How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev
Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service…

Continue reading →

The thickness of the magnetic layer of the disk
Removable magnetic media, manufactured by Iomega for Bernoulli drives, were extremely durable and reliable and cost quite a bit. The special 3-inch disks used in Zip are very similar to…

Continue reading →

Can I recover information myself?
Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users -…

Continue reading →

Information Disaster April 26

In April, the biggest problem of the month related to computers can rightly be considered the epidemic of the Win95.CIH virus – Chernobyl.

Everyone is used to the presence of computer viruses. Periodically they appear on the computer. Sometimes they manage to be detected on time. Sometimes something goes bad, but, as a rule, special tragedies do not occur. Last year, a new, very dangerous Win95.CIH virus was released. The virus appeared, apparently, in Taiwan. Over the past year, it has spread throughout the world, including Ukraine. According to the British magazine Virus Bulletin, this virus is consistently among the ten most common in the world. Moreover, Win95.CIH is the only virus out of these ten that has serious destructive functions built in.

This virus uses a rather interesting infection mechanism, which provides it with high secrecy and a very high ability to “reproduce”. There are practically no computers that have 1 … 2 files infected with this virus. If the computer is infected, then the virus is located in almost all .exe files. In general, the Win95.CIH virus has long been known. A detailed description of it can be found on the sites of antivirus companies (DialogueScience) and computer magazines (Chip). The latest versions of most antivirus programs know and are able to cure this virus. In this regard, the Win95.CIH virus is not something out of the ordinary. Its main differences from other viruses are the very dangerous destruction produced by this virus and the long “hidden period” (when the action of the virus does not manifest itself).

Destruction caused by the virus:

the first 2048 sectors of each hard drive are destroyed, and a random sequence is written in their place;
part of the BIOS contents is destroyed.
The duration of the “hidden period”:

the destructive actions of the “classic” virus (CIH.1003, or CIH v.1.2) appear only on April 26, the day the Chernobyl disaster occurred.

“Clicks of Death" - what is it?
This is such a situation when the drive has lost its ability to read the servo track for proper head positioning. At the same time, the drive does not “see”…

...

The Iron Problem of 2000
The 2000 issue is already becoming a hot topic. Moreover, a little more than 200 days remain before its onset. The point is that, for a number of reasons, in…

...

Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the…

...

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

...