Posts

Showing posts from August, 2020

what is Encrypted RAR File

It's possible to force the user to supply a password to encrypt RAR archives so a file can be extracted. If you have an encrypted archive for which you don't know the password, or if you've simply forgotten a password you assigned yourself, there are a handful of tricks you can attempt. Step 1 Check the source of the archive. If you downloaded it from a website, look around the site for a mention of the password (after all, it's unlikely someone offered an unopenable archive for download.) If the person you downloaded it from can be contacted, send them an email asking for the password. Step 2 Try a few likely-seeming passwords. The name of the source website may work, as may the name or Internet handle of the archive creator. Step 3 Try a brute-force approach. This involves simply cycling through every possibility, one by one, until something works. You can technically do this yourself, but it would take forever and be extremely tedious. Fortunat

How Computers and IT Systems affected by malware

For many computer virus writers and cybercriminals, the objective is to distribute their virus, worm or Trojan virus to as many computers or mobile phones as possible – so that they can maximise malware penetration. There are three main ways in which this can be achieved: Via social engineering By infecting a system without the user’s knowledge A combination of both of these methods In addition, the malware creator will often take steps to prevent the infection being detected by antivirus programs. Discover more in the following articles: Social Engineering Malware Implementation Techniques Combining Social Engineering & Malware Implementation Techniques Why Cybercriminals Try to Combat Antivirus Software Find more about :  r ansomware prevention software

what is use of Lanmanworkstation ?

This key is where all the configuration data for the Workstation service is stored. The lanmanworkstation key by default, looks like this on a freshly installed Windows Server 2003 Service Pack 1 machine As you can see, there’s no “AutotunedParameters” here. However, there is a "parameters" sub key in which we can do some tuning. It is not uncommon (especially in Terminal Server environments) to have to tune the Workstation service to alleviate performance problems. This is due to the nature of Terminal Servers. My article on MSTerminalServices.org discusses this in detail, but in a nutshell it’s like this: the workstation service was (and is) designed for a single workstation (like your desktop). However, a Terminal Server can easily host 50 desktop sessions, but unless you do manually intervene this server most likely is still configured just as your desktop would be. It’s pretty obvious that this could lead to some performance problems. Parameters Although the

How Client Server Network works ?

As technology and computers have continued to develop rapidly, a client server network has soon replaced past forms of networking on a computer to become the most widely used. A client server network can be utilized by desktop computers and laptops, as well as other mobile devices that are properly equipped. Define Client Server Network A client server network is defined as specific type of online network comprised of a single central computer acting as a server that directs multiple other computers, which are referred to as the clients. By accessing the server, clients are then able to reach shared files and information saved on the serving computer. Further, client server networks are very similar in nature to peer to peer networks with the exception that it is only the server that can initiate a particular transaction. Features of Client Server Networks A client server model can be implemented into a single computer system, but is most commonly applied over many