Computer viruses: Another cause of the significant threat posed by the loss of data information, a computer virus. This is the synthesis of self-replicating computer programs that spread to infect documents and files. Since then, worms and viruses has increased the number is, in recent years, this account of the loss of data about 7 percent. The three main types of virus is responsible for the maximum amount of data loss is: boot-sector viruses / BUTOBUROKKUUIRUSU to / boot virus: This is the type of computer virus infection in the first few sectors Or the first hard disk or floppy disk, which allows the virus activated diskette drive or boots. What BUTOSEKUTAUIRUSU function? Computer systems to infect the boot sector virus code itself is one of the hard disk and partition tables, boot sector of the floppy disk copy. The system is when you boot from the hard disk or diskette, the virus has its own code to run and install the system memory. The spread of the virus is the boot disk, the system memory to read. These viruses are all the other most common viruses. Stone is an example of a virus boot viruses, Michelangelo, disk killer, form, the drug addict viruses, and Ohio virus. SYMPTOMS? Boot-sector viruses on several issues related to the cause of the boot or data acquisition. If the entire partition is removed from the data or the computer suddenly becomes unstable. Fails, the start-up or hard drive to find the common problems that can be realized when the virus attacks the system. You may receive during startup error message & quot; he said, bad or missing command interpreter. Enter the name of the command interpreter. " how to spread? Sometimes, the system boots or attempting to boot, BUTOSEKUTAUIRUSU the computer system to spread the infection from a floppy disk. All of the discs, except bootable, even if the virus which causes memory to transfer the case to the drive, the system starts. The virus can spread across networks. If so, download files and e-mail attachments and open. Instructions on your system and data in order to maintain safe from virus attacks, some of the following tips will help prove that. Make sure to install the antivirus software on your computer. Anti-virus program running the following features on your system in order to maintain a safe from virus attacks. Scan for viruses on the disk, and if found, please delete. file virus / virus program: This virus infects executable program file to add their own executable code. When you run an infected file, the virus is more executable file attached itself to. This file is infected with the virus of this type is the kind of extension. co.jp,. exe,. (Device driver). Overlay (. Ovl) files and the dynamic link (DLL) file is a virus-infected files that are designed for a specific program. These are non-executable file is an executable file called. The virus is active in memory when the infected file is executed. As a result, infection with their own copy of the file to disk. Sunday, Cascades, Nemesis, Enigma, and ROKIUIRUSU is an example of this type of virus. polymorphic virus: polymorphic virus code to change the anti-virus scanners can detect. Therefore, this virus is a variety of tactics to generate copies. Polymorphic virus code is encrypted in such a different way that appears differently in each infection. Involuntary example, the virus is polymorphic, Phoenix, stimulates the evil viruses 101, proud of the cascade. Virus symptoms: Do note that if you change your computer to occur, there might be a possibility then your system is infected by the virus: when you open or You Hashi Load the program as it takes forever. Or your hard drive or floppy disk, no logical reason for the sudden access to, or strange to receive a message saying, " type Happy birthday girls & quot; or & quot; driver memory errors & quot; appears on the screen. Or a program that is running to hang on the computer, or may not take any action. Or your computer or unexpected characters and bizarre behavior shows, such as rubber ball falling on the screen. If, however, your data files and retrieve the undamaged give up, you can still recover. It is corrupt, all of the infected data. These data recovery and data recovery needs to contact companies, engineers, these places you in the recovery process. If you want to recover all the files and then select a specific DETARIKABARISOFUTOUEA and you can by your operating system. However, if you have a specific issue, such as certain words and files, Excel, e-mail then, various options can be provided by these companies recover. The star also has limited information system, ISO 9001-2000 certification company, which specializes in data recovery and data protection software, services and solutions. Star also has a complete solution to recover data and Windows software programs to restore the lost data (Windows 95, 98, I, NT& 39;s, 2000, 2003, XP only), Apple Macintosh, Novell The Linux, UNIX operating system and fat, NTFS is the case, ntfs5, HFS partition is, HFS + is not, nwfs, jfs, ext2 and ext3 file system.
Bookmark it:
Tuesday, April 29, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment