Posts

Showing posts from June, 2018

How to Remove Computer Virus Using Command Prompt (CMD)...???

How to Remove Computer Virus Using Command Prompt (CMD)...??? Computer Virus Each file and folder have the following attributes: 1).  Archive A 2).  Read Only R 3).  Hidden H 4).  System S -(minus) sign before an attribute it means removing attributes and +(plus) sign mean giving attributes to the file or folder. example ) attrib -r -a -s -h file.txt  this will remove all attributes from file.txt  and attrib +r +a +s +h file.txt  will give all attributes to file.txt . If pen drive or other hard drive is infected by virus ,Command prompt is the best option.Follow the steps given below. 1).  Go to the command prompt by start>all programs>accessories>command prompt or press windows key+r and enter cmd . 2).  Go to the drive where you want to delete virus example write d: to go to D drive . 3).  Type “attrib -r -s -h *.* /s /d” without quotations  and press enter . 4)press dir /a . 5).  Delete all ...

Different Types of Malware and How They Work

Different Types of Malware and How They Work Malware is a collective term used to represent virus, worms, spyware and other malicious programs out there on the Internet. In simple words, any software program that is intended to cause direct or indirect harm to the computer system is referred to as a malware. Some malware programs cause serious problems such as destroying the system files, causing disruption to the computer operation or gathering sensitive information while others may only have a light impact such as redirecting websites to pornographic content or annoying the users with pop-ups and banners. In the normal routine, we have often seen every malicious program being referred to as a virus, but this is not correct! In fact, as mentioned earlier, there exists several malicious programs where virus is one among them. Now, many of you may be wondering to know what’s the difference between them. Well, this article gives a detailed information on different types of malware...

How to secure wi-fi network?

wireless networking (wi-fi) has made easy to use internet from on your computers, smartphones, and other devices. With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they near to your router. This action is also known as piggybacking. > Piggybacking is bad for mainly three reasons : It will increase your monthly Internet bill. It will decrease your Internet access speed. It can create a security hazard as others may hack your computers and access your personal files through your own wireless network. What do the bad guys use by this action? A. There  have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. wireshark is  a free packet s...