Jump to content
xisto Community

felipevianna

Members
  • Content Count

    26
  • Joined

  • Last visited

About felipevianna

  • Rank
    Newbie [Level 2]
  • Birthday 06/16/1976

Contact Methods

  • Website URL
    http://www.buscaadvogado.com

Profile Information

  • Location
    Brazil
  • Interests
    Law, Computer, Travel
  1. Yesterday night I think that I kill the trojans, worms and virus using the Free McAfee Anti-spyware... interesting is that when I was installing the McAfee a also running other anti trojan and the McAfee told that was a worm in that antitrojan.... Do you understand? I will never kill the trojans and virus....It's interesting and dangerouskill a virus using a infected anti-virus...
  2. I believe that Nokia is the best one because not only about the hardware technology but alse the fact that nokia creates software technology ... languages developed for wap and leaves the laboratories of the nokia.Unhappyly I finished buying one siemens and I am simply hating... I have many problems and I do not see the hour of never more take one siemens.
  3. I prefer the intel, it seems more trustworthy well in the truth I always I used intel and so far I do not have nothing to complain
  4. Perhaps I have download all adwares, antitrojans, antiworms and antivirus of web and still now I can't resolve my problem. Perhaps this Trojan is like a "Stone" that it is hidden of the antiTrojan. Somebody knows some anti-all that run in DOS? Unhappyly I do not know if some solution for my problem exists. already I tried ad-aware person, spybot and many others but unhappyly nothing. I go to try what pentiumas suggested with relation to the ZoneAlarm, Registry Mechanic 5 or 4. I am studying everything of virus, trojans and warms.... this problem is taking off me sleep. JimiHex, already I tried as much Cleaner but I do not remember if I used the "The Cleaner"... I go to look for and to use. I am thankful all And I wait more sugestions.
  5. Probably the anti-Trojan finds differences in the registers and dates proving that a Trojan invaded the virus what it does not mean that cookie is dangerous and as already said, it is only one archive of text, or either, it cannot technical be dangerous.
  6. How spyware explores the information of the user?R. The problem of spyware is similar to the problem of cookies for thefact of both to be considered a privacy invasion, although spyware either different of cookies, technical speaking. Spyware is a program executed in the computer, that it tracks its habits and it personalizes these standards for announcements, etc. As it is a computer program and not only a piece of pure text, inside of one cookie, spyware also can carry through irritating actions to guarantee itsfunctioning and to influence what you see. In addition, being an executable one, it could be modified, on-line for its developers, being able to execute any action that the same it desires to make in a system.
  7. Do some sites use cookies to explore the information of the user?R. That is unhappyly possible yes. Some sites can deceive the users or omit its directive.For example, they can track its habits of navigation in the Web in site different, without that you it knows, and to use these data to personalize the announcements that you see in the sites, etc, what normally privacy invasion is considered - even so some users not they matter with this specific use of one cookie.It is difficult to identify to this and other forms of "bad use of cookies", what it makes it difficult to decide if, when and as to block them in the system. Moreover, the acceptable level of shared information varies between the users, becoming difficult to create a program "anticookie" to take care of tothe necessities of each one.
  8. One cookie is only one piece of text in an archive in the computer, I contend information that identify it for a specific site and any other information that the site desires to keep on the user who the visit.Cookies is legitimate tools, used for many sites to track the information of the visitor. As example, I can have access a store on-line since a computer hardwired in the Internet and place an item in the basket, but to decide not to buy it immediately because desire to compare prices. The store can opt to recording the information on the products placed in my basket in one cookie stored in my computer. This is an example of a good use of cookies to improve the experienceof the user, since he prevents that the user has that to redigitar, or to remake, all the choices and navigations that made previously. The only sites that must recoup the information stored in one cookie are those that had recorded the information in this cookie specific. This must assure its privacy hindering that any another site that it is visiting can read cookies created by that one another site.
  9. There are life after the death? It is a question that the whole world if places. Perhaps not today... but one day, necessarily. Tomorrow perhaps, had to one known, a friend who is in ways of in leaving them.Some say: "Perhaps it has any thing, we will see when we will be there. Why to ask me now?"Others pass the entire life preparing this other worldmeeting, preparing the eternity, such is its importance.But without a doubt all we feel repugnance when thinking about thedeath because we are made for the life. Here it is because it is very useful to clarify what we can know onthe life after the death.It enters the so different answers that in they are proposals, what to believe? In who to believe? The materialists, the "atheists" say: "everything finishes with the death, the world does not have sen?o that continues to turn ".The defenders of the reincarna??o say: "it has some successive lives, until in them we become the Great one All and that we do not breathethe life more (nirvana)".The Jews, the Muslen and the Christians believe that after this life he has aperpetual life of happiness with God. The Christians, in particular, they say that we will revive with our body, as Jesus Christ.
  10. Which is more popular: Cookie or Session...Which offers more security for login?I believe that it is the Session because it is not thus stored in the machine not being able to be had access by others. It is also simpler of being used because we do not need in worrying them about header informationsHowever I am sincere in saying that I use more cookie.... I do not know why! What do you think?
  11. Well, aout the uni.cc... is not this that I'm searching Is the same that cjb.net The brownser (Internet Explorer) will block the login for protection For understand look my site (is in portugues but you will only login) This is only a login and pass for test... early will be deleted http://forums.xisto.com/no_longer_exists/ login: makelogin password: 123456 And you will see that you wont login try http://www.buscaadvogado.com/informajovem/ login: makelogin password: 123456 And you will login well .... About the freedns.afraid.org maybe is this Can you create a webhost here in Xisto and create my own domain myowndomain.afraid.org and set the dns1 and dns2 request by Xisto? Like if is a domain with whois and blah blah blah ? thanks
  12. I am looking for un service of free subdomain names through with DNS use, or either, it would like to know if you know some site that offers "a virtual" domain:MySite.blah.comWith DNS1: and DNS2:I think that with this DNS set like dns1.trap17.com and dns2.trap17.com you will have a "real" domain with the total control.... website, subdomains, e-mails....For example eu.org offers this type of service but I do not know to program it.Anybody here knows how to use it or somebody would have some suggestion here? Sites like cjb.net does not allow that you creates pages with login because the navigator blocks the page for protection against virus and/or trojans..
  13. I formated my computer for the second time.... I tryied scan with a lot of antivirus and.... nothingI installed my programs and I think , NOT, I KNOW, that my BACKUP are contammined.... AND The Trojan AGAIN I need this backup because there are all my files and also work's programs and work's files... Now I download the Ad-aware personal (aaware.exe) and I think that this one found the trojan....He found in a lot of files....If you have other suggestion I'm happy to test downloading and scanning this trojans and warms......Thanks for all friends
  14. no no..... I'm sorryThis cookie is only a example that I take from my computer... I deleted the cookies infected.I used a lot adware and anti-trojan and this programs check the Registers, cookies and programs and found virus into the cookies but I can't understand how is usefull a virus in a cookie;;;
  15. First of all thanks for the link... I will download at home tonightMy windows is the 98 second edition and .... do you know...The windows XP is better but until now I need to use the win98 because my computer is a..... do you know Well...Is it not truth that the computer becames slow if you have a lot fonts installed?I heard to speak and I seem to be truth.... ??????
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.