473,320 Members | 1,817 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,320 software developers and data experts.

Worms and Viruses

114 100+
Hi.
My brother is an expert at C & C++
He is always making small annoying programs similar to Worms and Viruses.
I have learnt VB and some C.
Anyone got any ideas as to how I can stop him short of pulling him off the PC?
Jul 16 '07 #1
5 1366
Hi.
My brother is an expert at C & C++
He is always making small annoying programs similar to Worms and Viruses.
I have learnt VB and some C.
Anyone got any ideas as to how I can stop him short of pulling him off the PC?
A low-level solution could be to ask him to stop.
A hardware solution could be to cut the wire of his keyboard.
A software solution could be to use his own programs against him, to inhibit him.

The point being made is that your question needs to be more detailed.
Jul 16 '07 #2
sicarie
4,677 Expert Mod 4TB
Lock down your computer (Google search of a few guides that might help), create a limited account for him (another Google search), and take karate (I'll let you search for that on your own) so you can deter him from doing that in the future.

If he's determined to be malicious, he probably already has a key stroke logger installed, and probably already knows your password. But don't change it right off, get rid of the keylogger first. http://www.google.com/search?hl=en&s...an&btnG=Search

Also, learn what processes are supposed to be running on a computer so you can pull up the Task Manager (Ctrl+Alt+Del and Task Manager, or right-click on the bar at the bottom of the screen where the open programs usually show up, or use Ctrl+Shift+Esc) and stop any processes that shouldn't be running.

I'm also moving this to the Windows forum (as you said you were learning VB, I'm assuming you are on Windows), where you should be able to get more ideas.
Jul 16 '07 #3
weaknessforcats
9,208 Expert Mod 8TB
Make him aware of the legal penalties of using code like that.
Jul 16 '07 #4
Chrisjc
375 256MB
A low-level solution could be to ask him to stop.
A hardware solution could be to cut the wire of his keyboard.
A software solution could be to use his own programs against him, to inhibit him.
I am not going to lie but I like this answer. Cutting the keyboard and hiding a spare is always a good idea.

haha

No but on a serious note. As stated below making a lower level account for him and cutting off access to his C and C++ programs.. Only allowing access to I.E. or word something for him to only do something of need is one way...

If you need help with setting up restrictions please let us know as we will be happy to point you in the right direction... The only other thing is to talk to him and make sure he doesn’t follow a path of the dark side so to speak.. It is some serious time for all that and I am sure you wouldn’t like to see your bro hung up in the pin for TYPEING....

There are plenty of things he can use that code for good maybe show talk to him about some virus or worms that are not cracked and have him find a fix or a solution for them? Other wise I personally would just make sure he isn’t using it for bad... I mean a lot of grate programmers start of this way… but use it on friends or someone they know as a test so they know there code is working correctly but to use it in public and junk up the internet some more will cost him in time…

For now here is an overview for windows on accounts...

User accounts
Jul 16 '07 #5
Firecore
114 100+
Thanx fr your help guys.
I found a great way to stop him.
I found all sorts of blackmailing goodies in his PC.
I used a keyscanner to get his password and made an app to block him out.
I also used other methods to subdue his processes.
I did not know about the processes b4 u told me.
Thanx

I am freee now.
Thanx
Jul 17 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: antivirus | last post by:
Eine Mail, die von dieser Adresse versendet wurde, enthält möglicherweise einen Virus. Aufgrund der Tatsache, dass viele aktuelle Viren und Mailwürmer bestimmte Dateianhänge verwenden, werden diese...
24
by: Ministry Of Jute | last post by:
I returned home from work today to find an Airborne Express Letter Express mailer leaning up against my apartment door. The return addressee was Microsoft Suite 300 1165 Eastlake Avenue E...
2
by: swathi | last post by:
----------------------------------------------------------------------- A poll associated with this post was created, to vote and see th results, please visit...
6
by: Carlos G Mendioroz | last post by:
Hi, I'm trying to understand why a perfect match index is not being used, and a sequence scan is done in place: PostgreSQL 7.3.4 on i686-pc-cygwin, compiled by GCC gcc (GCC) 3.2 20020927...
0
by: Dennis Gearon | last post by:
This is a blanket email. Many of the people I know are not keeping their systems up to date. You may be not knowledgable about how to do that, or not know that it is necesary to update...
44
by: Julian V. Noble | last post by:
Dear C Mavens, Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane...
2
by: pigeonrandle | last post by:
Hi, I'm quite sure this could start a lot of arguements :p. If i am creating a log file that is constantly added to during the lifetime of my program, is it best to have a permanent Streamwriter...
21
by: virtualadepts | last post by:
I have a theory how viruses work. My theory is you need one computer program to host another computer program, and once the program is hosted, and that program gets executed, it can launch the...
5
by: Salad | last post by:
As far as I'm concerned I support the chopping off of fingers of programmers that put out worms and viruses. I could care less if the programmer was 5 years old...off with the fingers. Anyway,...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
1
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.