is it possible for a virus to anchor themselves on Android OS when not rooted?

Hi im fairly new here is possible for a virus to anchor Tablet not rooted after it has downloaded remotely the extra files that needed to infect the system, im just wondering because ive found and removed the virus before on my front A1 - 810 tablet, and sometimes I had to factory reset the device to remove the system my tab is not docked, so it's easier for me to restore, I wondered?

Recommend try you Avast from the game store, it's free and scans that you download anything, with good AV virus must be stopped to the download point. Also recommend to download Malwarebytes and scan your system.

Tags: Acer Tablets

Similar Questions

  • Is there a possibility of the virus being transferred as well for moving files on an external hard drive?

    Original title: Virus/malware/spyware portable with external hard drive?

    I run Windows 7 64 bit. My subscription to Norton ran a while back (I know, dumb move) and I want to use MSE instead of pay crazy to renew Norton.  Right now, I'm waiting for Microsoft to difficulty MSE Windows 7 64 bit (there is a problem of file corruption with MSE for 64-bit Windows 7 version that Microsoft is working on fixing)... In the meantime, I suspect strongly I have some viruses and spyware on my laptop and wanted to try a system reset. If I back up my files to an external hard drive will be I might transfer of virus/malware to my computer when I put files on my laptop?

    Hi Cbx_ladyarabica

    Please contact the Microsoft Community.

    I like to show you a point for Microsoft Security Essentials. Want to know if there is a possibility of virus being transferred on the external hard drive and back, as well as files. It's pretty simple and I'm here to help you. Thank you for taking the time to read this far.

    It is a possibility that the virus may be transferred along with the files provided that they are infected, as well. To be on the safe side, I'd like you try to run a full scan on the computer by using various third-party programs (such as suggested by Andre) to ensure that the computer is virus-free.

    NOTE: The use of third-party software, including hardware drivers can cause serious problems that may prevent your computer from starting properly. Microsoft cannot guarantee that problems resulting from the use of third-party software can be solved. Software using third party is at your own risk.

    Back to us for any issues related to Windows in the future. We will be happy to help you.

  • I use a wireless modem to get on the internet at Virgin Mobile Broadband2Go device. Is it possible for some to get access to my PC, when this device is active?

    I have these multiple .exe running on my registry? security of wireless modem?

    I have 2 questions:

    1. I use a wireless modem to get on the internet at Virgin Mobile Broadband2Go device. Is it possible for some to get access to my PC, when this device is active?

    2. I think that someone is due to ghosting my PC. On my registry, I have 2 of the following: iexplore.exe attributed to administrator. Then I have an explorer.exe attributed to administrator. I have 6 svchost.exe running 2 assigned the Local, 2 assigned to network service and 2 running service attributed to the system. Can anyone provide an answer why I have these multiples, exe running on my registry?

    Thank you very much

    GreenGiant

    Hello
     
    Yes, it is possible to gain access to your computer; but not without your permission. The firewall on the computer prevents any unauthorized entry. Refer to the following articles.
     
    What is a firewall?
     
    Windows Firewall
     
    How will I know if a wireless network is secure?
     
    When you say "Record" do you mean "Services" in the Windows Task Manager. Its common to have these processes or services to run in the background.
    'iexplore.exe' means 'Internet Explorer'.
    'explorer.exe' means 'Windows Explorer'.
     
    What is svchost.exe?
     
    You can scan your computer with MSE to check the virus or malware if it affects your performance.
     

    The Microsoft Security Scanner is a downloadable security tool for free which allows analysis at the application and helps remove viruses, spyware and other malware. It works with your current antivirus software.

    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Note: The Microsoft Safety Scanner ends 10 days after being downloaded. To restart a scan with the latest definitions of anti-malware, download and run the Microsoft Safety Scanner again.

    Note: The data files that are infected must be cleaned only by removing the file completely, which means that there is a risk of data loss.

     

    Hope this information is useful.

  • Screening for the Virus VMware environment?

    Hello fellow VMware users.

    I decided to set up an environment of virtual-screening machine of the virus.

    I wanted to ask if anyone had

    knowledge on how to prevent the host - interaction of the virtual machine. I'm going to

    most likely use a network bridge connection to my own computer and I

    you want to secure any possibility that a virus can infiltrate my host

    computer (such as a worm or something) or the network on which I am running (there are other computers in the same network in my house), if there is no chance

    This could happen. I'm just wanting to know if there is something that

    I can do to ensure the security of my computer (s) before going to follow and put

    This crazy idea?

    Thanks in advance.

    Other info: don't know if this is important: running an XP Home Edition SP3 - processor Pentium 4-3, 00 GHz - 1 GB RAM

    Under VMware Workstation version 6.5.3 of XP Home Edition

    I would try using NAT, which essentially lets you share the IP address of the workstation host and you can communicate with other systems and the Internet.  I have no advice for you on 'subjects' If you are referring to where you are going to get viruses for the test. The only one I know of we is the well-known Eicar test virus.  You can find it here: http://www.eicar.org/anti_virus_test_file.htm.

    I still think that the safest way to do this is to disable the NIC in total.  You can always transfer files to the virtual machine via shared folders option in the VMware tools and ensure the safety of your host system.  You can transfer new definitions of virus, infected files, and ensure the safety of your host system while having your completely isolated test bench.

    If you end up using this to create a new virus and causing pain for IT administrators around the world, do me a favor and forget I gave him advice.

  • I need to scan my macbook pro for the virus. any medium online Apple?

    I need to scan my macbook pro for the virus. any medium online Apple?

    Viruses are made for Windows computers.  Macs are less vulnerable to viruses. Why do you think your Mac virus?

    http://www.reedcorner.NET/MMG/

    http://www.thexlab.com/FAQs/malspyware.html

    Mac quarantine folder: about the alert "do you want to open it? (file quarantine / known malicious code detection) in OS X - Apple support

  • Is possible for Apple to sell MBP 13 of 2012 with lower cover of 2010?

    Hello!

    I have two Macbook Pro 13.3 A1278 2012 (according to the motherboard) with lower cover of 2010? State of the seller so that buy on Apple store in 2012.

    Is it possible?

    Kind regards

    Jack

    Is possible for Apple to sell MBP 13 of 2012 with lower cover of 2010?

    N ° the lower Panel has been replaced.

    You can check the serial number of CPU by the terminal in your Applications/Utilities/Terminal.app

    copy and paste:

    system_profiler SPHardwareDataType | AWK ' {print $NF} /Serial/ | Open f

    After you enter, the output appears on your Clipboard.  This should be the same serial number that you see on

     > about this Mac

  • My camera iPhone 5s is accessed remotely? Whenever I use my phone torch ends up taking videos. Is it possible for a person to access my camera through the torch. We share the same Apple ID

    My camera iPhone 5s is accessed remotely? Whenever I use my phone torch ends up taking videos. Is it possible for a person to access my camera through the torch. We share the same Apple ID

    N °

    but maybe you tap the camera icon (bottom-right) when you press the icon of the torch (with the other hand maybe?)

  • Is it possible for two people to have separated on an iMac iTunes libraries?

    My dau. has a new iMac, and she has his iTunes library works in the way that she prefers.

    Is it possible for his partner to have a library separate iTunes he can use when it connects to and sync with the iPad?

    Yes. There are two ways to do this.

    1. did you separate user accounts - then all their data is separated and they can account for a long time no matter what either is appropriate

    2. have the same account but what iTunes libraries. You can have as many as you like: hold the option (or alt) key key and launch iTunes. From the menu that appears, select "Create Library" or "Choose Library" as the case may be.

    Finally, they could use the same library, simply not synchronize all this only to synchronize the items selected - playlists/albums etc.

  • A PC can operate effectively WITHOUT the need for anti-virus software?

    Come to think if the first PC I've had and the worms Blaster threatened everyone...

    I do not just shoot when to install my anti-virus software, I need to close my Windows Firewall... 2 + 2 = and Yes, when I did I got the virus of shit...

    If only I had not installed the Norton... do you not think that any PC can operate without the need for anti-virus software knowing that you must close

    the Windows firewall and use theres rather...?

    I wonder!

    Hello

    It would be unwise to try to start without antivirus/antispyware are has just too many real threats and
    methods for malware to attack the system. If you attempt to do if of course you have redundant and
    current backups.

    Here's what I use and recommend: (these are all free and very effective versions.)

    Avast and Prevx proved extremely reliable and compatible with all I have
    launched on them. Microsoft Security Essentials and Prevx have also proven to be very
    reliable and compatible. Use MSE or Avast and Prevx, Prevx 3 but not all.

    Avast Home free - stop any shields is not necessary except leave the file system, Web,.
    Operational network (Script and behavior are also recommended in Ver 6 +).

    Prevx - Home - free

    Windows Firewall

    Windows Defender (is not necessary if you use MSE)

    Protected IE - mode

    IE 8 - SmartScreen filter WE (IE 7 phishing filter)

    I also IE always start with asset if filter InPrivate IE 8.
    (It may temporarily turn off with the little icon to the left of the + bottom
    right of IE)

    Two versions of Avast are available 6.x and 4.8 x

    Avast - home - free - 6.x stop shields you do not use (except files, Web, network, &)
    Shields of behavior) - double click on the icon in the Notification area - real time Orange - click on the
    Shield that you want to stop - STOP. To stop the Orange icon to show an error indicator-
    Click on the Orange icon - top right - settings - click on the status bar - uncheck shields you
    disabled - click OK
    http://www.avast.com/free-antivirus-download

    Avast 4.8 x - home - free - stop shields, you don't need except leaving Standard, Web,.
    and the network running. (Double-click the blue icon - look OK. - upper left - Shields details
    Finish those you don't use).
    http://www.avast.com/free-antivirus-download#TAB4

    Or use Microsoft Security Essentials - free
    http://www.Microsoft.com/Security_Essentials/

    Prevx works well alongside MSE or Avast

    Prevx - home - free small, fast, exceptional protection CLOUD, working with other security
    programs. It is a single scanner, VERY EFFICIENT, if it finds something come back here
    or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Also get Malwarebytes - free - use as scanner only. If you ever think malware and that
    would be unusual with Avast and occasional Prevx running with the exception of a low level cookie
    (not much), to UPDATE and then run it as a scanner. I have a lot of scanners and they
    never find anything of note that I started to use this configuration.
    http://www.Malwarebytes.org/products/malwarebytes_free

    I hope this helps and happy holidays!

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • The upgrade computer laptop RAM 16 GB. Is it possible for my laptop?

    Hi everyone, before forward us here are the details of my laptop,

    HP dv6 3264-ca

    AMD Triple-core 2.1 GHz processor

    6 GB OF RAM

    128 MB of video memory

    I would like to know if I install Windows 7 Ultimate on my laptop, it is finally possible to upgrade my RAM 16 GB.

    I ran a check for my motherboard through CPU - z:

    Manufacturer: Hewlett-Packard

    Model: 143F

    Chipset: AMD 785GX

    Southbridge: SB800

    Then Yes. Is it possible for my laptop manage anything more than 8 GB or the 16 GB?

    Thank you!

    The maximum memory capacity is 8 GB. The question that you will encounter when you try to install 8 GB memory modules is that is that there is no support current BIOS for this capacity modules.

    If HP provides a BIOS updated which are supported by the modules of this ability, then installation of modules memory 8 GB won't be a problem. Until that happens, it will be a financial risk to buy the modules just to see if it will work.

  • My computer has been infected with a virus by asking me to download windows xp for $59 virus software.

    original title: anti-spyware in Microsoft windows xp

    My computer has been infected with a virus by asking me to download windows xp for $59 virus software. Whenever I tried to load the antivirus software, or similar, I saw in the 'my windows task manager process windows' image or start whd.exe process name my software would be closed and a screen could come that had microsoft images etc on this subject. He asked me to sign up or enter my code', that I could download for $59. I managed to fix it myself, but before I did I sent an email to their 'support center' telling them that I was going to find and to make their visit for wasting my time! I put a contactable email address down and got one got a naughty response. Hello sorry, but there is no payments with your email. Please send me your e-mail to registration or transaction ID thank you and have a great day! email address * address email is removed from the privacy * who can I send this on, it was a scam and for someone who has no idea about computers, they would have to pay somethig to someone to fix it. enough of these people, they need to be stopped.

    Its fake. Follow this. It may be similar to the following

  • Is it possible for other people to see my ID is. related to Windows Live?

    Hello

    Is it possible for other people to see my linked ID? So if I have a link * address email is removed from the privacy * and * address email is removed from the privacy *, anyone can see that the two pieces of identification are related? Thank you!
    original title: Hotmail linked ID?

    View all Windows Live and Hotmail questions in the appropriate forum found here:
    http://windowslivehelp.com/

  • "autorun.inf" is reserved for a virus, how to open o eliminate without formatting usb unit

    "autorun.inf" is reserved for a virus (SYSTEM of INFORMATION VOLUMEN), how to open o eliminate without formatting usb unit

    Hello

    1. what exactly happens when you try to open a USB unit?

    2. what anti-virus software do you use?

    I suggest you analyze your computer Microsoft Safety Scanner, it will help us to get rid of viruses, spyware and other malware

    The Microsoft Security Scanner is a downloadable security tool for free which allows analysis at the application and helps remove viruses, spyware and other malware. It works with your current antivirus software.

    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Note: The Microsoft Safety Scanner ends 10 days after being downloaded. To restart a scan with the latest definitions of anti-malware, download and run the Microsoft Safety Scanner again.

    Hope this information is useful.

  • Have Vista but corrupted. Is it possible for me to install Windows 7 after I am reformatting my computer?

    I thought that the monitor of my pc got broke out but when I tried to turn it on, it showed me the splash screen.  I came to realize that the monitor was never dismantled.  However, my laptop used to run Windows Vista, but now it's like trying to run Windows XP and it won't move to the screen.  Is it possible for me to install Windows 7 to upgrade my laptop because the operating system has already been corrupted?

    Hello

    Why do not just reinstall Vista?

    It would be easier and less expensive than buying windows 7

    You must have an operating system running and enabled for upgrade

    System requirements Windows 7

    http://Windows.Microsoft.com/en-us/Windows7/products/system-requirements

    for the installation of windows 7 issues please repost in forum windows 7 installation from the link below

    http://answers.Microsoft.com/en-us/Windows/Forum/Windows_7-windows_install?page=1&tab=all

  • I got a CD with a file that has the extension .mdb. What are my options to open and view this file? Secondly, the recommendation for pc virus protection?

    I have a HP with Windows Vista Premium installed.  I got a CD with a file that has the extension .mdb.   What are my options to open and view this file?    There is a second file on the disk with an extension .ldb.   What kind of file is it?

    Second, the recommendations that you offer for pc virus protection?   My coverage of Trend Micro systems allows access to the Explorer after I disable add ons... while I am limited with respect to the capabilities of the computer.

    Thank you!

    .Mdb and .ldb file extensions are used by the Microsoft Access database program. .mdb is a .ldb file is a lock file. You may be able to consult the data base with Access runtime, downloadable here:

    http://www.Microsoft.com/downloads/en/details.aspx?FamilyId=d9ae78d9-9DC6-4b38-9fa6-2c745a175aed&displaylang=en

    For an antivirus that doesn't interfere too much, try Microsoft Security Essentials:http://www.microsoft.com/security_essentials/?mkt=en-us . Ensure that anti-virus programs are completely removed, with vendors removal tool, preferably before installation.

Maybe you are looking for

  • Apple Care

    Should I bring my MacBook to the Apple Store if I want to buy apple care? Should I just my serial number? GIMMIE the details please.

  • iCloud &amp; Apple ID Questions

    Hi, all the Apple users. I have enjoyed using iPhone 6 and MacBook Air. I realized that all the pictures automatically download and save to iCloud. I connect iCloud.com using my code from Apple. However, what happens if I stop using iPhone 6 and MacB

  • cannot clear location bar removal does work that temporarily changes in privacy setting have no effect either

    I tried to delete by deleting address bar but elements reappear when I hit the arrow down once again. Change the location of the privacy bar setting nothing affects not the bottom of the fall, they are still there, history of compensation does not re

  • Connection network WRT54G &amp; iPad

    I was able to connect to my router linksys the first time I've tried... When I turned off the iPad & retried to enter the network, I was unable to do so... I have the encrypted network... I did the reset thing, off the iPad & restarted nothing not he

  • Why won't my num lock unlock?

    My numeric keypad on the right side of the keyboard does not work little matter how I press the lock NUM. Windows 7 button. Also, why do I have to enter a password every time I start the computer? It's just me!