Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the broken-link-checker domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /usr/home/simondi1cknow/public_html/cknow.com/cms/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the genesis domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /usr/home/simondi1cknow/public_html/cknow.com/cms/wp-includes/functions.php on line 6114
DaBoss, Author at Computer Knowledge - Page 13 of 23

Screensavers

Early computers used cathode ray tubes (CRTs) for display. These were basically analog TV sets designed to work with a computer video system. The CRT … [Read more...]

Vulnerabilities

Operating systems and programs are complicated pieces of software with up to millions of lines of source code going into their development. While it … [Read more...]

Batch Files

While not often found, it is possible to write a batch file that contains a virus. In most cases the batch file is used to drop a memory or disk virus … [Read more...]

Macros

As indicated throughout this tutorial, in order for a virus to do anything, first a program of some type must execute. A virus, no matter what type, … [Read more...]

Companion Files

Would you believe that a virus can infect your files without changing a single byte in the infected file? Well, it's true; two different ways in fact! … [Read more...]

Directories (Cluster) Viruses

There is a type of virus known as a "cluster" virus that infects your files not by changing the file or planting extra files but by changing the DOS … [Read more...]

Virus History Summary

Below is an expanded summary of the history of viruses from the start to when I stopped recording "new" events. Narrative histories of the early … [Read more...]

Peer-to-Peer Network

A peer-to-peer (P2P or rarely PtP) computer network uses computers connected to other computers in a network instead of going through a central hub or … [Read more...]

Search Poisoning

Let's face it, users trust search engines like Google and others. Search Poisoning takes advantage of this trust and attempts to lure users to … [Read more...]

Trusted Software or Site

Actually, the summary above about says it all. Floppy disks (back in the old days), CDs (more recently), and downloads of commercial software or … [Read more...]