Mass Share Against Iomega
On September 10, 1998, in the New Castle County Supreme Court, Delaware, on behalf of all Iomega Zip drive owners, a campaign of dissatisfied consumers began that went beyond national…

Continue reading →

Auto Head Parking
Fall to the surface with a characteristic "crackle". At the same time, they tear off microscopic particles from the surface, consisting of particles of the working layer of the carrier.…

Continue reading →

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

Continue reading →

disks

Using Zip

Iomega recommends using a Zip drive for:

Extends the computer’s memory by 100 MB additionally.
Transferring your files to other computers when it is not possible to transfer them over the network.
Duplication of information from your hard drive.
Opportunities to work at home or on the go.
Designing and conducting multimedia presentations. Continue reading

How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev

Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service center at 9 a.m. By lunchtime, 28 “hard drives” were waiting in line at the service center, and the new BIOS was flashed like on a factory conveyor. Continue reading

Solving an iron problem is very simple
The solution to the 2000 problem related to incorrect BIOS operation is based on the standard and mandatory ability of any computer to check a specific address area when booting…

...

Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

...