Skip to main content

Posts

Showing posts from January, 2018

Wix

How to Recover Files

As a general data recovery guide: if you have deleted files, first use the "Recover Files" option; if you have a corrupt or formatted hard drive, first use the "Recover Drive" option try the "automated" mode first, as it is configured for the best and fastest search on most systems. Running the "Recover Files" search The "Recover Files" options is best used when you hard drive is running correctly, but: individual files have been deleted and emptied from the Windows Recycle Bin; files have been deleted and bypassed the Windows Recycle Bin; files have been deleted by a virus, trojan or worm; a file of the same name has saved over another important file; files have been lost by some other unknown cause. To search for deleted or lost files, click the "Recover Files" button then "Next" to proceed. (NB: If your data loss problem relates to loss of data from the entire drive, select instead try the ...

Windows 10 Installation

he  Windows 10 upgrade  process drags old files, settings, and programs from your previous Windows system to your new one. If you want a completely fresh system, though, you have a couple options. RELATED ARTICLE https://www.howtogeek.com/224342/how-to-clean-install-windows-10/ This is particularly useful if you’ve purchased a new Windows 10 PC and it includes manufacturer-installed bloatware you don’t want. Or, you may need to perform a clean install on a computer without an existing Windows system after installing a new hard drive. Of course, you’ll miss out on the good pre-installed apps, like the free DVD player program that comes with many PCs. However, you can always  install VLC to get DVD playback  or  use one of the more fully featured Windows Media Center alternatives . Previously, Microsoft forced users to upgrade to Windows 10 before they could start fresh and do a clean install–which was annoyingly complicated and time...
A BRIEF COMPUTER HISTORY The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations. Each generation lasted for a certain period of time,and each gave us either a new and improved computer or an improvement to the existing computer. First generation: 1937 – 1946 -  In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the Colossus was built for the military. Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer weighed 30 tons, and had 18,000 vacuum tubes which was...
A    computer   is a device that can be   instructed   to carry out arbitrary sequences of   arithmetic   or   logical   operations automatically. The ability of computers to follow generalized sets of operations, called   programs , enables them to perform an extremely wide range of tasks. Such computers are used as  control systems  for a very wide variety of  industrial  and  consumer devices . This includes simple special purpose devices like  microwave ovens  and  remote controls , factory devices such as  industrial robots  and  computer assisted design , but also in general purpose devices like  personal computers  and  mobile devices  such as  smartphones . The  Internet  is run on computers and it connects millions of other computers. Since ancient times, simple manual devices like the  abacus  aided people in doing calculatio...

Worm

What Are Computer Worms and How Can I Protect Myself From Them? Posted on: November 14, 2012 Posted in: Trend Spotlight Posted by:  Trend Micro By Vic Hargrave Computer worms are a form of malware that have the capability to rapidly infect many computers on a network by sending copies of themselves from one system to another over network connections. The  Melissa worm  in 1999,  Sobig  worms in 2003 and  MyDoom  worm in 2004 all propagated through email in the form of attachments. The emails enticed users to open the attachments, which then installed the worms on the target systems. MyDoom was also able to spread itself though a  peer-to-peer file sharing  program known as KaZaA. Other worms have found their way into networks through network services such as database or web servers. More recently worms have started showing up in social media forums.  Trend Micro’s Malware Labs recently dis...

Worm

A  computer worm  is a standalone  malware   computer program  that replicates itself in order to spread to other computers. [1]  Often, it uses a  computer network  to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming  bandwidth , whereas viruses almost always corrupt or modify files on a targeted computer. Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through. However, as the  Morris worm  and  Mydoom  showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.                                                             ...