LT   EN   RU  
Sunday 18 April 2021 - Independent and informative portal
Register   Login
News subscribe
Subscribe   Unsubscribe
Visits since 2002 09 12 - 67588785
Pages in 40735
  Computers > Computer technologies
avast! Virus Cleaner
Usage rating

If you have deleted a virus or worm file associated to a vital file type - and now you cannot run your applications anymore, avast! Virus Cleaner may help you as well. All you have to do is run avast! Virus Cleaner "somehow". If, for example, only the association for .EXE files has been corrupted, you may run the avast! Virus Cleaner by renaming it to a .COM file. The other extensions you may try are .SCR, .BAT, .PIF (on...

Computer Virus Help
Usage rating

A computer virus is a program that requires a host in order to make copies of itself on computer disks. Viruses may infect (copy to, and spread from), program files, programs in disk sectors, and files that use macros. The ability to self-replicate distinguishes viruses from programs that do not, and this parasitic nature is neither an accident, nor a computer glitch. All viruses are created by people who know how to write computer programs. The first theories about the possibility of creating a self-replicating program date back to 1949, and experimental viruses were first programmed and tested in the...

 Henri Delger
e-Mail Viruses ("Worms") & Junk ("Spam")
Usage rating

As the Internet has grown in popularity, e-mail has evolved from a convenience enjoyed by a few to a necessity for almost everyone. The vandals who used to write virus programs, which are spread by infected files and disks, have changed their tactics to take advantage of the universality of e-mail. They now write "Worm" programs, and have invented new ways to use e-mail to spread them. An e-mail "Worm" is a stand-alone computer program, similar to a virus, in that it spreads from one computer to another. However, unlike a computer virus, a "Worm" does not need a host (program)...

 Henri Delger
Trojans, Viruses & Worms
Usage rating

AntiCMOS infects the hard disk's Master Boot record, and the Boot Sector of floppy disks. If an infected floppy disk is in the A> drive at boot-up, the virus program in the Boot Sector (Sector 0) will be read into memory. The virus then takes control of the system, and infects the hard disk. AntiCMOS does not infect files, and reserves 1Kb of memory in an infected computer; CHKDSK will report 1Kb less total system memory than normal. It infects floppy disks that are either read or written to, if they are not already infected, or write-protected. When AntiCMOS infects...

 Henri Delger
JPG (JPEG) Viruses
Usage rating

What is a "Proof of Concept" virus, and should you be worried about this one? A "Proof of Concept" virus is one that is written by a person with advanced programming skills, to demonstrate that something new can be accomplished. Most often, they are sent to an anti-virus vendor, as if to say, "So there!" and no others are created, except by amateur vandals who produce and circulate hacked copies. The reality of going from a proof of concept to an everyday concern takes time, and does not always work. Concept (the first Macro virus) was gleefully presented to the...

 Henri Delger
Preventing Virus Problems
Usage rating

Keep a log of what you do to learn which applications are most important to you. Although you can restore them from their installation CDs, that does not mean they'd work the way they do now. So if you have re-configured any, you'd need to find out how and where they store that data, in order to back it up. Make backup copies of files on your hard disk. All hard disk files would be best. Some files may already be backed up (in effect) on original installation disks, but most important are the files you create with your applications....

 Henri Delger
Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
Usage rating

Advisory: Multiple vulnerabilities within PHP 4/5 // Release Date: 2004/12/15 // Application: PHP4

 Stefan Esser
Java bug could hit PC operating systems
Usage rating

The discovery of a serious software bug has simultaneously opened a variety of desktop computers to potential attack. The flaw has been found in Java, which works on a variety of computer operating systems – from Microsoft’s Windows to free software Linux – which means any worm which exploits it could hit a variety of computer platforms. The flaw is rated "highly critical" by the computer security firm Secunia and some experts believe it could lead to the development of a cross-platform computer worm. The bug was discovered in the Java Plugin - a software package that lets small programs...

 Will Knight
Future of operating systems: simplicity
Usage rating

Today's operating systems are conceptually upside-down. They developed the hard way, gradually struggling upwards from the machinery (processors, memory, disks and displays) toward the user. In the future, operating systems and information management tools will grow top-down. Computing power should make life simpler, not weigh you down with fancy features. Computing power should unify your life online, help you pull threads together -- not add more virtual shoe boxes for information to get lost in. I have time for one screen in my life. I need to be able to tune in one single information structure and know that my...

 David Gelernter  Comments Comments: 1
A History of Apple's Operating Systems
Usage rating

Mac OS X is a unique operating system in that it represents a rather successful coming together of paradigms, ideologies, and technologies that have usually resisted each other in the past. It is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X is perhaps one of the best examples of how a capable system can result through the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and even individuals. Apple has been around since 1976, and many accounts...

 Amit Singh