Archive Page 48
Protect Your Computer from Latest Virus
0 Comments Published February 2nd, 2006 in the following Categories:Anti-Virus Software
by Nowshade Kabir
A deadly new virus under the name of W32/Nyxem-D which spreads via email attached file is set to strike on the 3rd day of every month half an hour after the infected computer boots up.
The damage caused by this virus could be extensive. If unsuspecting user opens the infected attached file it gets into the system and start delivering itself to all the available email addresses residing in the infected computer.
Once activated it overwrites all DOC, XLS, MDB, MDE, PPT, PPS, ZIP, RAR, PDF, PSD and DMP files by replacing their contents with the data string: DATA Error [47 0F 94 93 F4 K5].
This can create a big mess, as all integrated to the computer drives will suffer. This means your flash cards, network drives, external drives or any drive which gets identified by an alphabet. This virus is also known as “CME-24,” “BlackWorm,” “Mywife.E” and “Kama Sutra” and seems even capable of disabling out-of-date antivirus software.
Over 300 thousand computers are believed to be infected by this worm mainly in India, Peru, Turkey and Italy, where people are less prone to safeguard their computers with up-to-date antivirus programs. What should you do to protect your computer from this and other malware?
Continue reading ‘Protect Your Computer from Latest Virus’
- Removing Viruses From Your Computer
- Removing Viruses From Your Computer
- How to verify that your virus scanning software is working
- Computer Viruses - the basics
Protection from PC Intruders
0 Comments Published February 1st, 2006 in the following Categories:Anti-Spyware Software
by James Hayes
Years have passed since the age of innocence in the computing world. Nowadays, there exists an increasing variety of malicious software programs as well as e-mail messages carrying them. Most of these programs can either be classified as viruses, worms, spyware and trojans. Amazingly, one of the victims of such programs was Ed Gibson, Head of Security for Microsoft UK, whose PC was infected by a dialer and started transmitting such programs to other unsuspecting victims.
Before we start, however, here are some quick definitions:
Continue reading ‘Protection from PC Intruders’
- Free Firewall Software Guide
- How to verify that your virus scanning software is working
- 10 Things To Do For A Healthy & Secure PC
- Consequences of data loss and Why should Offsite Backup be used
Using Wireless to Share Your Files and Folders
0 Comments Published January 21st, 2006 in the following Categories:Wireless Networking
by Lee Asher
Of course, once your computers are networked together and sharing Internet access, the next step is to make your internal network a little more useful. One of the best things you can do with your wireless network is use it to share your files and folders.
File sharing implies a system in which users write to as well as read files or in which users are allotted some amount of space for personal files on a common computer, giving access to other computers as they see fit. The latter kind of file sharing is common in schools and universities.
Continue reading ‘Using Wireless to Share Your Files and Folders’
