How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev
Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service…

Continue reading →

Information Disaster April 26
In April, the biggest problem of the month related to computers can rightly be considered the epidemic of the Win95.CIH virus - Chernobyl. Everyone is used to the presence of…

Continue reading →

This is the sonorous name of Athlon
Well, AMD is completely out of control. Rolls new processors out of the cornucopia. Most recently, on February 23, AMD announced two new processors: AMD-K6®-III-400 and AMD-K6®-III-450. By the way,…

Continue reading →

maintenance

How to choose additional equipment

An important place in the LAN of the office is occupied by the wiring closet. The cabinet itself does not directly participate in the work of the LAN, but it allows you to protect the active and passive equipment that is installed in it from the playful pens of curious employees, dust, electromagnetic fields, temperature changes and mechanical influences. If you are seriously worried about the security of information stored on the server, and you want to restrict access to it by unauthorized persons, then a server should also be installed in a lockable cabinet of a suitable size. Continue reading

How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev
Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service…

...

Description of the errors detected by TIP.EXE
In the case when the drive is absolutely unable to access any of the four Z-tracks of the cartridge, it gives a message about the failure of the Z-tracks. In…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

SDRAM PC100 Memory Testing Software
You can write your own routine or use ready-made utilities. We recommend using the ctsmb.exe program (System-Management-Bus-Scanner 1.2), which works if there is a South-Bridge PIIX4 on the motherboard (PIIX…

...