How the intranet works
If you choose the most important thing (at least for small businesses), in order for your network to be called an "intranet", it is necessary that: information exchange between participants…

Continue reading →

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

Continue reading →

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

Continue reading →

dies

How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev

Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service center at 9 a.m. By lunchtime, 28 “hard drives” were waiting in line at the service center, and the new BIOS was flashed like on a factory conveyor. Continue reading

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

But this is not Intel at all!
The ways of AMD and Intel, from our point of view, have long diverged. If earlier it was possible to install at least Intel or at least AMD into the…

...

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

...

Are "stamped" discs really so perfect?
"Stamped" discs (or, if you want, "aluminum") can be made in various ways. The most common is, to be precise, injection molding, rather than stamping. Modern technologies make it possible…

...