Other > General Topics

User's FAQ

<< < (2/34) > >>

Lisandro:
Computer acronyms

This issue is under construction with Mike help  ;)

AcronymsDescription ADSLasymmetric digital subscriber lineAGPaccelerated graphics portAPIapplication program interfaceARINAmerican Registry for Internet NumbersASPapplication service providerATMasynchronous transfer modeBIOSbasic input output systemCD/Rcd-recordableCD/RWcd-rewritableCMOScomplimentary metal-oxide semiconductorCOMcomponent object model (Microsoft functional components interfa-ces)CPUcentral processing unitDATdigital audio tapeDCOMMicrosoft Distributed Component Object ModelDHCPdynamic host configuration protocolDLLdynamic link libraryDMAdirect memory accessDNSdomain name serviceDoSdenial of service (attack)DOSdisk operating systemdpidots per inchDRAMdynamic random access memoryDSLdigital subscriber lineDVDdigital versatile diskECCerror correcting codeEGAenhanced graphics adapterEULAend user license agreementFATfile allocation tableFTPfile transfer protocolGbgigabitGBgigabyteGSMglobal system for mobile communicationGUIgraphical user interfaceHTMLhypertext markup languageIANAInternet Assigned Numbers AuthorityICANNinternational corporation for assigned namesIDEintegrated drive electronicsIGPintegrated graphics processorIMAPinternet message access protocolIPinternet protocolIrDAinfrared dataIRQinterrupt requestISAMicrosoft internet security and acceleration (server)ISDNintegrated services digital networkISPinternet service providerJMSjava message serviceJPEGjoint photographic expert groupKbkilobitKBkilobyteLANlocal area networkLEDlight emitting diodeMACmedia access controlMbmegabitMBmegabyteMIDImusical instrument digital interfaceMIMEmultipurpose internet mail extensionMPEGMoving Picture Experts Group (M-peg)MSDTCMicrosoft Distributed Transaction Coordinator ServiceNASnetwork attached storageNICnetwork interface cardNVRAMnon-volatile random access memoryOEMoriginal equipment manufacturerOLEobject linking and embedding (Microsoft functional components inter-faces)P3Pplatform for privacy preferencesPANpersonal area networkPDApersonal digital assistantPoPpoint of presencePOPpost office protocolPPPpoint to point protocolPROMprogrammable read only memoryRADIUSremote authentication dial in user serviceRAMrandom access memoryROMread only memoryRSARivest, Sharnir & Adelman (encryption inventors)SAN storage area networkSMSshort message serviceSMTPsimple mail transfer protocolSOAPsimple object access protocol (apache)SQLstructured query languageSRAMstatic ramSSLsecure socket layerTCPtransmission control protocolUPSuninterruptible power supplyURLuniform resource locatorUSBuniversal serial busVDSLvery high data rate digital subscriber lineVGAvideo graphics arrayVoIPvoice over internet protocolVPNvirtual private networkW3Cworld wide web consortiumWAPwireless application protocolWLANwireless local area networkWMLwireless markup languageXMLextensible markup language

Lisandro:
Install, uninstall and repair

1. Download the avast! setup. Take note of your Registration key or, if you need another key, the registration form can be found here
2. Uninstall avast (Control Panel)
3. Boot
4. If you want, use Avast Uninstall for complete desinstallation or RejZor's application called avast External Control.
5. Boot
6. Install the downloaded setup file
7. Boot
8. Enter the Registration key and configure avast! for your needs

If you had, previously, another antivirus application installed, could be useful a complete desinstallation of it and some Registry cleaning. You can use the following applications:
RegClean for Windows 98 (but works on XP).
BeClean Specially the Registry Cleaning feature.
But the best, you can make a download for try, is PowerTools. Very powerful registry power tools, with lots of extra options. Unfortunately, it's a shareware. You can run it before the expiration time and get rid from the previous antivirus application. You can choose an option for backup of the removed itens.

Lisandro:
Rescue disk
There is no rescue disk for avast. When and if your system is infected, avast will indicate that you can restore your system to a previously saved configuration using the VRDB. You do not need to monitore the restoring.

But you can use avast 7.7 for DOS. It's a freeware.
You can use the following public Registration key, which can be inserted when asked by the program: AS770.A123456-24DB67
The updates could be found here: http://files.avast.com/files/latest/lguard.zip

avast Command-Line: only the Profesional version has a command line option and complete instructions on how to set it up can be found in the Help file. avast Home does not have this function.

Lisandro:
VRDB

It stores important parts of executable files (parts that are often modified by file viruses). It cannot guarantee recovery in 100% of cases. The only way to ensure this would be to simply copy the whole executable file, i.e. VRDB would be a copy of all your executable (exe, dll...) files. Of course, it would get rather big this way.

When no RunInterval value is in the avast4.ini file, the default (3 weeks) is used. I'm afraid I don't know how long the VRBD generation can take... of course, it depends on how much files and programs you have on your disks... I think it shouldn't take very long (an hour?) - but I really don't know, I may be completely wrong. As for shortening the interval of VRBD generation I suggest you read this forum.

By default, VRBD is updated every 3 weeks; the interval can be changed by editting avast4.ini file, though. More information about the avast4.ini file you can see here.

avast! mostly relies on VRDB - at least considering the executable files (the macroviruses are cleaned by other methods, not using VRDB). So, cleaning an infected file right after you installed avast! (i.e. without having the original file in VRDB) would not work.

avast 4.1 will include the Cleaner - that is able to clean the most common viruses using a virus-specific methods. The number of viruses healed by Cleaner will grow in time, as well as the integration of the Cleaner into avast! will get tighter. Note, however, that any generic virus removal methods (that do not use a VRBD-like database) is usually not able to turn infected files exactly into their original state. For example, some information in the file header is often irreversibly overwritten when an exe-infection occurs. This information is unimportant in most of the cases; sometimes, however, it may cause problems - WinZip self-extracting archives will announce CRC errors, some copy-protected programs may not run, etc. This folder has nothing to do with VRDB. avast! puts there temporary files when scanning inside of archives or e-mail attachments. So, you can safely delete the files. (Of course, avast! should have deleted the files...)

Lisandro:
Understanding firewalls

First off all, some terms description:

IP. Internet Protocol. Each computer on the internet has an IP-address, which is similar in principle to a telephone number. However, unlike telephone numbers, IP addresses are restricted in their numerical range. An IP address has the format "###.###.###.###". Four number blocks, each of which are segmented with dots, and each block can only contain a value from 0 to 255.

Port. A communication channel for computers in networks. In order for computers connected to the internet to be able to communicate with each other, the transmission standard "TCP/IP" was designed. TCP/IP is a software protocol for formatting and transferring data within a network - such as the internet. One of the main advantages of TCP/IP is that it is not dependant on the computer's operating system. Transmissions between different operating systems are therefore possible. By knowing the IP address in use, a program is therefore able to send data to another computer. But how the receiving computer can know which program to use for the data it receives? To handle this there is a system of port numbers, also known as ports. With each transmission of data, the data package must contain the receiver's IP, and also the port number of the program which is responsible. Imagine ports as a direct dialing number in a phone system. If the call number is not existent, you simply won't get a connection. The same thing occurs if you try to connect with a computer on a port where no service is present. A complete data transfer always contains the IP address plus the port number required. This applies to both outgoing data (requests to the webserver) and also the incoming data - data transmitted from the website itself).

Port Numbers. Port numbers can be any number from 0 to 65535. This range is split into three main categories described bellow. Port numbers are managed by the IANA (Internet Assigned Numbers Authority). 0 to 1023 are "well known ports", meaning they are reserved for special services like FTP (21), SMTP (25), HTTP (80), POP3 (110), etc. 1024 to 49151 are "registered ports", meaning they are registered for services. 49152 to 65536 are "dynamic and/or private ports", meaning that everyone can use these as required.

Port Reference List. Full list of all ports and their references, trojan ports included.

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version