사이트 로그인
2026.01.21 06:27
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h
Although not mandatory on all PCs, having some type of protection on your computer today is almost always a must. The problem that most tech savvy users have with them, is that most, just don't work and most eat up way to many resources. Having a way to actually test some of the options out there, is a fantastic way to make your final decision. So you try it out...Download the latest AVG, Symantec or NOD32 trial and see which comes out on top with each of these to
When I start working on the computer, I mostly tend to head straight to the start menu so let's go there. To bring up the start menu using the keyboard, just press the START key (also called the WIN key) which is normally at the bottom left of the keyboard close to the spacebar. It will have a small Microsoft symbol on it. It varies slightly in design according to what keyboard you're using but it looks something like th
If you want to completely wipe out personal information, and keep yourself safe, you need to take certain measures, like installing "data shredding" software. In the conventional sense of the word, data "shredders" don't actually "shred" your info; instead, they are programs that are capable of rewriting your selected files multiple times with a random series of binary data, thus obliterating them beyond recognit
You can set up tunnel for any service on any IP anywhere. You'll just need to set up the program to connect to localhost on the source port you set up for the tunnel. It's a pretty nifty way to connect to stuff you may not be able to otherwise, due firewall issues you may encounter. All you need is a single port to get to your SSH server, and it of course has to be running on that p
Malware is a whole different ballgame, and is much more common and prevalent in today's "internet" world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it's always evolving, and many protective products can't always prevent malicious activity. However, that doesn't mean you shouldn't attempt to block
One of the most ridiculous features of Vista are the continuous "confirmation" messages. Messages that pop up nearly every time you attempt to run any unknown application. Almost all of which are completely unnecessary, and waste time. Here is how you can disable these annoying uac notifications, quickly and eas
The WIN key is actually very versatile and goes to the heart of being able to whizz around your desktop without the mouse. For example, if you do WIN + R, you can get the Run box (try it). WIN + E opens Explorer (your hard drive), WIN + D minimises all your windows and takes you to the desktop, WIN+L locks your screen and WIN + TAB moves you from one open application to anot
The majority of the time you end up relying on on another product to get the annoyingware off of your machine. So now you've got a $60 bloated product eating up resources on your machine and doing absolutely nothing to protect
Local - A local tunnel will allow you to connect to the specified port on a machine residing on the same network as the SSH server. One useful example that I will show you is how to connect to a Windows computer running Remote Desk
None of them involve going anywhere near the registry or indeed altering your Windows settings in any way. What I am about to talk about is just plain old keyboard shortcuts to make menus jump up and down, Windows gaming Accessories|https://Windowsmastery.com/ change or make you bounce your way around the desktop - without touching that mouse o
Too many times we rely on our Anti-Virus/Anti-Spware to just work. We think since we have it installed, that it's safe and sound. I think we've come to find these days, many Anti-Virus applications do a very poor job of protecting you against ad/mal/spyware, even though they claim to do
Nearly every single file on your computer contains some type of personal information - either information about the user, information on setting e.g. time, date, etc. In any case, it may be good to remove some of this information before making it available to the public, such as uploading a video or image onl
Most shredders use overwrite technology that conforms to DoD 5220-22M specifications (Military-Grade) or better. DoD 5220-22M is the standard set by the U.S. Department of Defense for permanent erasure of digital informat
Now you want to open a file. Just do CTRL + O to open the file box. Use the TAB key and arrow keys to navigate to the correct folder then start typing the name of the folder in the file name text box. When the file name appears, choose it, hit enter and the file will o