Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

Continue reading →

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

Continue reading →

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

Continue reading →

produces

Zip Technologies: Pros and Cons
Since the creation of the FDD 3.5 "1.44 MB high-density, a lot of time has passed and this type of media has not undergone any changes during this period, while…

...

Z-tracks
In devices with a moving coil there are no pre-fixed positions. Instead, they use a special guidance system (positioning), which accurately brings the heads to the desired track. The system…

...

What is worse than the "golden" wheels?
The prerequisites for the fact that the “golden” discs are worse than the “aluminum” ones are laid down in the recording technology itself. Standards for compact discs provide that the…

...

The thickness of the magnetic layer of the disk
Removable magnetic media, manufactured by Iomega for Bernoulli drives, were extremely durable and reliable and cost quite a bit. The special 3-inch disks used in Zip are very similar to…

...