!!!! IMPORTANT: Search here for names, topics, news, stories, products, or events internally and from Google search results or else search the links manually!!!:

AND you can select a language with the arrow on the left of the search box, BUT be sure to uncheck that language if you want English.




You are on a Global Trade Route.Com, Inc.’s IT Website Site

Return To Contents Page

1.     Introduction and Feasibility

2.     Network Needs and Analysis

3.     Global Media & Communications (1stGMC)

4.     Network services : local area networks

5.     Network services : wide area networks

6.     DHCP

7.     WinRoute

8.     Default Gateway

9. DNS

10. Building Cabling

10.1.                    Introduction

10.2.                    Standards

11. Topology

12. Telecommunications Closet

13. Dell Blade Server

14. Cisco Router

15. Catalyst 2950 Series Switch

16. Catalyst 3550 Series Switch

17. Cisco Micro Hub 1538 Hub – 8 Port

18. APC Smart-UPS 500VA USB & Serial 100V Black

19. Firewall

20. Network services : voice over ip

21. Network services : replication

22. ModernGraphics.Com

23. Cost-Benefit Analysis

24.  APPENDIX

Links To Supporting Information Pages


ALL PAGES ARE UNDER CONTINUOUS CONSTRUCTION

If you don't find your answer use the search box above



1stgmc_terms_conditions
1stgmc_terms_use_agreement
How Can 1stGMC Help You?
1stGMC_support
apple_mac_support
application_development
biometrics
business_support
cabling_solutions
cat5e_cabling
cat6_cabling
cat7_cabling
certifications, professional, technical, network, cisco, audio, video, telemedical, skill, radiology, bio-medical
cisco
clustering
cold_fusion
content_management_server_support
content_management_systems
CRM_customer_relationship_management
css_website_design
custom_software
data_recovery
DHCP
disaster_recovery
e_mail_hosting
e-commerce
enterprise_business_support
exchange_support
fiber_optic_cabling
flash_website_design
glossary
hardware_software_support
hp
html_website_design
ibm
internet_branding
IT_network_software_outsourcing_support
laser_microwave
lotus_notes_support
NAS_network_attached_storage
network_antivirus_protection
network_consultancy
network_firewall_security
network_installation_support
network_internet_security
networks_LAN
networks_thin_client
networks_virtual_servers
networks_VOIP
networks_WAN
online_backups
online_marketing_service
outsourcing_support_solutions
overview
pay_per_click
postinfo
proposal_for_network_sample_page
RAID_storage
remote_support
replication
resources_jargon
resources_links
resources_pc_healthcheck
resources_requestLink
sage_support
SAN_storage_area_network
search_engine_optimisation
search_engine_promotion
search_engines
security_access_controls
security_cameras
security_cameras
security_consultancy
security_content_filtering
security_encryption
security_intrusion_detection
security_penetration_testing
seo_internet_marketing_tutorial
seo_search_engine_optimisation
seo_search_engine_optimisation_free_report
seo_search_engine_optimisation_link_analysis
seo_search_engine_optimisation_reciprocal_linking
seo_search_engine_tips
server_support
sharepoint_support
showcase Albert V. Sheppard (about)
small_business_support
software_consultancy
software_development
software_ERP
software_integration
software_outsourcing
software_SCM
software_support
sql_support
srs
ssl
SSO_single_signon_solution
storage_backups
storage_solutions
tape_backups
tape_storage
telemedicine and telehealth
terminal_server_support
testing
types_of_software
UCCC, Albert V. Sheppard’s
Video:Mastering Web/Internet Video Techniques, Skills and Professional Tricks and Problem Solving
VPN_virtual_private_network_security
web_design
web_extranets
web_hosting
web_intranets.html
web_solutions
website_database_integration
wireless_LAN
wireless_network
wireless_security
wireless_WAN
xhtml_website_design





security : anti virus

A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spread to other computer users.

Viruses can be transmitted as attachments to an e-mail note, as downloads, or be present on a diskette or CD. The source of the e-mail note, downloaded file, or diskette you've received is often unaware of the virus.

Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer.

Some viruses are playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting.

Generally, there are three main classes of viruses:

File Infectors

Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files.

When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.

System Infectors

System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks.

A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus.

However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk.

(Allow several days for recovery.) This is why you should make sure you have a bootable floppy.

Macro Infectors

These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.

The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program. Since this is difficult, you can buy anti-virus software that can screen e-mail attachments and also check all of your files periodically and remove any viruses that are found.

From time to time, you may get an e-mail message warning of a new virus. Unless the warning is from a source you recognize, chances are good that the warning is a virus hoax.

security news



Use the SEARCH BOX ABOVE if you did not find your answer



The first virus affecting StarOffice was detected Tuesday, but so far it isn't being used to infect computers.

The IT industry will never eradicate security threats to e-mail systems and organizations should take a holistic approach to securing their communication systems to the level where they believe risk is at a manageable state, according to panelists at this week’s Inbox e-mail conference in San Jose.

Today's bug patches and security alerts:

If you are running a Windows computer and not using some sort of anti-virus package then you are likely not the one really running your computer. It is very likely that some hacker halfway around the world can do anything he wants to with “your� computer. In a Windows environment running anti-virus to protect the computer from worms and viruses is what is euphemistically called “a required option.� So what do you do when the very tool that is supposed to protect you from attacks turns out to be enabling them?

Today's bug patches and security alerts:

WASHINGTON, D.C. -- It’s time organizations consider switching from best of breed to “best of need� products when it comes to security, as vendors realize their offerings are becoming commoditized and start pricing them accordingly.

Microsoft Tuesday offered free trial versions of its forthcoming anti-virus and anti-spam software for e-mail that it obtained last year when it acquired Sybari Software.

Sophos has incorporated several new features in a security software package released Wednesday that allows network administrators to manage security for thousands of computers from a single console.

In addition to writing this security-related newsletter, I also cover multimedia and conferencing technologies for Network World. One of the analyst firms that I rely on for information is conducting a survey on videoconferencing and IP communications usage. Here are the details:

Crossbeam has come out with two security devices for mid-size businesses that support multiple security applications made by other vendors.

Page Topics: 2000 anti server software virus window , 2000 anti server virus win , 2003 anti server software virus window , 2003 anti server virus window , 2003 anti server virus , 2003 server virus protection software , advanced server anti virus software , agv anti virus , anti server software virus , anti virus and internet protection software , anti virus email server , anti virus for file server , anti virus package , anti virus program , anti virus programs , Anti Virus Programs , anti virus protection software , anti virus protection , Anti Virus protection , anti virus scan , anti virus server software , anti virus server , anti virus software and server , anti virus software avg , anti virus software for windows , anti virus software mac os x , anti virus software windows 2000 server , Anti virus software , anti virus software , ANTI VIRUS SOFTWARE , Anti Virus Software , anti virus win 2000 server , Anti virus , ANTI VIRUS , anti virus , Anti Virus , apple anti virus software , apple anti virus , computer anti virus software support , computer anti virus software , computer server virus software , corporate anti virus solution , dns server host file can27t change virus hijack , email mail server spam virus malware viruses filtering , email protection server software virus , email server anti virus , email server virus software , email server virus , enterprise web proxy server virus , exchange server smtp virus , exchange server virus scan , ez anti virus , file protection server software virus , file server virus protection software , file server virus software , high speed internet anti virus protection , Hosting Email Anti Virus , khtmlersky anti virus for windows file server , khtmlersky anti virus windows file server , khtmlersky anti virus , mcafee anti virus software , Mcafee Anti Virus , microsoft anti virus protection , microsoft anti virus , microsoft exchange server api virus , microsoft server 2000 virus , microsoft window anti virus , microsolf anti virus , nortan anti virus , norton anti virus corporate edition server , norton anti virus software, NORTON ANTI VIRUS SOFTWARE , norton server based anti virus software , nortons anti virus , server 2003 and virus protection , server 2003 anti virus , server 2003 virus protection , server 2003 virus software , server anti virus software , server anti virus , server virus protection , server virus scanner , server viruses , software anti virus , sophos anti virus software , spyware anti virus , sql server anti virus software , symantec anti virus server , symantec anti virus software , symantec anti virus , virus memoria virtual windows 200 server , virus protection for netware file server , virus secure e mail server , virus software windows 2000 server , window 2000 server anti virus software , window server anti virus software , windows 2000 server anti virus software , windows 2000 server anti virus , windows 64 bit anti virus , windows anti virus software , windows storage server security virus , windows virus unix server , anti virus guard , macintosh anti virus software , microsoft anti virus software , nod32 anti virus software, server 2000 anti virus software , server virus software , windows 2003 server anti virus software