What is virus and types of computer virus

The computer virus itself extends to another code or other executable documents. The purpose of creating a computer virus is to infect vulnerable systems, obtain administrative control and steal sensitive data. Alligators design computer viruses with malicious intentions and prey on online users by tackling them. Read below for types of computer virus.

 

 

types of computer virus

One malware is types of computer virus that adds its virus code to increase it by changing the programs and applications. Computing viruses come in different forms to infect the system in a variety of ways. Some of the most common viruses are there


 

Boot Sector Virus 

This types of computer virus are infected on the boot recorder and it is challenging and complicated to remove this virus and often requires the formatting of the system.

 

Macro viruses

 As the name suggests, macro-virus focuses especially macro-language commands in applications such as Microsoft Word. The same is also the same as other programs. However, as the years have gone, Microsoft Word has attempted to derogate by default by default in later versions. Therefore, cybercriminals began to use social engineering schemes to focus on users.

types of computer virus
types of computer virus

In the process, they trick the user and allow macros to launch the virus. Since macro viruses have come back in recent years, Microsoft has successfully rehabilitated by adding a new feature to the 2016 Office. This feature enables the ability to optimize macro-security managers. As a fact, it can enable reliable and barrier workflows if needed throughout the organization.

 




 

Overwrite Viruses

This types of computer virus are to change and re-write a virus’s design.  As the name says, the virus starts after the computer has been attacking overwriting files with its own code. On the flipside, transcription viruses can install a new code in the files or applications that they sign up to spread the virus to additional files, applications, and systems.

 

 

Polymorphic Viruses

 More and more cybercriminals depend on the polymorphic virus. This is a type of malicious software that has the ability to change or mutate the source code without changing its basic functions or functions. This helps the virus on your computer or on the network to avoid detection of many antimalware and threat detection products.

 

When the security software detects a polymorphic virus, the virus modifies itself in this way, it is no longer detectable using the previous signature

 

 

Resident Viruses

This types of computer virus are implanted in the computer’s memory. Essentially, the original antivirus program is not required to infect new files or applications. Even after removing the original virus, you can activate the version saved in memory. This happens when the computer’s operating system loads certain applications or functions. Resident viruses are troublesome because they can go unnoticed by anti-virus and anti-malware software hiding in the system RAM.

 

 

Rootkit Viruses

A rootkit virus is a type of malicious software that secretly installs an illegal rootkit on an infected system. This opens the door for attackers and gives them full control over the system. An attacker will be able to substantially modify or deactivate features and programs. Like other advanced viruses, the rootkit virus is also created to bypass antivirus software. The latest versions of the main antivirus and antimalware programs contain rootkit scans.

 




 

System or Boot-record Infectors

Boot-record Infectors infect executable code found in specific system areas on the disk. As the name suggests, they attach to the USB memory and the boot sector DOS on floppy disks or Master Boot Record on hard disks. Boot viruses are not currently more popular because the latest devices rely less on physical storage media

how to add printer to mac
how to add printer to mac |how to add printer to laptop
Printer installation on a Mac – how to add a printer to your Mac Read the article to learn how
Read more.
origin broadband router settings
origin broadband router settings
1. Find the router’s IP address origin broadband router settings   The IP address is a sequence of numbers – 192.168.1.1
Read more.
types of computer virus
What is virus and types of computer virus
The computer virus itself extends to another code or other executable documents. The purpose of creating a computer virus is
Read more.
what is a diode used for
what is a diode uses
The diode uses for The most popular function of the diode is to allow the electric current to flow in one
Read more.

what is computer network

In today’s Internet, World Networking plays an important role in the various successes of the organization, creating a network environment and device connectivity. Because there are many devices that help you connect your computer to another computer, such as a router, hub, switch, and more. The network is divided into two types: a wired network in which computers are connected by cables and a wireless network without using cables. Before switching to a computer network, there are certain conditions on which you should know how to use NIC or network card, LAN or local area network, servers, hub or switch and others. Read entire article what is computer network.

 




 

what is computer network Types of and network categories

such as star and ring topology, which show the geometric layout of the computer system, the protocols for LAN known as Ethernet used for data transmission, and the last network architecture in the peer to peer and client/server model. 

 

 

what is computer network

A computer network is a combination of two or more computers via a medium of information exchange or data transmission. These computer devices can be PCs, workstations, mainframes connected to printers, modems, CD / DVD ROM drives and other peripherals to share resources over the network.

 

Computer connections over the network are possible via several network devices, such as routers, bridges, gates, cables, satellites, and more. The Internet is the best example of a computer network that helps in exchanging data between two or more computers on the network. However, the main function of the Computer Network program is to provide a medium to connect and connect with various computer devices for easy data communication.

 

Computer networks are very useful in many ways to communicate over the network via email or chat, share hardware resources for printing or scanning documents, share files and data on a storage device, share applications and run remotely on other computers, and more.

 

 

Local or local network:

– It is a computer network that covers a small geographical area, such as an office building, school, universities, etc. Where a wired or wireless LAN is used to connect devices such as personal computers, printers to the Internet. The wired connection can be implemented using cables such as twisted-pair cable, coaxial cable or fiber optic cable for data transmission speed.


 

Similarly, a wireless LAN is implemented using radio wave technology or infrared communication that helps connect multiple devices within an area. Ethernet or IEEE 802.11LAN is used to connect the device to a router or modem for fast data transfer. The five main LAN components are network devices, such as workstations, printers, servers that other computers can access, network communication devices such as a router, hub, and switches to connect to, a network card or network card, cables as a medium and system network.

 

 

WAN or Wide Area Network: –

It is a type of computer network that helps connect computers located in other countries or cities via telephone lines, radio waves or other communication links. 

what is computer network
what is computer network

MAN or Metropolitan Area Network: –

The metropolitan area network is designed to be used in the city or in the city via a wireless medium or fiber optic cables. Provides connectivity for LANs and connects them to the WAN to share the connection over the Internet. The size of the MAN network is between LAN and WAN, which initially range from 5 to 50 km.

HAN or home network: –

The network is connected to a user’s home that connects different digital devices on the network to communicate with other devices. Characteristics of computer network resources. Sharing resources from one computer to another Computer in the network. Efficiency by measuring the data transmission speed with the number of users, communication, and software used.

Reliability facilitates the use of an alternative source of communication in the event of hardware failure or connectivity. Scalability increases system performance by adding more Processors Security is the main feature of a computer network in which you can take the necessary steps to protect your data from unauthorized access.

Category: Basic computer information Computer tags: CAN, CAN or Campus Area network, Computer network characteristics, computer networks, HAN networks, HAN or home network, LAN, LAN or local network, MAN, MAN or Metropolitan Area Network, WAN, WAN or Wide Area Network, What is a computer network?


Question Answer

1) what is computer network?

computer network is a group of computers connects together for the purpose of sharing resources. The most common resource shared today is connection to the Internet.

 2)What is computer network  OSI reference model?

Ans: Open System Interconnection, the name itself suggests that it is a reference model that defines how applications can communicate with each other through a network system. It also helps to understand the relationship between networks and defines the communication process in the network.

3)What is computer network layers in the OSI reference models?

Describe each layer briefly. A: The following are seven layers of OSI reference models: # 1) Physical layer (layer 1): the physical layer converts data bits into electrical impulses or radio signals. E.g. Ethernet. # 2) The data link layer also detects errors in layer 1.

# 3) Network layer (layer 3): The network layer sends a variable-length data sequence from one node to another node in the same network. # 4) Transport Layer (Layer 4): transmits data between nodes and also provides confirmation of successful data transmission. Tracks uploads and resends segments if the transmission fails.

4)What is HTTP?

Ans: HTTP is a HyperText Transfer Protocol and is responsible for web content. Many websites use the HTTP protocol to transmit web content and allow display and navigation of HyperText. This is the main protocol, and the port used in this case is TCP port 80.

5) What is HTTPs?

A: HTTPS is a secure HTTP protocol. HTTPS provides web page authentication, which prevents unwanted attacks. In bi-directional communication, the HTTPS protocol encrypts communication, thus avoiding data manipulation. Using the SSL certificate, it checks whether the requested connection to the server is a valid connection or not. HTTPS uses TCP with port 443.

6)What happens after entering the URL in a web browser?

The URL may contain an HTML request, an image file or any other type. If the content of the URL you entered is in the cache and is fresh, display the content. Find the IP address for the domain so that you can configure the TCP connection. The browser performs DNS lookup. The browser needs to know the IP address for the URL so that it can configure the TCP connection. That’s why the browser needs DNS.

 

 

The browser first looks for the URL-Cache cache and then the operating system cache. If all caches are empty, it creates a recursive query to the local DNS server. The local DNS server provides an IP address. The browser sets the TCP connection using a three-way handshake. The browser sends an HTTP request. The server has a web server such as Apache, IIS that supports incoming HTTP requests and sends an HTTP response.

 

 

The browser receives an HTTP response and renders the content. What is DHCP, how does it work? The idea behind Dynamic Host Configuration Protocol (DHCP) is to allow devices to obtain an IP address without manual configuration. The device sends a broadcast message “I am new here”. The DHCP server sees the message and responds back to the device and usually assigns an IP address. All other devices on the network ignore the message about the new device because they are not DHCP servers. In Wi-Fi networks, access points generally operate as a DHCP server.


7)What is computer network ARP, how does it work?

ARP stands for Address Resolution Protocol. The node usually has a destination IP address to send the packet, the nodes need a link layer address to send the frame over the local link. The ARP protocol helps here. The node sends a broadcast message to all nodes, informing what the MAC address of this IP address is. The node with the provided IP address corresponds to the MAC address.

 

what is computer network easy definitions of network

1) There are many types of computer networks, including Local Area Networks (LANs): Computers are geographically close (in the same building).

 

2)A network can refer to any of the following: 1. A network is a collection of computers, servers, mainframes, network devices, peripherals or other devices connected to each other to enable data sharing. An excellent example of the network is the Internet, which connects millions of people around the world

 

3)A network consists of two or more computers connected to share resources and communication. Two very popular types of networks include: Local Area Network (LAN) Wide Area Network (WAN)


how to protect folder with password
how to protect folder with password
 Since most versions of  Windows do not include the method of password protecting your files and folders, this page provides steps to encrypt
Read more.
what is a diode used for
what is a diode uses
The diode uses for The most popular function of the diode is to allow the electric current to flow in one
Read more.
what is computer network
In today’s Internet, World Networking plays an important role in the various successes of the organization, creating a network environment
Read more.
capacitor uses
capacitor uses and functions of capacitors
Capacitor uses in almost all electronic products in various ways. At the simplest level, they are loaded with electricity and then
Read more.

how to protect folder with password

 Since most versions of  Windows do not include the method of password protecting your files and folders, this page provides steps to encrypt files and folders. In order to protect your files and folders in Windows, you need to use a third-party program. Before you save a password on any document, you may want to create a backup of the default files and folder if you forget the password in the future. Read below how to protect folder with password.

how to protect folder with password

 




 

 

how to protect folder with password in Microsoft Windows Vista, 7, 8, and 10 users

If you want to encrypt a file or folder, this can be done by choosing the following steps:

Select the file or folder you want to encrypt.

Right-click the file or folder and select Properties.

On the General programs, click on the Advanced button.

Check the box for the “Encrypt content to confirm data”, then click OK on both windows.

 

 

how to protect folder with password

 

NOTE-

If the option “Encrypt content to secure data” is not accessible or infiltrated or if you do not see the option, you probably have a Windows Home Edition, which does not support this feature. The hard drive in which the files are installed can be installed as NTFS because this is necessary for the encryption feature

 

 




 

CMD code tricks How to protect  folder with  password  

This Trick will show you a Locked Folder Through CMD.

I wrote Sharing Codes in Notepad and Save As .bat File To do it on DOS.

The Codes are given in STEP: # 2

The Codes of Provider have a number of Parts that mention the User’s name and password

 so just try my code To read a line and just try to understand how codes have been activated otherwise, Read Google For Your Reference or Direct Google and Follow some of the Best Forums..

 

 

 

Step 1 how to protect folder with password

1)Press your window key+R

2) and type notepad

3) copy this code and paste in notepad

 

 

 

Step 2

how to protect folder with password
how to protect folder with password

 

 

 

cls
@ECHO OFF
title Folder Locker
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST secured goto MDLOCKER
: CONFIRM
echo Are you sure u want to Lock the secured(Y/N)
set/p “cho=>”
if %cho%==y goto LOCK
if %cho%==n goto END
echo Invalid choice.
goto CONFIRM
: LOCK
ren secured “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s +r +i “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo secured locked
goto End

: UNLOCK
echo put in the key to Unlock the lock
set/p “pass=>password”
if NOT %pass%==1423222 goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” secured
echo secured Unlocked
goto End
: FAIL
echo Invalid keyword
goto UNLOCK
: MDLOCKER
md Secured
echo lock unlocked
goto End
: End

NOTE:  You can see the default password in red color so just change this to the password you want.

You can save your notepad file like anything.bat

remember you save file with .bat extension

 

 




 

step 3

how to protect folder with password
how to protect folder with password

when you open the anything.bat file then create a secured folder.

you can keep any folder in this secure folder.

and again open anything.bat

then cmd will be open you just type yes…

 

 

 

NOTE:

when you copy any folder and file..should not form same location example my secured folder on the desktop I need to copy any file from other location like  D drive or E drive…

 

 

Step 4 

 if you want to open this folder again then again open the .bat file

and enter your password…

so, guys, this is very easy and awesome tricks secure your personal folder from anyone..you can take any software name your .bat file…

 

 

 

Other security solutions how to protect folder with password  

File and folders that are not used frequently – Easy way to password protect files is to create an archive of the files using a compressed tool. When the archive is created, you can encrypt the content by specifying a password.

Windows 7 and Windows Vista have a compression utility. However, password protection for the compressed files is not possible without the use of a third-party software program.

 

 

File and folders frequently used or accessed

If you need to protect or encrypt a password that you use frequently, you need to install a third party program that allows you to protect your files and folders. Here are some free and commercial solutions.

1). 7-Zip – Free file and folder using utility, which includes the ability to save password protect and folders.

2). AxCrypt Free encryption enhancement that enables users to encrypt all files within a folder and these files will not be allowed to see if password (password) is not known.

3). Folder Guard There is a commercial version of password protection software that enables you to protect password, folders and other Windows resources.

 

 




 

how to protect folder with password Using Encryption  

The only safe way to hide files is encryption. Encryption turns your data into an unintelligible mess unless you have a password. 

All you need to do is right-click the file or folder, select Properties, go to Advanced and select the Encrypt contents to secure data check box.

how to protect folder with password
how to protect folder with password

 

 

 

The only disadvantage of this method is that it combines encryption with the user’s account. This means that if your sister is trying to open files from her Windows account, it will not open, but if you share your account or if you disconnect from the computer when you are logged in, she will be able to see it as easily as any other file on your computer. Therefore, make sure you shut down your computer or log out whenever you leave, or that encryption will not stop anyone.

 

how to protect folder with password Using Vera-crypt  

If you need something more bulletproof than the above, we recommend creating a password-protected file container with Vera-crypt. It takes a few more steps, but it is still quite easy and does not require advanced technology from you.




how to protect folder with password
how to protect folder with password
 Since most versions of  Windows do not include the method of password protecting your files and folders, this page provides steps to encrypt
Read more.
capacitor uses
capacitor uses and functions of capacitors
Capacitor uses in almost all electronic products in various ways. At the simplest level, they are loaded with electricity and then
Read more.
essay of information technology
essay of information technology
essay of information technology| essay understanding, IT, is defined as the technology used to acquire, store, process and organize data
Read more.