?
Solved

Will A Virus Use The Phone?

Posted on 2004-09-29
1
Medium Priority
?
198 Views
Last Modified: 2013-12-04
Hi,
I have two computers, each being hooked up to the internet via the phone and modem.  They are both plugged into a telephone splitter that holds about 5 phones and then into the wall jack.  One of the computers recently became infected with a virus (Win32.KillApp)  I have not ran the other computer at the same time anymore because I do not know if it is possible for the clean computer to become infected with the same virus merely by both being online at the same time.  
Is it possible ?  They are not hooked up together as in 'home networking' just on the same splitter that goes into the wall jack for the phone.
Thank you for any info!!
0
Comment
Question by:Twylyght779
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 29

Accepted Solution

by:
blue_zee earned 200 total points
ID: 12198100

Just being online is the risk.

Anyway Win32.KillApp is an AV killer, but it's quite simple to cleanup:

Stop this process:

trojan.win32.killapp.c.exe

And delete the file, in Safe Mode if necessary.

Zee


0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 11 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question