Blog Archives

Guide to Encrypted Viruses and the damage they can cause


A Guide to Encrypted Viruses


Posted in Geek Stuff

Understanding the Impact of the 2002 Beast Trojan Virus


Understanding the Growth and Impact of the Beast Trojan


Posted in Geek Stuff

The Complexity of Time Delay Viruses


The Complexity of Time Delay Viruses


An introduction to the time delay viruses

The basic principle that underpins this form of malware is the fact that it first attaches itself to your system and then destroys it at leisure. That means that it might take months before you actually start seeing the real challenges that have been presented in terms of maintaining security within the sector. A case in point was the CIH virus which affected Windows 95 and 98. The basic action was to prevent the deletion of files that were considered to be harmful. This is another form of control where you are unable to manage the data on your system.

Posted in Geek Stuff

The Trojan tricks of a multi-headed virus


Development Model for the Multi-Headed Virus


The peripatetic nature of the multi-headed virus

The nearest analogy that you can come up is that of a flue agent which goes viral. It infects the operations of the entire system even if the symptoms are manifested in specific parts. You should look at the operating system for the PC as the immune system of your network which is being attacked. Under the guise of the multi-headed virus, there is more than one line of attack. That means that the computers are almost under constant pressure. Eventually they will give way and that could lead to serious problems within the management of the network.

Posted in Geek Stuff

Anti Protection Virus


The Challenges of Resolving the Anti Protection Virus..

Posted in Geek Stuff

The Growth of the SQL Slammer Virus


The Growth and Management of the SQL Slammer


Posted in Geek Stuff

Business threats from secret viruses


Understanding and Dealing with Secret Viruses.


Posted in Geek Stuff

Sasser Virus of 2004


The Sasser Virus of 2004 in Action


Posted in Geek Stuff

Creating An Email Signature with Outlook Express

Creating an email signature can be a very valuable tool for your website. Its another chance to gain yourself outlook expresssome free advertising. It can also save you time. You won’t have to type your name, website link, or your email address again.

Here’s how to set it up:
1.

Open Outlook Express

2.

Posted in Geek Stuff

How to set up an Email Account in Outlook Express

This is quite a simple task, but seems to be one of the best kept secrets in computing.outlook , express If you have the correct information available, all you have to do is fill the details in!

The information you will need:
1.

Your email address.

2.

Posted in Geek Stuff


Some of our Happy Customers we have provided service for...