SDRAM PC100
Until recently, the development of new technologies for manufacturing memory components took place in parallel with the development of chipsets manufactured by Intel. But it so happened that in 1998…

Continue reading →

Novell High Availability Server™ (NHAS)
NHAS allows you to use Intel architecture equipment as part of two servers and a shared disk array connected to them. By pairing two independent servers in an Active /…

Continue reading →

Mass Share Against Iomega
On September 10, 1998, in the New Castle County Supreme Court, Delaware, on behalf of all Iomega Zip drive owners, a campaign of dissatisfied consumers began that went beyond national…

Continue reading →

Viruses are serious, and Win95.CIH is not alone

Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus – “invisible virus”, like the stealth bomber), the destructive action of which is expected on May 23. Or another virus, V.789, the 14th day of every odd month (May, July, etc.) destroys the master boot record of the hard disk and destroys the contents of the CMOS. There are many viruses that erase individual files, destroy FAT, or format a hard disk. For a long time there are viruses whose effects are no less terrible than the effects of the Win95.CIH virus. For example, it is believed that it is impossible to recover information after the defeat of the OneHalf virus (in fact, of course, it is possible to recover, although it is more difficult).

The mass epidemic was caused precisely by the Win95.CIH virus for three reasons:

This virus has an amazing ability to reproduce.
This is a relatively new virus, therefore, many not recent versions of the antivirus tools available to users could not detect it.
The destructive properties of the virus were activated in all users simultaneously.
How is Win95.CIH different from other viruses?
The main difference is that Win95.CIH virus uses some features of the new .exe file format adopted in Windows 95 and Windows NT, the so-called PE (Portable Executable) format. In this format, along with executable code and data, additional information is stored in the file (in particular, about exported and imported functions). The executable code, data, and additional information are all different objects, each of which is located in a separate section of the .exe file. Also added the header of the PE file, which is located in a separate section.

Naturally, in most sections there is free space, which is used by the Win95.CIH virus. The fragment allocation table and part of the code for allocating memory and collecting the entire virus body is located in the section where the PE file header is located (this section has the most free space). The rest of the virus code is distributed in the remaining sections.

It should be noted that on the Internet you can find a detailed description of the new file format, including one specifically addressed to “virus writers”. So in the near future we should expect the appearance of a whole family of viruses like Win95.CIH.

Design Features of the Zip Drive Head Drive
Unlike HDDs, the Zip drive uses a linear drive with a moving coil. There are two types of drive mechanisms for moving coil heads: linear and rotary. These types differ…

...

Using Zip
Iomega recommends using a Zip drive for: Extends the computer's memory by 100 MB additionally. Transferring your files to other computers when it is not possible to transfer them over…

...

IDE Interface Features
The main requirement of the recording device to the interface is the ability to continuously transmit data to it during the recording process. Requirements for the speed of receipt of…

...

The Iron Solution to the 2000 Iron Problem
Before the onset of 2000, about three more months. But the situation was noticeably heated. It is understandable. If even a small fraction of what is written in the press…

...