to start and type “gpedit.msc”, select administrative templates > Windows Components” and double click on “Autoplay policies” to enable or disable it.
Be the First to Share
Did you make this project? Share it with us!
As a public health professional with over 10 years of experience, Katie is passionate about informing decision-making that impacts the health and well-being of individuals and communities.
Sameena Zahoor, MD, is a board-certified specialist in Family Medicine and is currently working as an outpatient primary care physician in Michigan.
Shingles, also called herpes zoster, is caused by the same virus that causes chickenpox (varicella-zoster virus, or VZV). Unlike chickenpox, shingles isn’t contagious, but it can occur when the VZV is reactivated in the body. Though inconclusive, stress may be a trigger that reactivates the virus. Common symptoms include painful, tingling blisters that occur in clusters on your face or torso.
In the United States, about one out of three people will develop shingles in their lifetime. Getting the shingles vaccine can reduce your risk of developing the condition.
Read on to learn more about shingles, including the cause, risk factors, and its relationship with stress.
” data-caption=”” data-expand=”300″ data-tracking-container=”true” />
Nattakorn Maneerat / Getty Images
What Causes Shingles?
Shingles is caused by the reactivation of VZV, the virus that causes chickenpox. After you are infected with the virus, it remains inactive in your body. Reactivation later in life can occur due to changes in your immune system.
Risk Factors for Shingles
Shingles can develop in anyone who has previously had chickenpox. However, an increased risk for shingles is associated with immune system weakness and function.
Factors that influence your immune system and can increase your risk include:
- Being over the age of 60
- Having certain conditions or infections, such as human immunodeficiency virus (HIV) or cancer
- Taking immunosuppressive treatments and medications, such as those for organ transplants or rheumatoid arthritis
The Link Between Stress and Shingles
Psychological stress is a possible trigger for shingles. Experiencing acute (short-term but significant) stress or chronic (long-term) stress has been shown to impact immune function. But it does not occur in the same way for every person.
Further, results from studies exploring the connection between stress and developing shingles have been mixed. Some studies reported higher rates of shingles following stressful life events, while others did not. Studies examining the impact of stress on the immune system and reactivation of VZV did not conclude a definitive relationship between the two.
Treatment for Shingles
Treatment for shingles is meant to reduce severity and duration of symptoms. It often includes:
- Antiviral medications, such as Zovirax ( acyclovir ), Famvir ( famciclovir ), and Valtrex ( valacyclovir )
- Pain medications, including over-the-counter (OTC) and prescription options
- Antibiotics if the blisters or lesions become infected
Stress Management Tips
Stress can increase the risk for inflammation in the body. In turn, this can contribute to the development of disease and make other preexisting conditions worse. Taking action to better cope with stress reduces that risk.
Some short- and long-term stress coping strategies include:
- Being thoughtful about engaging with people and situations that are stressful: This may include declining invitations or saying “no” when you can anticipate stressful conditions.
- Reframing a stressful situation: If you can’t avoid a situation, you may be able to perceive it differently. For example, looking at a rejection for a job you wanted as an opportunity to learn from it can help you see the situation in a positive way.
- Regularly engaging in relaxation: Do activities you know you like or try a new one, such as deep breathing, stretching, yoga, or tai chi.
- Doing enjoyable activities when you’re stressed: Reading books, engaging in a hobby, watching a favorite television show or movie, or spending time with friends and family are great ways to cope.
- Talking it out with others: This includes with someone close to you or a mental health professional.
- Taking care of your body: Regularly getting enough quality rest, being active, and eating enough nutrients helps your body better cope with stress.
Summary
Shingles (herpes zoster) is caused by the reactivation of the varicella-zoster virus, the same virus that causes chickenpox. Unlike with chickenpox, shingles transmission from one person to another isn’t possible. People with reduced immunity are at a higher risk for shingles, such as those who are over the age of 60, have certain health conditions, or are undergoing immunosuppressive treatments.
Psychological stress is thought to be a potential trigger for the reactivation of VZV in the body. However, research into whether stress triggers shingles is not conclusive. Stress can cause inflammation and worsen existing health conditions. Stress management strategies may help reduce the risk of negative health impacts.
A Word From Verywell
Though people with compromised immune systems are at a higher risk for shingles, anyone who has previously been exposed to VZV may develop it sometime in their life. Taking good care of your body is not only a healthy stress coping strategy, but it may also support your immune system. Further, getting vaccinations, such as the shingles vaccine (when recommended), is also a great way to reduce your risk of illness, complications, and can keep you healthy.
Frequently Asked Questions
The virus itself is contagious but shingles can’t be transmitted to another person. Varicella-zoster virus causes chickenpox. After chickenpox resolves, the virus remains in the body but becomes inactive. If it reactivates, it can cause shingles. During a shingles episode, you can transmit the virus to someone who hasn’t been exposed previously and it can cause chickenpox.
People over the age of 60 are more likely to develop shingles. The risk increases as you get older and anyone who has previously had chickenpox is at risk for it.
Shingles is typically diagnosed by observing a characteristic rash with clusters of painful blisters on one side of your face or torso. If the cause is uncertain, a healthcare provider can take a fluid sample from one of the blisters to confirm the cause.
Metasploit has a couple of built in methods you can use to infect Word and Excel documents with malicious Metasploit payloads. You can also use your own custom payloads as well. It doesn’t necessarily need to be a Metasploit payload. This method is useful when going after client-side attacks and could also be potentially useful if you have to bypass some sort of filtering that does not allow executables and only permits documents to pass through. To begin, we first need to create our VBScript payload.
As the output message, indicates, the script is in two parts. The first part of the script is created as a macro and the second part is appended into the document text itself. You will need to transfer this script over to a machine with Windows and Office installed and perform the following:
This will open up the visual basic editor. Paste the output of the first portion of the payload script into the editor, save it and then paste the remainder of the script into the word document itself. This is when you would perform the client-side attack by emailing this Word document to someone.
In order to keep user suspicion low, try embedding the code in one of the many Word/Excel games that are available on the Internet. That way, the user is happily playing the game while you are working in the background. This gives you some extra time to migrate to another process if you are using Meterpreter as a payload.
Here we give a generic name to the macro.
Before we send off our malicious document to our victim, we first need to set up our Metasploit listener.
Now we can test out the document by opening it up and check back to where we have our Metasploit exploit/multi/handler listener:
Success! We have a Meterpreter shell right to the system that opened the document, and best of all, it doesn’t get picked up by anti-virus.
Money, Home and Living Reporter, HuffPost
These days, even clean freaks are getting a run for their money. In order to keep the coronavirus at bay, it’s important to disinfect your kitchen , bathrooms ― even the air ― sometimes multiple times per day. But with the recent panic-buying that’s wiped store shelves clean of commercial disinfectants, you might not have the usual products on hand.
Fortunately, you can make DIY hand sanitizer, disinfecting spray and wipes. Here’s what you need to know about making your own cleaning products that kill the coronavirus.
Items You’ll Need
The U.S. Centers for Disease Control and Prevention published recommendations for cleaning and disinfecting your home that are crucial to follow when making your own disinfectants. For example, the CDC says that it’s important to use EPA-registered disinfectants that have been vetted for their effectiveness against COVID-19 and allow enough contact time on the surface for the disinfectant to work.
There are just a handful of solutions you need for DIY cleaning products, according to Dean Davies, cleaning supervisor for Fantastic Services, which specializes in antiviral sanitization . You may already have them in your medicine cabinet or pantry. If not, you may be able to find them in stores, though inventory may be limited right now.
Hydrogen peroxide: According to the CDC, hydrogen peroxide is effective against a whole army of microorganisms, such as bacteria, yeasts, fungi, viruses and spores. A solution of at least 3% will kill germs ― including the cold virus ― after six to eight minutes of exposure.
Isopropyl alcohol: Also known as rubbing alcohol, this chemical compound has proven disinfecting qualities when left on surfaces for at least 30 seconds. Since rubbing alcohol is water-soluble, it can be diluted, but the concentration needs to be at least 70% to kill coronaviruses. Also keep in mind that while alcohol is considered safe for all surfaces, it could discolor some plastics, so be sure to perform a spot test first.
Household bleach: Bleach is strong and effective at killing bacteria and viruses when diluted properly. According to the CDC, that’s 4 teaspoons of bleach per 1 quart of water. Just be sure to let your bleach solution sit for at least 10 minutes before wiping it off, and be sure it isn’t expired. A word of caution: Mixing bleach with certain other chemicals can create dangerous compounds; never combine bleach with ammonia, rubbing alcohol or acidic compounds, such as vinegar. Your safest bet is to use bleach with water only.
In addition to these chemicals, you will need a squeeze or spray bottle, paper towels and/or cotton fabric. Again, some of these items might be hard to find, so try to work with what you have.
How To Make Your Own DIY Disinfecting Products
Hand Sanitizer
Though washing your hands with plain old soap and water is the best way to keep them clean and prevent the spread of coronavirus, you don’t always have access to a sink. The next best thing is using hand sanitizer, but you need to be sure your ratios are correct when making it yourself, otherwise it isn’t effective.
Ajith Karunarathne , a cellular chemist and assistant professor in the University of Toledo’s department of chemistry and biochemistry, shared his recipe for hand sanitizer.
Start with isopropyl alcohol, which you may be able to find online at Walmart or Amazon if you don’t have it at home. Usually, isopropyl alcohol comes in either 90% or 95% concentration, according to Karunarathne, but anything 90% and above will work.
Mix three parts alcohol with one part aloe vera gel, which prevents your skin from drying out. (If you can’t find pre-made aloe gel, you can also scrape some out of the leaves of an aloe plant. Cut the sides of a leaf and remove the top skin. Using a spoon, scrape the gel out. In a high-speed blender, blend the collected gel for two to three minutes, then use a strainer to filter the gel and remove leaf debris.)
If you want, add a few drops of essential oil to the mix for a nice scent.
Transfer your sanitizer to a clean, empty container. You can refill empty hand sanitizer bottles, or use any small container that’s easy to carry with you. Karunarathne said that if you see cloudy sedimentation, shake the container before use.
Disposable Disinfecting Wipes
If your store is sold out of Clorox wipes, you can easily make your own, according to Davies.
Start with a roll of paper towels and cut it in half horizontally so that you’re left with two toilet paper-like rolls.
Mix 2 cups of water with 2 tablespoons of bleach.
Place one paper towel roll flat into an airtight container and pour the solution over the top. The container should be large enough to hold all the liquid while ensuring the paper towels are fully saturated.
Take out the cardboard center roll and pull out fresh paper towels from the middle.
Reusable Disinfecting Wipes
Instead of relying on single-use (and hard to find) disinfectant wipes, Kris Bordessa, a sustainability expert and author of “ Attainable Sustainable: The Lost Art of Self-Reliant Living, ” says you can make reusable ones instead.
Start with an old T-shirt or other cotton fabric. Cut it into squares, about the same size as a commercial wipe.
Soak these cloths with your bleach solution or a mixture of 2/3 cup 99% isopropyl alcohol and 1/3 cup water.
Store your used wipes in a sealed container until laundry day, then wash them using the hot water setting before resoaking them in your solution and reusing.
Don’t Rely On “Natural” Cleaners For Coronavirus
Though you might want to minimize the use of harsh chemicals in your home, especially in your kitchen where food is prepared, the truth is that you need to rely on the tough stuff to kill the coronavirus and other harmful germs. Some “natural” household items may have helpful cleaning properties but will not disinfect:
Vinegar: Effective on mildew, dirt and bacteria, vinegar has long been a go-to for cleaning surfaces around the home. Though vinegar is a safe and natural way to get rid of some types of germs, it isn’t an EPA-registered household disinfectant and isn’t recommended in place of alcohol or bleach.
Tea tree and other essential oils: Though tea tree oil and other essential oils have been touted for a wide range of questionable benefits, including antiviral properties, there’s no scientific proof that they prevent people from contracting viruses. Essential oils can make your cleaning products smell nice and might even eliminate some types of bacteria, but you shouldn’t rely on them to kill the coronavirus.
Vodka and other spirits: There are many DIY hand sanitizer recipes on the web that suggest using vodka in a pinch. However, the CDC says that hand sanitizer must have an ethyl alcohol concentration of at least 60% to be effective, and most vodkas fall well below that threshold. When mixed with aloe or other substances, the concentration is diluted further. Even Tito’s Vodka tweeted a warning that their vodka is only 40% alcohol and does not meet the CDC’s standards for an effective sanitizer.
Dr. Anthony Fauci’s name appears on four U.S patents for a key glycoprotein that seems to have been inserted into the SARS virus to create COVID-19.
Justia.com, a legal portal, lists patents by inventor Anthony Fauci involving a glycoprotein in HIV-1.
This same glycoprotein, identified as Glycoprotein 120, or simply as GP120, has also been found to be a key component of the current COVID-19, a disease that appears to combine a HIV-1 attack on the human immune system, with SARS CoV-1, the pathogen from the original SARS
Medical scientists in India reported four intersections in the spike glycoprotein that are unique to COVID-19 and not present in other coronaviruses. The article was taken down after it was suggested that Covid-19 was created in a lab by inserting the glycoprotein from HIV-1 into a sars virus.
Related: How To Detoxify and Heal From Vaccinations – For Adults and Children
In recent weeks media platforms have stopped banning content that suggests COVID-19 was made in a lab after president Biden called a search into the origins of the virus.
Published by Ian Matthews on August 12, 2014 August 12, 2014
There are two ways to set Windows Defender (Security Essentials) to automatically update and the first is to set WINDOWS UPDATE to automatically install all updates. The other way is to create a new SCHEDULED TASK:
- Click START and type TASK and then click on TASK SCHEDULER
- Right click on TASK SCHEDULER LIBRARY and select CREATE NEW BASIC TASK
- Type a name like UPDATE DEFENDER, and click the NEXT button
- Leave the TRIGGER setting to DAILY, and click the NEXT button
- Leave the DAILY setting to RECUR EVERY 1 DAYS, and click the NEXT button
- Leave the ACTION on START A PROGRAM, and click the NEXT button
- In the PROGRAM/SCRIPT field enter: “C:\Program Files\Windows Defender\MpCmdRun.exe” (the quotes ARE required)
- In the ADD ARGUMENTS enter -SignatureUpdate (no quotes), and click the NEXT button
- Click the FINISH button to complete the task
- Double click on the task and select from the GENERAL TAB, select RUN WHETHER USER IS LOGGED IN OR NOT, click OK and enter the password for your account.
Note that you can change the schedule of this task to more than once a day (or less I suppose) by double clicking on it and selecting the TRIGGERS tab.
Everyone is (and should be) concerned about computer viruses, especially with new variations of this malicious software emerging each year. But what does it mean for your data and device if it becomes infected with a virus and what damage can it do?
A computer virus works similarly to the flu virus: it’s highly contagious, you feel run down, you need more sleep and rest than usual and it’s difficult to perform even the simplest of daily tasks. Likewise, a computer virus interferes with the performance of your device by replicating itself and spreading throughout the operating system. A virus can damage programs, delete files and reformat or erase your hard drive, which results in reduced performance or even crashing your system entirely. Hackers can also use viruses to access your personal information to steal or destroy your data.
As society becomes more dependent on technology, it’s important to educate yourself, family, friends, employees and co-workers about safely navigating the internet. Here’s a quick guide on everything you need to know about computer viruses – from what they are and to how to spot one, to what you should do if your device is infected.
How a Computer Gets a Virus
There are several ways a computer can get infected by a virus and most of them involve downloading – either intentionally or unintentionally – infected files. Pirated music or movies, photos, free games and toolbars are common culprits, as are phishing/spammy emails with attachments. Viruses can also be downloaded by visiting malicious websites or clicking links or ads to an unknown/unsecure website. Even connecting to an infected external drive (like a USB) can introduce malicious software into your system.
How to Spot a Computer Virus
If you notice any of the following issues with your computer, it may be infected with a virus:
- Slow computer performance (taking a long time to start up or open programs)
- Problems shutting down or restarting
- Missing files
- Frequent system crashes and/or error messages
- Unexpected pop-up windows
- New applications (toolbars, etc.) that appear without you downloading them
- Overworked hard drive (the fan makes sounds and seems to be whirring and working hard when you aren’t doing much)
- Emails that send autonomously from your accounts
- Browser lag or redirects
- Malfunctioning antivirus programs or firewalls
Protecting Your Computer Against a Virus
While hackers are continuously creating smarter and more advanced viruses, there are several ways to protect your device and files.
The best way to deal with a virus is to prevent it in the first place by using antivirus protection and antispyware software. It’s important to keep these applications up to date, as well as regularly updating your operating system and making sure that your browser’s security settings are current. Regularly back up your files (to the cloud or safe external hard drive) in case they become corrupted, ransomed or are deleted. Use a security tool to evaluate your device and find out how vulnerable it might be.
When you’re surfing the internet, don’t click questionable links or pop-ups. Your browser may warn you about suspicious websites, or you might see a red unlocked lock to the left of the URL at the top of the webpage if it is unsecured. This doesn’t always mean a website is dangerous, but you may want to think twice about browsing or entering your information.
Another good rule of thumb is to never open an email or attachment unless you know and trust the sender. Oftentimes, hackers will use a friend’s name as the sender or use “Re:” in the subject line to trick you, so double check the actual email address to see if you recognize it. If you open the email and still aren’t sure, even if it’s from a trusted source, it’s still best to delete.
Be very careful when downloading software. Only download programs, movies and music from legitimate websites or services.
Many people connect using public Wi-Fi in cafes, restaurants or stores, but these unsecured networks can leave your phone, tablet or computer susceptible to viruses. Instead, consider using a personal hotspot to connect to the internet. If public Wi-Fi is your only option, use a VPN to better protect your device and data.
Finally, educate yourself about the types of threats out there and teach others to do the same. For instance, around 95 percent of teens use the internet, but 18 percent say they haven’t been educated about “good online behavior.” By taking the time to talk with your family about safe online habits, you can drastically lower the risk of devices being compromised.
What to Do If You Get a Virus
If you think your computer has been infected, start by running a full system scan using your antivirus software and an anti-malware program. Review the threats and take any action that you can (the software should guide you through this). If you are unable to delete the virus or infected files from your software, try restoring your computer to an earlier back-up before you began having problems.
Another strategy to try is deleting all of the temporary files on your computer. The method of clearing those files differs between systems but these processes are easy enough to research and implement for the average user. If your computer is malfunctioning and preventing you from accessing files to delete, you can try booting up in safe mode. Safe mode restricts certain programs so you can work to fix the issue without interruption.
In some cases, you may need to reinstall your operating system. If you aren’t familiar with how to do that, take your device to a local store that offers computer services and have a professional take a look.
All in all, prevention and education are the most effective ways to stop your computer from getting infected by a virus. Know the basics of staying safe online and share articles like these with family, friends and colleagues.
Author Bio
Alice is an experienced freelance writer who specializes in technology and business. She has a passion for understanding how technology is changing the human experience and communicating this societal transformation.
There are thousands and thousands of different viruses and malware on the Internet today. So, you may be asking, what motivates people to create viruses and malware?
There are three primary reasons why they create them:
Making money
Many viruses, malware, and spyware found on computers do not harm the computer all that much, other than slow it down. Instead, this malware is designed to capture information about the computer user and send it to the malware creator. The information they collect is then used to target advertisements to your computer. These ads come in the form of e-mails and pop-ups on your computer.
If enough computers get infected, they can earn money from all the ads displayed. The more ads they send out, the more they get people to buy something or visit the advertiser. Sometimes, all it takes is one virus or malware program to generate hundreds or thousands of ads on your computer.
Stealing account information
Online games and virtual goods have a real-life value attached to them, and malware is created to steal online account information associated with online games. Using this type of malware, a person could access a victim’s account and steal their virtual goods and currency. They could even sell their ill-gotten virtual goods to other players for real money.
Causing problems and trouble
Some people create viruses and malware because they enjoy causing trouble and making others suffer. Some malware can crash an entire network system and cause system outages for large companies, like banks or production companies.
In the end, it’s the thrill of seeing the havoc and chaos they can create that drives them to create more viruses and malware.
Why do people spread viruses?
Almost all viruses are spread unintentionally by the users who become infected by a virus. For example, someone might open an infected file that infects all other files and computers connected to that computer without even knowing what they’ve done.
What can you do?
Your best defense against malware and spyware is to keep your computer updated. You should ensure you have up-to-date antivirus and anti-spyware/malware software installed on your computer. Additionally, always be cautious of e-mail attachments, even from someone you know.
By Jeanna Bryner published 21 March 20
The persistent myth can be put to bed.
Editor’s note: On April 16, news came out that the U.S. government said it was investigating the possibility that the novel coronavirus may have somehow escaped from a lab, though experts still think the possibility that it was engineered is unlikely. This Live Science report explores the origin of SARS-CoV-2.
As the novel coronavirus causing COVID-19 spreads across the globe, with cases surpassing 284,000 worldwide today (March 20), misinformation is spreading almost as fast.
One persistent myth is that this virus, called SARS-CoV-2, was made by scientists and escaped from a lab in Wuhan, China, where the outbreak began.
A new analysis of SARS-CoV-2 may finally put that latter idea to bed. A group of researchers compared the genome of this novel coronavirus with the seven other coronaviruses known to infect humans: SARS, MERS and SARS-CoV-2, which can cause severe disease; along with HKU1, NL63, OC43 and 229E, which typically cause just mild symptoms, the researchers wrote March 17 in the journal Nature Medicine.
“Our analyses clearly show that SARS-CoV-2 is not a laboratory construct or a purposefully manipulated virus,” they write in the journal article.
Kristian Andersen, an associate professor of immunology and microbiology at Scripps Research, and his colleagues looked at the genetic template for the spike proteins that protrude from the surface of the virus. The coronavirus uses these spikes to grab the outer walls of its host’s cells and then enter those cells. They specifically looked at the gene sequences responsible for two key features of these spike proteins: the grabber, called the receptor-binding domain, that hooks onto host cells; and the so-called cleavage site that allows the virus to open and enter those cells.
That analysis showed that the “hook” part of the spike had evolved to target a receptor on the outside of human cells called ACE2, which is involved in blood pressure regulation. It is so effective at attaching to human cells that the researchers said the spike proteins were the result of natural selection and not genetic engineering.
Here’s why: SARS-CoV-2 is very closely related to the virus that causes severe acute respiratory syndrome (SARS), which fanned across the globe nearly 20 years ago. Scientists have studied how SARS-CoV differs from SARS-CoV-2 — with several key letter changes in the genetic code. Yet in computer simulations, the mutations in SARS-CoV-2 don’t seem to work very well at helping the virus bind to human cells. If scientists had deliberately engineered this virus, they wouldn’t have chosen mutations that computer models suggest won’t work. But it turns out, nature is smarter than scientists, and the novel coronavirus found a way to mutate that was better — and completely different— from anything scientists could have created, the study found.
Another nail in the “escaped from evil lab” theory? The overall molecular structure of this virus is distinct from the known coronaviruses and instead most closely resembles viruses found in bats and pangolins that had been little studied and never known to cause humans any harm.
“If someone were seeking to engineer a new coronavirus as a pathogen, they would have constructed it from the backbone of a virus known to cause illness,” according to a statement from Scripps.
Where did the virus come from? The research group came up with two possible scenarios for the origin of SARS-CoV-2 in humans. One scenario follows the origin stories for a few other recent coronaviruses that have wreaked havoc in human populations. In that scenario, we contracted the virus directly from an animal — civets in the case of SARS and camels in the case of Middle East respiratory syndrome (MERS). In the case of SARS-CoV-2, the researchers suggest that animal was a bat, which transmitted the virus to another intermediate animal (possibly a pangolin, some scientists have said) that brought the virus to humans.
In that possible scenario, the genetic features that make the new coronavirus so effective at infecting human cells (its pathogenic powers) would have been in place before hopping to humans.
In the other scenario, those pathogenic features would have evolved only after the virus jumped from its animal host to humans. Some coronaviruses that originated in pangolins have a “hook structure” (that receptor binding domain) similar to that of SARS-CoV-2. In that way, a pangolin either directly or indirectly passed its virus onto a human host. Then, once inside a human host, the virus could have evolved to have its other stealth feature — the cleavage site that lets it easily break into human cells. Once it developed that capacity, the researchers said, the coronavirus would be even more capable of spreading between people.
All of this technical detail could help scientists forecast the future of this pandemic. If the virus did enter human cells in a pathogenic form, that raises the probability of future outbreaks. The virus could still be circulating in the animal population and might again jump to humans, ready to cause an outbreak. But the chances of such future outbreaks are lower if the virus must first enter the human population and then evolve the pathogenic properties, the researchers said.
Coronavirus science and news
- Coronavirus in the US: Map & cases
- What are the symptoms?
- How deadly is the new coronavirus?
- How long does virus last on surfaces?
- Is there a cure for COVID-19?
- How does it compare with seasonal flu?
- How does the coronavirus spread?
- Can people spread the coronavirus after they recover?
The one-month trial gives you access to all of the educational site’s 9,000 activities in reading, science, math and art. Keep your child busy and learning while we are all stuck indoors.
The one-month trial gives you access to all of the educational site’s 9,000 activities in reading, science, math and art. Keep your child busy and learning while we are all stuck indoors.
Antivirus and anti-malware apps fill an important need on our computers, but they’re not foolproof (*ahem*, McAfee ). More often than you’d think, they’re just plain wrong. Here’s what to do when you’re not sure whether a download has a virus.
How to Fix the McAfee Restart Debacle on Your Machines
Reader Max Buser’s company was hit by the bad McAfee update earlier today. Here’s how they got…
On a regular basis, we get email from readers saying that some download we posted contains a virus, and we assure them that said download is clean. (Over the past five years, our track record in this arena is next to spotless.) So how do you know if a download really has a virus or not?
Lifehacker’s Weirdest and Most Controversial Posts
Everybody gets a little ribbing at their birthday party, and we’re no different. As part of…
There’s no exact science when it comes to figuring out if a file has a virus or is just being detected as a false positive, but today we’ll share a little background and some tips that will help you figure out whether a file really contains a virus or not.
Britech Pop-Up Canopy
Quick set-up
Get shady with our outdoor canopy! This CPAI-84 Fire-Retardant certified canopy is perfect for keeping your family safe from harmful UV rays. With a silver-coated fabric and its sun-protective cover, this canopy will keep you cool and comfortable all day long.
What Is a False Positive Exactly?
A false positive is when your virus scanner detects a file as a virus, even when it really isn’t a virus, and then tries to quarantine or delete that file. If you’ve read about the recent McAfee fiasco , you’ll begin to see the problem—they released a virus definition update that detected internal Windows files as a false positive, deleted them, and then suddenly Windows couldn’t boot anymore. Antivirus software is not perfect.
McAfee Update Shuts Down XP Machines
McAfee corporate customers across the globe using Windows XP experienced massive shutdowns today as
Some virus scanners also employ an additional line of defense called heuristic analysis , which attempts to identify new forms of malware right away by scanning for smaller sections of code that might indicate some bad behavior, even if the virus has never been detected before. Unfortunately, because this method is not exact, it also will detect a lot of files as viruses incorrectly.
Use VirusTotal to Check for False Positives
Whenever there’s a possibility that a file you’ve downloaded might contain a virus, the first thing you should do is upload it to online virus scanning service VirusTotal , which instantly scans the file against 40 different antivirus engines at the same time, and gives you the results.
You can use the VirusTotal Uploader to instantly scan any file via your right-click context menu. (We’d highly recommend installing this small utility.) VirusTotal Uploader will upload any file you choose directly to the VirusTotal web site and run the scan without you having to hassle with annoying web upload forms. Even better, most of the time you don’t even have to wait for the file to upload, since before uploading, the app checks your file’s hash (a unique identifier, sort of like a fingerprint for files) against their database, so if they’ve already checked that file, you’ll get instant results.
VirusTotal Uploader 2.0 Instantly Scans Files for Viruses Against 41 AV Apps
Windows only: Previously mentioned VirusTotal Uploader automatically uploads any file to online…
You’ll sometimes find that files are caught as viruses by just a single virus scanner out of the 40, which is a good sign that you’re dealing with a false positive from one of the more aggressive virus scanners. It should be noted that VirusTotal is not a replacement for using your favorite antivirus application , which offers real-time protection against a variety of attack vectors—but it is a strong supplement.
Five Best Antivirus Applications
Computer viruses are increasingly sophisticated and pervasive. If you can’t afford to run your…
AutoHotkey and Overly Aggressive Virus Scanners
We’re huge fans of the AutoHotkey scripting language around here, because it helps you simplify your life by turning any action into a hotkey . Many of the small utilities that we link to, like our own Lifehacker Code projects , are also written in AutoHotkey, or are provided as both a script and a compiled version.
Turn Any Action Into a Keyboard Shortcut: A Beginner’s Guide to AutoHotkey
We waste a ton of time every day clicking through menus and typing repetitive text. AutoHotkey is…
Since the AutoHotkey language provides the ability to monitor keystrokes and mouse movements, it is often detected by heuristic virus scanners incorrectly as a keylogger or trojan—because those are the same type of internal Windows functions that a trojan might take advantage of to steal your password. This doesn’t mean that the file necessarily has a virus.
The great thing about most AutoHotkey applications that we link to is that the source code is usually provided, so you can just open up the .ahk file yourself and see what exactly is going on. In fact, if you have AutoHotkey installed, you can run any .ahk file instead of the provided executable file.
Ask the Developer
You’d be surprised to find out just how easy it is to get in touch with some developers. People email us all the time asking about the false-positive AutoHotkey apps we host on the site, and we do our best to reply. Other developers—who aren’t also sorting through hundreds of other tips emails every day—are probably even easier to get a hold of, and if they’re legit, they care a great deal about what antivirus apps are saying about their software and will do whatever it takes to help. Again, you shouldn’t necessarily trust everything said developer has to say, but if a developer is easy to contact, chances are they’re making legit apps. It’s the developers who are impossible to get a hold of (because it’s in their best interest not to be found) that are a little more worrisome.
Use Your Judgment
If your antivirus software is telling you that a file contains a virus, you shouldn’t blindly assume that you’re dealing with a false positive; use that opportunity to ask yourself if you really need to install that application. If you do, make sure to check with VirusTotal first, make sure the download is from a reputable place, and then make that judgment call on your own.
So what about you? What do you do when a file is detected as a virus? Share your thoughts in the comments.
The How-To Geek prefers his AutoHotkey scripts in source code form. His geeky articles can be found daily here on Lifehacker, How-To Geek , and Twitter .
Want to try Windows 11 risk-free? Use Hyper-V to create a virtual machine where you can test the new operating system without losing access to your “real” PC. I’ve got step-by-step instructions here.
Ed Bott is an award-winning technology writer with more than two decades’ experience writing for mainstream media outlets and online publications.
How do you test Windows 11 for compatibility with essential apps without putting your work at risk? Simple: Use the built-in Hyper-V platform on your Windows 10 PC to create a virtual machine and install Windows 11. You can run your existing apps and services in that virtual machine without risking the integrity or stability of your “real” PC.
special feature
Creating a new virtual PC is easy, assuming your PC satisfies the requirements. You must be running a 64-bit business edition of Windows Pro or Enterprise edition; the Home edition does not include Hyper-V support. In addition, your CPU and associated hardware must meet specific requirements. (For this walkthrough, I assume you are running Windows on a PC with a supported Intel or AMD CPU; the rules for Arm-based CPUs are different.) Most modern CPUs pass this test with ease. (For full details, see “Windows 10 tip: Find out if your PC can run Hyper-V.”)
You also need enough physical hardware resources to devote to your virtual machine. I recommend at least 8 GB of memory, along with enough unused local storage to hold a full installation of Windows, apps, and checkpoints (32 GB should be sufficient).
Finally, you need a copy of the Windows 11 installation files in ISO format. You can get that file from Microsoft’s Download Windows 11 page by choosing the Download Windows 11 Disk Image (ISO) option.
With those preliminaries out of the way, you’re ready to get started. Note that all of the steps below work exactly the same on Windows 10 and Windows 11.
1. Click Start and type Hyper-V in the search box. If Hyper-V is already enabled, open the Hyper-V Manager utility and skip to the next step. If you see the Turn Windows features on or off option, click to open the Windows Features dialog box, choose the Hyper-V option, and restart your PC to continue.
2. In Hyper-V Manager, make sure your PC’s name is selected in the center pane and then, in the Actions pane on the right, click New > Virtual Machine.
3. In the New Virtual Machine wizard, use the following settings:
- Specify Name and Location – Enter a descriptive name here. This name will appear in the Hyper-V Manager window.
- Specify Generation – Choose Generation 2 here. (You won’t be able to install Windows 11 on a Generation 1 VM, which is strictly for legacy operating systems.)
- Assign Memory – You can use the default settings here. If you have at least 16 GB of RAM on the host PC, I recommend entering 4096 MB in the Startup Memory box.
The default Dynamic Memory option keeps RAM usage to a minimum, expanding as needed
- Configure Networking – Choose Default Switch from the drop-down menu.
- Connect Virtual Hard Disk – Use the default option, Create A Virtual Hard Disk. You can safely leave its size at 127 GB. Hyper-V creates a dynamically expanding virtual hard disk that uses only a fraction of that space.
These default settings create a dynamically expanding 127 GB virtual hard disk that uses only a small amount of actual disk space
- Installation Options – Choose the second option, as shown here; then click Browse and choose the Windows 11 ISO from your Downloads folder.
Specify the location of the Windows 11 installation file to automatically mount your ISO as a virtual DVD drive
4. Click Finish to create the virtual machine, but don’t connect to the VM just yet. Instead, from Hyper-V Manager, right-click the VM you just created, click Settings, and make the following tweaks to avoid having Windows 11 complain later that your VM doesn’t meet its hardware requirements:
- In the Hardware pane on the left, select Security. Then, in the pane on the right, click Enable Trusted Platform Module.
Select this checkbox to enable the virtual TPM required for a Windows 11 VM.
- Select Processor in the Hardware pane and change the setting for Number Of Virtual Processors to 2.
Make this tweak as well to avoid seeing an error message when installing Windows 11.
- Click OK to save your changes.
5. Double-click the VM and click Start to connect to the virtual machine. Be prepared to click in the Virtual Machine Connection and tap any key to boot from the virtual DVD you created using your Windows 11 ISO. That should open the Windows Setup screen shown here.
If everything’s configured correctly, you can start here to do a clean install of Windows 11 on your new VM
6. Click next to begin the installation. When you’re asked to enter a product key, click the small “I don’t have a product key” link at the bottom of the dialog box, and then select Windows 11 Pro from the list of available editions. Follow the prompts to complete setup.
If you configured Windows to use a Microsoft account, you’ll need to do one last tweak before you can sign on in an enhanced session and use your VM in full-screen mode: Go to Settings > Accounts > Sign-in Options and turn the Require Windows Hello Sign-in For Microsoft Accounts switch to the Off position.
You’ll need to turn this setting off to sign in to a Windows 11 VM using a Microsoft account in an enhanced session
If you forget to make this adjustment and try to sign in using an enhanced session, you’ll find yourself stuck at the Windows sign-in screen with only the background image visible. The fix is simple: From the Virtual Machine Connection window, choose View, then click Enhanced Session to clear the checkbox and switch to a basic session.
Sign in and make the change to your account settings and then use the View menu to switch back to an enhanced session.
I tried to download a file recently on a Windows 10 Fall Creators Update system using Google Chrome, Microsoft Edge and Mozilla Firefox, and could not because all blocked the file download because of a virus that was detected during the security scan.
Chrome displayed “Failed – Virus detected”, Microsoft Edge “[filename] contained a virus and was deleted”, and Firefox simply “failed” in the user interface.
Windows Defender was the security program on the machine, and a quick check revealed that the built-in security tool was indeed responsible for blocking the file download on the machine.
I knew that this was a false positive, and the following paragraphs describe how I tried to get the file to download to the system.
First thing that I did was start Windows Defender Security Center to find out more about the threat.
Start the program with a tap on the Windows-key, type Windows Defender, and select the entry Windows Defender Security Center.
Click on the Hamburger Icon in the top left corner to display menu names next to icons, and select Virus & threat detection from the menu.
Select scan history afterwards. Windows Defender may list there that there are not any current threats. This may be puzzling at first, but the security program lists only threats there that require user decisions.
Since the downloaded file was quarantined automatically, no user action is required which in turn means that there are not any current threats.
The list of quarantined threats is below. If you are lucky, you may see the virus that Windows Defender detected when it scanned the file download. The file name is not listed there however but the date may be sufficient to make an educated guess.
A click on the row displays options to restore the file or remove it, and to display details. Details displays the file name, but it may not be enough to identify the file, as Windows Defender may display a temporary name.
Remove deletes the file from the quarantine, restore on the other hand may restore it on the system so that you may access it.
The current version of Windows Defender Security Center has quite a few issues in this regard. I mentioned the lack of details already, but it is just one of the issues that you may run into.
Another is that you may only get old files listed under quarantined threats. Windows Defender Security Center limits the threats to five on that page. While you can click on “see full history” to display all items that the security program quarantined, you will notice right away that the buttons to remove or restore files are missing there.
What you can try is clear the history, and retry the download. It happens that you get a failed download due to the detection of a virus, but no immediate listing under quarantined threats.
You have one option to deal with that:
- Turn off the protection for the time being, and download the file again. While it is usually not suggested to turn off the security tools of the system, you sometimes have no other recourse but to do so. Go to Virus & threat protection > Virus & threat protection settings to turn off the protective modules there.
- Add the file that you just downloaded to the list of exclusions (you cannot do so before it is downloaded), and turn the protective modules back on afterwards. You find the option on the Virus & threat protections settings page.
Closing Words
The whole process of unblocking files that you want to download that Windows Defender blocked is complicated and to a degree broken. Why are not there options to remove or restore files in the full history, why do I need to click multiple times to find out more about a threat, and why are not threats listed sometimes in the main interface where you can restore them?
Is that reasonable?
Swine flu, or H1N1, had been dead for 20 years when it suddenly re-emerged in 1977 with a curious twist. The new strain was genetically similar to one from the 1950s, almost as though it had been sitting frozen in a lab since then. Indeed, it eventually became clear that the late-70s flu outbreak was likely the result of a lowly lab worker’s snafu.
Lab accidents like that are extremely rare. Still, two scientists are now arguing that it’s not worth continuing to create new, transmissible versions of deadly viruses in labs because the risk that the diseases will escape and infect the public is too great.
The H5N1 avian flu killed two dozen people in Hong Kong in 1997. It has only killed about 400 people worldwide since then, though, because it doesn’t pass easily from human to human.
In recent years, scientists have found a way to make H5N1 jump between ferrets, the best animal model for flu viruses in humans. They say they need to create a transmissible version in order to better understand the disease and to prepare potential vaccines.
Recommended Reading
Toward a Universal Theory of ‘Mom Jeans’
Uber’s Self-Driving Car Didn’t Malfunction, It Was Just Bad
Could Index Funds Be ‘Worse Than Marxism’?
That worries people like Marc Lipsitch and Alison P. Galvani, two epidemiologists who write in a PLoS Medicine editorial today that creating these types of new infectious agents puts human life at risk. They estimate that if 10 American laboratories ran these types of experiments for a decade, there would be a 20 percent chance that a lab worker would become infected with one of these new super-flus and potentially pass it on to others.
“The concern is that you’re making something that doesn’t exist in nature and combines high virulence for people with the ability to transmit efficiently,” Lipsitch told me.
Accidents involving lab-grown pathogens aren’t just the stuff of sci-fi movies. A Singaporean lab worker was inadvertently infected with SARS in 2003. In 2004, a Russian scientist died after accidentally sticking herself with a needle contaminated with Ebola at a Siberian lab. In April, Paris’ Pasteur Institute lost 2,000 vials containing the SARS virus. And in March, the Galveston National Laboratory in Texas lost a vial containing Guanarito virus, which causes “bleeding under the skin, in internal organs or from body orifices like the mouth, eyes, or ears.”
The medical world seems perpetually torn between the desire to eliminate horrific diseases entirely and the need to preserve them for future study. Thanks to vaccination, smallpox was eradicated in 1980, but there are still two samples of it living in labs—one in the U.S. and one in Russia. Some scientists argue that those vials should be destroyed because there’s a chance they could be used in bioterrorism. There is no cure for smallpox, and it kills a third of its victims. The rest suffer permanent scarring from the thousands of “pox,” or fluid-filled cysts.
“The hazard is, could it ever by accident or by evil design leave those two containments and actually be introduced into the population again and spread?” William Schaffner, chair of preventive medicine at Vanderbilt University Medical Center in Nashville told ABC News. The World Health Assembly is deciding this week whether to destroy the vials.
Most labs have near-bulletproof safety standards, with workers wearing plastic hoods and working behind heavy steel doors. Still, leaks can happen because of failures in respiratory equipment, Lipsitch said, or if a worker accidentally touches their eyes or nose with a contaminated glove.
“We have data from past experience in various labs that human infection in those labs are not a common event, but with enough labs working for enough years, it’s been observed over and over again,” Lipsitch said. “Marburg and Ebola viruses have both infected lab workers at a higher level of containment than these [H5N1] experiments.”
He added that past lab accidents haven’t resulted in worldwide spread partly because the viruses weren’t as contagious in those cases.
“In the case of Ebola and Marburg—they aren’t that readily transmissible,” he said. “In the case of SARS, which has been involved in at least three separate lab accidents, there was onward transmission in one case, but it was contained, so we got lucky.”
Lipsitch suggests that, rather than breed the new mammal-transmissible viruses, scientists just use pieces of the H5N1 strain for their research or work on ancestors of the virus.
The scientists conducting the ferret-based H5N1 experiments went through a year-long voluntary moratorium after a controversy over the studies’ safety flared in 2011. In January 2013, they declared that the experiments would resume because the lab conditions for the experiments met the necessary safety checks. “Because H5N1 virus transmission studies are essential for pandemic preparedness and understanding the adaptation of influenza viruses to mammals,” they wrote in Science, “researchers who have approval from their governments . have a public health responsibility to resume this important work.”
Learning Targets:
- I can discuss the role of the Central Dogma in viral replication.
- I can describe the specifics of how the SARS-CoV-2 virus takes over a host cell in order to replicate and make many copies of itself.
Watch:
Covid-19: An Illustrated Scientific Summary
- How Coronavirus Hijacks Your Cells
Read & Decide:
“Bring, Build, Borrow, or Steal”
To complete this activity, you will read the information provided and then use the following verbs: bring, build, borrow or steal to fill in the words missing from the paragraph below. You must choose one of those four words. First, read the important information below.
Background : Viruses are clever entities and they are minimalists. Most viruses carry very little within their capsid (and envelope if they have one) and the majority of their insides is genetic material made of either strand(s) of deoxyribonucleic acid (DNA) or ribonucleic acid (RNA). The viral genome (genetic material) has the instructions, aka genes, to take over the host cell and to build new copies of itself. This process of host cell takeover is known as “molecular hijacking.” When a virus replicates it has to build entire viral particles and it has to not only make the proteins that comprise the viral capsid (and enclose it with an envelope), but it must also replicate its genetic material.
The Central Dogma is a concept coined by Francis Crick in the 1950s. Crick received a Nobel Prize along with his colleague James Watson for elucidating the structure of DNA. The Central Dogma (pictured below) describes the transfer of genetic information (blueprints) into function in a cell. DNA, which is the makeup of the genome of most organisms, can be replicated, but also transcribed into RNA molecules, which are then translated into proteins. Proteins go on to perform functions, such as the capsid of a virus is made of proteins that provide a structure to encapsulate the viral genome.
Facts: Host cells and viruses have many, many differences with respect to the proteins and molecules within each. Because the virus is a minimalist and carries only a few things with it, it has to either borrow or steal the machinery of the host cell it infects or it must bring the blueprints to build what it needs.
The host cell has the following:
- DNA polymerase – the enzyme needed to replicate DNA (DNA –> DNA) ·
- RNA polymerase – the enzyme required to transcribe DNA into RNA (DNA –> RNA) ·
- Ribosomes – the entities responsible for translating RNA into proteins (RNA –> Proteins) ·
- Phospholipids that make up membranes
Fill in the blanks:
Now decide which word (bring, build, borrow, or steal) correctly fills in the blanks in the paragraph below. Remember that borrowing is distinct from stealing; assume borrowing involves the return of the goods to the host, but stealing does not. SARS-CoV-2, the virus that causes COVID-19, has a protein capsid that is surrounded by a phospholipid envelope. Inside its capsid is a genome of RNA. Spike proteins called, S proteins, recognize the ACE2 receptors of host cells allowing the virus to enter the host cell. Upon entry into the host cell, the virus hijacks the host and turns it into a factory producing many, many copies of SARS-CoV-2. First, the virus ____________ its own genome of RNA, which then needs to be coded into proteins. Thus, the virus ____________ the genes coding for viral structure, such as capsid and spike proteins. Then the virus must code these genes into proteins and ___________ ribosomes for translation, a process that also requires the virus to __________ amino acids, which are the building blocks of proteins. In doing this, the virus __________ many capsid and spike proteins to make many viral particles. SARS-CoV-2 also ____________ a gene that codes for a protein enzyme that is capable of copying RNA into more RNA molecules. This way the virus can then ____________ many, many copies of its own genetic material to be carried within each viral particle produced. This protein enzyme, called an RNA-dependent RNA polymerase, will then copy the virus’s RNA genome which requires it to ___________ ribonucleotides, which are the building blocks of RNA molecules. Once the capsid, spike proteins, and RNA genomes are produced, they are assembled and get ready to leave the host cell. Upon exit, each virus obtains its envelope and when doing so, the virus particles ___________ phospholipids from the host cell’s membrane. One the new viral particles exit the cell, they go on to find new cells to infect.
Model:
SARS-CoV-2 is an RNA virus, meaning its RNA genome can be directly translated into proteins, but it needs to make copies of its RNA genome when the virus replicates, a process that cannot naturally occur in animal cells. If a virus has a genome composed of DNA, such as the viruses that cause polio, herpes, HPV, and chicken pox to name a few, then the virus needs a very different strategy to hijack its host cell. Think about what enzymes these viruses can borrow from the host cell in order to replicate entirely. Draw and model a viable strategy a DNA virus uses to hijack its host cell.
Reflect:
The human immunodeficiency virus (HIV), which is the virus that causes AIDS, also has an RNA genome, but this virus does not use the same strategy for molecular hijacking as SARS-CoV-2. HIV can remain latent in host cells, meaning it is not actively replicating and making many copies, but rather it hides out and replicates only once along with the host cell when it divides. In order to do this, HIV integrates its genome into that of the host cell. Considering this, what must HIV bring into the host cell and what process must occur in order to integrate the viral genome into the host cell’s genome?
No one likes being sick, and it can be equally miserable – if not worse – if your kiddos are sick too. Plus it seems like every cold and flu season gets worse with one superbug announcement after another. It’s enough to make anyone ask – how do we stop this madness?!
Cleveland Clinic is a non-profit academic medical center. Advertising on our site helps support our mission. We do not endorse non-Cleveland Clinic products or services. Policy
Here are some ways to increase your odds of beating the crud and to help protect yourself and others.
Soap, water, repeat
The spreading of any sort of virus begins and ends with hand washing (or lack thereof).
And yes we know – that sounds ridiculously obvious, right? It’s no secret that washing your hands is important. But you’d be surprised by how many people skimp when it comes down to this habit. (One study found that only 5% of people wash their hands properly!)
“The way that viruses transfer from person to person and place to place isn’t usually because you got coughed on by someone who’s sick,” explains pediatric infectious disease expert Frank Esper, MD. “Instead, someone usually coughs on their hands and goes on to touch something. Then someone else touches that thing with their hands and their hands end up in their mouth – along with the virus.”
One of the best things you can do to protect yourself during cold and flu season (and really anytime of the year) is to break the transmission cycle by routinely washing your hands.
Also remember that any virus you might already have has the potential to spread to others in the same fashion. So washing your hands every time you cough, or every time that you’re interacting with someone, preferably before you interact with them, is the best thing that you can do.
It’s one of the reasons why doctors always wash their hands before they see a patient and again right afterwards, Dr. Esper says.
Does the hand washing rule apply with RSV and children too?
Good hand hygiene is incredibly important when it comes to babies and small children too, especially when it comes to helping prevent the spread of RSV.
But often times the average two-year-old can’t wash their hands very well – let alone have the coordination or attention span for it. This is where the introduction of alcohol-based rubs, especially for the younger age groups, works well.
It’s also important to understand the impact of hand washing for those around young children.
“When your child is home from school with a runny nose or cough, a lot of times the grandparents or other family members will come over to watch them,” says Dr. Esper. “It’s very important to make sure that everyone who is interacting with the kids knows to wash their hands.”
It’s also a good idea to talk to children about not touching their noses or rubbing their eyes. Most of the time it’s still going to be typical two-year-old behavior –but it helps to start educating them about it when they’re young.
How to avoid getting sick
If you’re still trying to tough out cold and flu season without becoming a victim (or looking for tips on not getting sick again), follow these guidelines:
- Start with a strong offense – always get your flu shot. (Yes, every single year.)
- Be diligent about washing your hands throughout the day.
- Don’t touch your face! Keep your hands out of your eyes, ears, nose and mouth.
- Always carry hand sanitizer with you. (Place it around your home or office for convenience.)
- Focus on good nutrition to help boost your immunity.
- Exercise regularly.
- Get enough sleep.
- Drink plenty of water.
- Try a humidifier.
- Stay home when you’re sick or keep your kids at home if they’re sick.
- Practice stress management.
- Know when to see a doctor.
Also be sure to tread carefully when it comes to guzzling down vitamin C drinks and pills. The jury is still out whether or not these products can actually help you kick a cold or flu faster.
Norton 360. Комплексная защита устройств, в которую входят антивирусные программы, Password Manager, резервное копирование в облаке для ПК ‡‡, 4 и многое другое. Все в одном решении.
Бренд Norton является составляющей NortonLifeLock Inc.
© NortonLifeLock Inc., 2022 г. Все права защищены. NortonLifeLock, логотип NortonLifeLock, логотип с галочкой, Norton, LifeLock и логотип LockMan являются товарными знаками или зарегистрированными товарными знаками компании NortonLifeLock Inc. или ее дочерних компаний в США и других странах. Firefox является товарным знаком Mozilla Foundation. Android, Google Chrome, Google Play и логотип Google Play являются товарными знаками Google, LLC. Mac, iPhone, iPad, Apple и логотип Apple являются товарными знаками Apple Inc., зарегистрированными в США и других странах. App Store является знаком обслуживания Apple Inc. Alexa, и все связанные с ним логотипы являются торговыми марками компании Amazon.com, Inc. или ее дочерних компаний. Microsoft и логотип Windows являются зарегистрированными товарными знаками компании Microsoft Corporation в США и других странах. Представление Android Robot заимствовано или модифицировано на основе общедоступных материалов, созданных в Google, и используется согласно условиям лицензии Creative Commons 3.0 Attribution License. Другие наименования являются товарными знаками соответствующих владельцев.
ХОТИТЕ ЗНАТЬ БОЛЬШЕ?
Следите за новостями, полезными советами и обновлениями.
Whatever you do, don’t tap on any fake iPhone virus links or pop-ups! We’ll teach you how to handle it instead.
* This post is part of iPhone Life‘s Tip of the Day newsletter. Sign Up. *
It can be alarming when you’re browsing a website and a pop-up appears warning you of an iPhone virus! Virus warnings and Apple security alerts like these are scams designed to get you to call or tap on a link. Read on to learn how to safely stop these scams by turning on pop-up blocker settings.
Why You’ll Love This Tip
- Protect yourself from fraudulent virus warnings and phishing sites that can infect your iPhone with malware or trick you into giving away personal data.
- Block annoying pop-ups that interrupt your web browsing on Safari.
How to Get Rid of Fake iPhone Virus Warnings
If you get a virus warning in a pop-up, the first thing to remember is that Apple doesn’t send out messages like these; don’t tap on it or call any numbers listed on the fake alert. Don’t even tap on the pop-up to close it! Some scam alerts seem to have an X or Close option that only resembles a close button but will actually direct you to the phishing site. Instead, follow the steps below:
- Do NOT tap anywhere on the pop-up. Instead, tap the tab icon.
Tap the X button on the tab or swipe up to safely close it.
Open the Settings app.
Toggle on Airplane Mode; this temporarily disconnects your phone from the internet so you can reset Safari while blocking unwanted access to your iPhone.
Scroll down and tap Safari.
Tap Clear History and Website Data.
While in Safari settings, it’s a good idea to make sure Block Pop-ups and Fraudulent Website Warning are also toggled on.
Tap on Settings in the upper-left corner.
Toggle Airplane Mode back off.
Now you can open Safari again; at this point, Apple virus scams shouldn’t be appearing anymore. If you didn’t click on or interact with the fake virus warning, all should be well with your iPhone. If you’re curious to learn more about iPhone security, we’ve also published other articles about iPhone viruses, including Can iPhones Get Viruses, which includes how to get rid of a virus on iPhone. We’ve also written about ways to protect yourself from fraud and identity theft and how to set up two-factor authentication!
Topics
Author Details
Author Details
Leanne Hays
Leanne Hays is a Feature Writer at iPhone Life, and has written hundreds of in-depth how-to and troubleshooting articles. She’s a former Associate Editor for iPhone Life magazine, and has written for the Iowa Source , as well as web content for education marketing. Leanne has an associate’s degree in education, with a focus on curriculum development, as well as a bachelor’s degree in science. She has over nine years of experience with SEO, social media management, and web development and writing. Despite years of web work, Leanne is by no means an early adapter; she’s only owned a smartphone for five years, which makes her highly sympathetic to the learning curve of new iPhone owners. She enjoys making reader’s lives easier and putting her education experience to work by walking them through the most practical ways to use Apple devices, step-by-step.
In off-work hours, Leanne is a mother of two, homesteader, audiobook fanatic, musician, and learning enthusiast.
Noroviruses are as easy to spread and hard to kill as they are unpleasant to experience. If you or a family member have had norovirus — one of the most common causes of acute gastroenteritis outbreaks, often mislabeled as “stomach flu” — you know that’s saying something.
Cleveland Clinic is a non-profit academic medical center. Advertising on our site helps support our mission. We do not endorse non-Cleveland Clinic products or services. Policy
How can you avoid going through it again? Start with these tips from family medicine physician Matthew Goldman, MD, to clean up after a bout of norovirus.
1. Use bleach and water
You can catch norovirus from contaminated surfaces, and many disinfectants won’t kill it. Alcohol doesn’t kill norovirus. Use bleached water. The CDC recommends a solution that contains anywhere from 5 to 25 tablespoons of household bleach per gallon of water or other disinfectant approved by the Environmental Protection Agency. Stainless steel and similar surfaces need less, while more porous surfaces need more. If you don’t want to mix your own, shop for bleach-based cleaners.
2. Clean safely
Use rubber gloves or disposable latex or vinyl gloves. This will help protect you not only from the bleach but also from the norovirus itself, which can hang around on surfaces for days to weeks. Wear a protective mask for safety — and be sure to air out the room when you finish cleaning.
3. Clean everything you touch
That includes the toilet, the floor, all counters, doorknobs, light switches, telephones, remote controls — you name it. For the best results, let the bleach water or cleaner sit on the surface for at least 5 minutes before wiping it clean with paper towels or other disposable products. In addition, you may want to steam clean upholstered furniture.
4. Separate your laundry
Use gloves to handle soiled sheets, towels and clothes, and keep them separate from other laundry if possible. Wash everything in very hot water. For whites or light clothing you aren’t concerned about lightening, add a little bleach. Wash the items with detergent at the maximum available cycle length, then machine dry them.
5. Wash your hands — then wash them again
Washing your hands is a good practice both during and after any illness, particularly a hearty one like norovirus. Be sure to wash hands thoroughly for at least 20 seconds after cleaning, too, so all your hard work doesn’t go to waste.
Cleveland Clinic is a non-profit academic medical center. Advertising on our site helps support our mission. We do not endorse non-Cleveland Clinic products or services. Policy
These materials are regularly updated based on new scientific findings as the pandemic evolves. Last updated December 2021
Q&A Masks and COVID-19
Q&A Children and Masks
All about masks in the context of COVID-19
Masks should be used as part of a comprehensive strategy of measures to suppress transmission and save lives; the use of a mask alone is not sufficient to provide an adequate level of protection against COVID-19.
If COVID-19 is spreading in your community, stay safe by taking some simple precautions, such as physical distancing, wearing a mask, keeping rooms well ventilated, avoiding crowds, cleaning your hands, and coughing into a bent elbow or tissue. Check local advice where you live and work. Do it all!
Make wearing a mask a normal part of being around other people. The appropriate use, storage and cleaning or disposal of masks are essential to make them as effective as possible.
Here are the basics of how to wear a mask:
- Clean your hands before you put your mask on, as well as before and after you take it off, and after you touch it at any time.
- Make sure it covers both your nose, mouth and chin.
- When you take off a mask, store it in a clean plastic bag, and every day either wash it if it’s a fabric mask, or dispose of a medical mask in a trash bin.
- Don’t use masks with valves.
For specifics on what type of mask to wear and when, see our Q&A and watch our videos. There is also a Q&A focused on masks and children.
Find out more about the science of how COVID-19 infects people, and our bodies react, by watching or reading this interview.
Viruses are intracellular obligate parasites, which means that they cannot replicate or express their genes without the help of a living cell. A single virus particle (virion) is in and of itself essentially inert. It lacks needed components that cells have to reproduce. When a virus infects a cell, it marshals the cell’s ribosomes, enzymes and much of the cellular machinery to replicate. Unlike what we have seen in cellular replication processes such as mitosis and meiosis, viral replication produces many progeny, that when complete, leave the host cell to infect other cells in the organism.
Viral Genetic Material
Viruses may contain double-stranded DNA, double-stranded RNA, single-stranded DNA or single-stranded RNA. The type of genetic material found in a particular virus depends on the nature and function of the specific virus. The exact nature of what happens after a host is infected varies depending on the nature of the virus. The process for double-stranded DNA, single-stranded DNA, double-stranded RNA and single-stranded RNA viral replication will differ. For example, double-stranded DNA viruses typically must enter the host cell’s nucleus before they can replicate. Single-stranded RNA viruses however, replicate mainly in the host cell’s cytoplasm.
Once a virus infects its host and the viral progeny components are produced by the host’s cellular machinery, the assembly of the viral capsid is a non-enzymatic process. It is usually spontaneous. Viruses typically can only infect a limited number of hosts (also known as host range). The “lock and key” mechanism is the most common explanation for this range. Certain proteins on the virus particle must fit certain receptor sites on the particular host’s cell surface.
How Viruses Infect Cells
The basic process of viral infection and virus replication occurs in 6 main steps.
- Adsorption – virus binds to the host cell.
- Penetration – virus injects its genome into host cell.
- Viral Genome Replication – viral genome replicates using the host’s cellular machinery.
- Assembly – viral components and enzymes are produced and begin to assemble.
- Maturation – viral components assemble and viruses fully develop.
- Release – newly produced viruses are expelled from the host cell.
Viruses may infect any type of cell including animal cells, plant cells, and bacterial cells. To view an example of the process of viral infection and virus replication, see Virus Replication: Bacteriophage. You will discover how a bacteriophage, a virus that infects bacteria, replicates after infecting a bacterial cell.
Griffith Parks, associate dean for research at the College of Medicine and director of the Burnett School of Biomedical Sciences outlines how the COVID-19 virus became a pandemic.
By Deborah GERMAN, VICE PRESIDENT FOR HEALTH AFFAIRS AND DEAN OF COLLEGE OF MEDICINE and Griffith Parks, College of Medicine and Burnett School of Biomedical Sciences | August 27, 2020
Viruses have been around for nearly 500 million years. So what happened to make the COVID-19 virus into a pandemic? How did this virus appear out of nowhere and then spread to millions across the globe? For answers, we turn this week to Griffith Parks, associate dean for research at the College of Medicine, director of the Burnett School of Biomedical Sciences, and a nationally recognized virus expert.
You may be surprised to know most of us have caught other versions of the coronavirus — it’s actually one of the types of viruses that can cause the “common cold.” The COVID-19 virus is a unique type within the larger coronavirus family. Humans have never experienced it before, so no one had developed an immunity to it.
Many viruses, in fact, are common in wild animals — no, there’s no evidence you can get COVID-19 virus from your dog or cat. In the wild, these viruses are often less severe — they may sicken or kill some weaker animals but are not a widespread threat to the entire population. Current research evidence suggests that the COVID-19 virus may have originated in bats.
The danger comes when these viruses find a way to spread to humans. They either mutate to become more infectious to humans or we come in very close contact with a wild animal. This can happen as more human development encroaches on wild habitats. That encroachment is one of several reasons why we have seen pandemics increase in the past 15 to 20 years.
This animal-to-human spread is thought to be very rare. But once a virus jumps to people, it can rapidly spread through the population because of our behaviors. Different viruses can spread by different ways — through blood (hepatitis virus), sexual interactions (HIV), eating (norovirus) or through the air. COVID-19 spreads through air droplets we create when we cough, sneeze or speak. We take 12 to 20 breaths a minute while resting and we share each other’s air. That’s the danger of airborne viruses. And we’ve learned that one of the hallmarks of the COVID-19 virus is the ease with which it spreads between people. Now, combine that with today’s mobile society — you can fly from Dublin to Australia in a day – and you see how an airborne virus that begins in one part of the world can spread quickly and easily across the globe. And once it enters a community, an airborne virus spreads because of our social nature — we live in crowded cities and often gather in bars, restaurants, concerts, theme parks and sporting events.
That’s why wearing a face covering and physical distancing are so important in controlling the spread of COVID-19. Viruses exist for one purpose — to infect a person and spread to the next person. And they’re very good at it. Without a vaccine or other therapies, the only way to stop an airborne virus is to change our behaviors that allow it to easily jump from one person to another.
We can also help reduce pandemics through continued scientific research. For example, scientists and physicians have experience with the flu virus – every year, we track flu viruses across the globe and analyze that year’s strain in order to prepare for a possible outbreak of certain strains. That kind of survey research must continue worldwide. We must discover the microbiology of how a virus moves to human populations or changes to become more contagious to humans. Knowledge is power and the first step to prevention.
There is no way to escape viruses. They have been around as long as life itself. But through our actions – our behaviors and scientific outreach — we can better prevent their transmission.