HTTP
HTTP (hypertext transfer protocol) is an Internet protocol used by the world wide web. This protocol is able to transfer data in the form of images, text, sound and even videos
HTTP (hypertext transfer protocol) is an Internet protocol used by the world wide web. This protocol is able to transfer data in the form of images, text, sound and even videos
Category in IT » 0 comments »
GIF or Graphics Interchange Format file format is a data store is an image. Gif is the first time developed by CompuServe
Category in IT » 0 comments »
Abbreviation of Uninnterruptable Power System, the device is a back-up power for the network share so that the computer can continue to work even though portion of PLN power off
Category in IT » 0 comments »
The installation is done after the installation is done when the first kali.Reinstall software or programs that are installed will no longer run properly. Before the installation need to unistall the software first
Category in IT » 0 comments »
Unique number that is used for identification. Many computers come with the software serial number, which is often also called a CD Key. Users certainly ask the installer to enter a valid serial number to continue the installation process stages. Serial number is created by using a specific algorithm
Category in IT » 0 comments »
Modem modulator or demodulator is a tool to change the analog signal to digital signal
Category in IT » 0 comments »
Some time ago, friends kosan I direpotkan with computer viruses that have them, because they mean that the virus makes the display visible semeraut explore. After I noticed that the virus-making duplicate duplicate folders in the form shotcut and create your own shortcut in the form of a folder shortcut potter.ink and harry Microsoft.ink.
virus not classified as dangerous virus which only make duplicates-duplicates folder without changing the file or remove the existing computer. However, the virus is still only making computer users feel disturbed because of duplicate duplicate-folder that he created.
for your current computer again with this virus or virus can be called Harry potter do not worry because this virus can be destroyed manually or without antivirus. Basically, this virus works with vb language, is seen with the files as a database of virus.
In general this has a virus file to run the parent virus is a file thumb.db, autorun.inf, harry potter.inf shortcut folder folder shortcut Microsoft.inf, shortcut folder new folder located in my document and also in duplicate in the folders that have been infected by the virus. And all related files. How it works from the virus itself, when you open a shortcut folder folder before the virus will activate the wscript.exe file, and the thumb.db berda in the system32 folder in windows. Basically without berpanjang wide, this virus will meet all the existing drives with your computer shortcuts shortcut that he created. Nah following tips how to eradicate this virus from your computer . < span style = ""> 1. < span style = ""> 2. < span style ="">-< span style = "font-family:" font-size: 7; "> Turn off system restore. < span style ="">-< span style = "font-family:" font-size: 7; "> < span style ="">-< span style =" font -family: "font-size: 7;"> < span style ="">-< span style = "font-family:" font-size: 7; "> < span style ="">-< span style = "font-family:" font-size: 7; "> < span style ="">-< span style = "font-family:" font-size: 7; ">
Back Click here to select last tab Forward
Reload page and select 2nd tab using URL parameter