Saturday, October 24, 2009

ANTI VIRUS


Virus and Anti-virus Information
Y2K History -- Free Anti-Virus Downloads and Links -- Y2K Bug-Fix Downloads and Links


Amazing Media: Web Advertising YOU Control!
National Infrastructure Protection Center
DOS Anti-virus packages
Mac Anti-virus packages
Virus Bulletin Home Page
Anti-virus Comparative Review
Doug Muth's Anti-Virus Help
ZDNet Software Library - Windows Utilities
Courtney Identifies the use of SATAN
NIST/CSL
IBM AntiVirus Hype Alert
How to Spot a Virus Hoax
IBM Emergency Response Service
Virus History
Dr. Solomon's Virus Central
Network Associates McAfee and More
Symantec Norton AntiVirus and More
Panda Software Anti - Virus
AVP Software Anti - Virus
Rob's 'Computer Virus Myths' page
NH&: A Software Anti - Virus
Aladdin Knowledge Systems. E-Safe
The Virus Bulletin
Sandrin Anti-Virus Connection
Virus Information Center
Joe Well's Wild Lists - Viruses in the wild.
Open University Anti-Virus Information:
Henri Delger's Virus Help and Information
Thomas Jefferson U's Virus Information:
NIST Virus Information Page
Willems Free Anti-Virus Consultancy
J and A Virus Info
ICSA consortia. Anti-Virus Pages
Alt.Comp.Virus Newsgroup
Alt.Comp.Virus.Sourcecode Newsgroup
Computer Associates: Virus Information Center
MS-DOS Anti-virus Tools
NT bug exploit
AVP Virus Encyclopedia
Computer Virus Information
FAQs on VIRUS-L/comp.virus
Virus Library -- Hoaxes
Safetynet Security and Anti-Virus Cafe'
Threat Assessment
NIST virus information
IBM AntiVirus
Microsoft two ActiveX controls security vulnerabilities
Microsoft Security Advisor Program
Disinfectant
TruSecure AntiVirus Policy Guide

Computer Virus Bulletin Board: For the latest Emergency related news and notices
Around the period of the Year 2000 transition it is expected that computer viruses will be spread by people seeking to destabilize the Internet.

Nov. 11, 1999
Patch Available for "scriptlet.typelib/Eyedog" Vulnerability
Microsoft has released a patch that eliminates security vulnerabilities in two ActiveX controls. The net effect of the vulnerabilities is that a web page could take unauthorized action against a person who visited it. Specifically, the web page would be able to do anything on the computer that the user could do.

Frequently asked questions regarding this vulnerability

Business Continuity Planning and Preparation for Disasters


About the CIH Virus

Yesterday and today April 26, 1999 we have received a number of requests for information about the virus for this reason we are posting the information below

Once the virus is triggered the first 2048 sectors of each hard drive in the computer are overwritten with random data. This area of the hard drive contains important information about the files on the computer. Without this file information the computer will think the hard drive is empty. The virus will also write one byte of data to the BIOS boot block which is critical for booting a computer. Writing to the system BIOS can be prevented by setting a jumper on most motherboards. Contact the computer vendor or motherboard vendor for assistance with their product. If the virus succeeds in reprogramming the flash BIOS ROM, there is no software remedy for it: your PC will no longer be bootable and the flash BIOS will need to be replaced or re-programmed in a special EEPROM programming device. Where the flash BIOS ROM is permanently attached to the motherboard, the entire motherboard will need replacing. The damage caused to the information on the hard disk is possibly recoverable by using data recovery services, and the success depends on the disk size, format, fragmentation etc.
Volunteer opportunities through the Disaster Center
Disaster Center Bulletin Board Directory

webmaster@disastercenter.com
Back to the Disaster Center
About the Disaster Center
Advertising at the Disaster Center

























































No comments:

Post a Comment