CONTACT US FOR
Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.
Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413
Entertainment...............( मनोरन्जन )



Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV
News ....
eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English
Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)
FM Radios




View Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहोस (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)

Here is some links to sign in..
Sunday, August 9, 2009
Learn More About Viruses
• Attaches itself to the boot sector of a floppy disk or an executable file
• Copies all or part of itself onto the boot sector of your hard drive when you turn on your computer or try to run an executable file
• Can get one from an infected disk or the Internet
File-Infecting Virus
• Attach themselves to executable files associated with other programs
• Mostly attach to .EXE or .COM files but can infect .SYS, .DLL, and .BIN files
• When you open a program that contains a virus, the virus loads into your computer’s memory and then infects any other executed program.
Macro Virus
• Affect the Microsoft Word and Excel templates
• Once infected, every document or spreadsheet opened with the program becomes corrupted.
• Widespread
Polymorphic Virus
• Can infect the boot sector, files, or both
• Can modify their appearance and signature
• Use code alteration and encryption so that they can not be detected by anti-virus search screens
Stealth Viruses
• Infects a file by adding bytes to the infected file, and then subtracting the same number of bytes to from the directory entry of that file, so that it appears that nothing is different
• Stay in memory
Multipartite Virus
• Can infect the boot sector and executable files
• Combine characteristics of memory-resident and nonresident files, and boot sector viruses incorporating stealth and polymorphic characteristics.
Meta Virus
• The first viruses known to infect data files and work on multiple platforms
• Normally carried in data files for Microsoft Word and AmiPro documents
Other Destructive Programs
Worms
• Often mistaken for a virus
• A single destructive program on a single system
• Often planted by someone with direct access to the system
• Do not replicate themselves
Trojan Horses
• Appears to be a program
• Waits for an user to execute it
• Can infect other files on the system, or other computers on the network
Logic Bombs
• Similar to a Trojan Horse but it has a timing device that is keyed to go off on a certain day or time
• Can do damage anywhere from destroying data on the hard drive to releasing a virus
Computer Viruses
Dear, Sir/Madam
Do you familiar with "Computer Viruses" if not please read below:
A virus is a software program designed to infect, destroy or interfere with a computer or software program. A Virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. This computer program can copy itself and infect a computer without the permission or knowledge of the owner. It can be transmitted between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., generally without the knowledge or consent of the recipient. It's a very dangerous computer program with the characteristic feature of being able to generate copies of it (self), and thereby spreading. Additionally most computer viruses have a destructive payload that is activated under certain conditions. A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose. This is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents.
A virus can infect other programs by modifying them to include a possibly evolved copy of itself. Programming code created as a prank or as a malicious action that secretly affects other programs and causes unwanted consequences. It can damage system's settings and memory, so it is possible for virus to generate run time error messages as well.
If your computer is already running a virus protection program make sure it has latest updated patch or ".dat" file.
According to my experience a truth is that a true virus cannot spread to another computer without human assistance. So you have to be careful yourself while working at computer/Laptops.
If you are suffering from computer viruses please feel easy to contact me.
FANS OF LUS@N COMPUTER
Network Topologies
· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.
As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.
· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.
ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.
DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.
· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.
· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.
· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones
No comments:
Post a Comment