CONTACT US FOR

Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.

Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413

Entertainment...............( मनोरन्जन )

TV Channels...

Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV

News ....

eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English


Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)



FM Radios

Kantipur FM, Radio Salaam Namaste, Dallas, Texas,USA, BBC Nepali Sewa, CRI Nepali Sewa,Gurkha Radio, Hits FM, KATH 97.9, Machhapuchhre FM, Matri FM, Nepal Fm, Radio Dovan, Radio Nepal,Radio Sagarmatha, Ujyaalo 90 Network

View Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहो (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)

Dictionary

Sunday, August 9, 2009

Learn More About Viruses

Boot Sector Virus
• Attaches itself to the boot sector of a floppy disk or an executable file
• Copies all or part of itself onto the boot sector of your hard drive when you turn on your computer or try to run an executable file
• Can get one from an infected disk or the Internet

File-Infecting Virus
• Attach themselves to executable files associated with other programs
• Mostly attach to .EXE or .COM files but can infect .SYS, .DLL, and .BIN files
• When you open a program that contains a virus, the virus loads into your computer’s memory and then infects any other executed program.

Macro Virus
• Affect the Microsoft Word and Excel templates
• Once infected, every document or spreadsheet opened with the program becomes corrupted.
• Widespread

Polymorphic Virus
• Can infect the boot sector, files, or both
• Can modify their appearance and signature
• Use code alteration and encryption so that they can not be detected by anti-virus search screens

Stealth Viruses
• Infects a file by adding bytes to the infected file, and then subtracting the same number of bytes to from the directory entry of that file, so that it appears that nothing is different
• Stay in memory

Multipartite Virus
• Can infect the boot sector and executable files
• Combine characteristics of memory-resident and nonresident files, and boot sector viruses incorporating stealth and polymorphic characteristics.

Meta Virus
• The first viruses known to infect data files and work on multiple platforms
• Normally carried in data files for Microsoft Word and AmiPro documents
Other Destructive Programs

Worms
• Often mistaken for a virus
• A single destructive program on a single system
• Often planted by someone with direct access to the system
• Do not replicate themselves

Trojan Horses
• Appears to be a program
• Waits for an user to execute it
• Can infect other files on the system, or other computers on the network

Logic Bombs
• Similar to a Trojan Horse but it has a timing device that is keyed to go off on a certain day or time
• Can do damage anywhere from destroying data on the hard drive to releasing a virus

Computer Viruses

Dear, Sir/Madam

Do you familiar with "Computer Viruses" if not please read below:

A virus is a software program designed to infect, destroy or interfere with a computer or software program. A Virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. This computer program can copy itself and infect a computer without the permission or knowledge of the owner. It can be transmitted between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., generally without the knowledge or consent of the recipient. It's a very dangerous computer program with the characteristic feature of being able to generate copies of it (self), and thereby spreading. Additionally most computer viruses have a destructive payload that is activated under certain conditions. A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose. This is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents.

A virus can infect other programs by modifying them to include a possibly evolved copy of itself. Programming code created as a prank or as a malicious action that secretly affects other programs and causes unwanted consequences. It can damage system's settings and memory, so it is possible for virus to generate run time error messages as well.

If your computer is already running a virus protection program make sure it has latest updated patch or ".dat" file.


According to my experience a truth is that a true virus cannot spread to another computer without human assistance. So you have to be careful yourself while working at computer/Laptops.

If you are suffering from computer viruses please feel easy to contact me.

No comments:

Post a Comment

FANS OF LUS@N COMPUTER

Network Topologies

· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.


As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES
: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.

· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.


ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.

DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.

· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.

· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.

· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.

· Wireless - As the name implies, wireless networks allow computers to comunicate without the use of cables. IEEE 802.11b defines two pieces of equipment, a wireless station, which is usually a PC or a Laptop with a wireless network interface card (NIC), and an Access Point (AP),which acts as a bridge between the wireless stations and Distribution System (DS) or wired networks. An 802.11b wireless network adapter can operate in two modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a wireless ‘access point’. In Ad-hoc mode your computers talk directly to each other and do not need an access point at all. 802.11b delivers data throughput of 11 Mbps.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones