Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

Continue reading →

Gentlemen's set for office local area network
The composition of the computer equipment used in the office is traditional and is determined by the typical tasks facing employees. Modern business requires the automation of accounting and warehouse…

Continue reading →

Zip Technologies: Pros and Cons
Since the creation of the FDD 3.5 "1.44 MB high-density, a lot of time has passed and this type of media has not undergone any changes during this period, while…

Continue reading →

databases

How to recover information

Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example, accidentally formatting a disk. If the FAT file allocation table is intact, then you can easily find the first cluster that belongs to the file. However, the remaining clusters may lie anywhere on the disk. To restore a file, it is necessary not only to find all the clusters belonging to the file, but also to correctly determine the order of their sequence. Continue reading

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

...

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

...

Novell High Availability Server™ (NHAS)
NHAS allows you to use Intel architecture equipment as part of two servers and a shared disk array connected to them. By pairing two independent servers in an Active /…

...

Operating system role
The operating system is the ultimate authority in resolving hardware problems associated with the change of centuries. It is the operating system in most cases that tells applications the current…

...