Archive Page 48

Protect Your Computer from Latest Virus

by Nowshade Kabir

A deadly new virus under the name of W32/Nyxem-D which spreads via email attached file is set to strike on the 3rd day of every month half an hour after the infected computer boots up.

The damage caused by this virus could be extensive. If unsuspecting user opens the infected attached file it gets into the system and start delivering itself to all the available email addresses residing in the infected computer.

Once activated it overwrites all DOC, XLS, MDB, MDE, PPT, PPS, ZIP, RAR, PDF, PSD and DMP files by replacing their contents with the data string: DATA Error [47 0F 94 93 F4 K5].

This can create a big mess, as all integrated to the computer drives will suffer. This means your flash cards, network drives, external drives or any drive which gets identified by an alphabet. This virus is also known as “CME-24,” “BlackWorm,” “Mywife.E” and “Kama Sutra” and seems even capable of disabling out-of-date antivirus software.

Over 300 thousand computers are believed to be infected by this worm mainly in India, Peru, Turkey and Italy, where people are less prone to safeguard their computers with up-to-date antivirus programs. What should you do to protect your computer from this and other malware?
Continue reading ‘Protect Your Computer from Latest Virus’

Here's A Few More Related Posts:
  1. Removing Viruses From Your Computer
  2. Removing Viruses From Your Computer
  3. How to verify that your virus scanning software is working
  4. Computer Viruses - the basics

Protection from PC Intruders

by James Hayes

Years have passed since the age of innocence in the computing world. Nowadays, there exists an increasing variety of malicious software programs as well as e-mail messages carrying them. Most of these programs can either be classified as viruses, worms, spyware and trojans. Amazingly, one of the victims of such programs was Ed Gibson, Head of Security for Microsoft UK, whose PC was infected by a dialer and started transmitting such programs to other unsuspecting victims.

Before we start, however, here are some quick definitions:
Continue reading ‘Protection from PC Intruders’

Here's A Few More Related Posts:
  1. Free Firewall Software Guide
  2. How to verify that your virus scanning software is working
  3. 10 Things To Do For A Healthy & Secure PC
  4. Consequences of data loss and Why should Offsite Backup be used

Using Wireless to Share Your Files and Folders

by Lee Asher

Of course, once your computers are networked together and sharing Internet access, the next step is to make your internal network a little more useful. One of the best things you can do with your wireless network is use it to share your files and folders.

File sharing implies a system in which users write to as well as read files or in which users are allotted some amount of space for personal files on a common computer, giving access to other computers as they see fit. The latter kind of file sharing is common in schools and universities.
Continue reading ‘Using Wireless to Share Your Files and Folders’

Here's A Few More Related Posts:
  1. 5 Easy Steps To Sharing Files and Folders On Your Network
  2. Home Networking
  3. How to set up user accounts on Windows 2000
  4. How your network is like a 3-layer cake