Главная | Соглашение | Публикация статей

Black Banner - History of discovery
Категория: English version

Somewhere in the middle of 2005 before me have come rumors about the emergence of a black banner is not clear. From its' advertising 'fellow distinguish fact that he was totally black (I assume that this advertising course), but also' click 'on it has nothing to give. After some time 2-3 seconds (and some eyewitnesses say about 2 3 minutes), he disappeared.

All of this could be written off at the imagination of people, or at someone's joke (or even unusual advertising course), but his appearance was recorded by different companies, and they certainly have to worry.

The main suspicion was that a new virus (on the theory of computer virus, we describe in detail one of the following article). But even the theory of the virus, could not explain some facts.

Physicist Michael Dodzhenson, (NASA):

"... The analysis of DNS servers found 102 references to nonexistent resources easier to say 'nowhere." If what all these links are date of 2030-2070 years. Links absolutely correct and legal. Initially, we suspected an error and a detailed analysis' event log 'servers. If the recordings were purposely left it just left a record of unauthorized modification of computer system time or a record of correction 'event log'. but no signs of unauthorized access and control the amount of files have not changed ... "

Is this new virus? How it could affect the information resources, and whether its specialists to protect the information?

Or is it simply a tool for industrial and international espionage?


Black Banner - History of discovery

Статьи по теме:

Playing audio and video files
The program to automate Beauty Shop - Business tool or waste of money?
Download Free Program is easy, but Nevygodno
Technology Platform 1C: Enterprise 8 - Areas Development
Preventive methods that reduce fatigue while working for a computer
1C Program Office Trade 8
Review of Windows Vista
Development of Software Development Projects
The funds protect your computer and maximum security
Threats to Security Modern Networks
The new search software
Concentrators Fast Ethernet NetGear
HISTORY OF BUILDERS
"Trojan horse"
Mobile Trade Optimum - Office Business Representatives
The structure of the PC
Microprocessors used in CompactPCI-systems
Odbc Firebird or may be still Ole Db driver?
The scheme of the free acceleration of Internet
COMPUTER CRIME PREVENTION
More Software to create an electronic catalog Szags
Gigabit Ethernet Technology
Tips software and programs connected branch
Legal and technical documents
The device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»
Make backup ropii professionally - Norton Ghost 14
Your teenager safely use the Internet?
Desperate to know if he lies or fake?
Checking Software Licensing
MAINTENANCE AND spread of computer viruses
Sugarcrm In Russia
Free Internet Or How to Become a Hacker
Why is cleaning Windows registry needed
Enabling Windows XP
Systemic and local bus
Components, Modules, mamboty in CMS Joomla
IBM sends framework ACTF donated Eclipse
Why work for a computer is harmful to human health
Repair permissions for sluggish computer
The reverse side of the coin Spyware
Determination of computers as an object of design
Availability of Linux: The importance of today's world
Integration modules PADS in the enterprise software environment
Switches NetGear
Backing up data. Should I pay?
Learn the truth about your child doing surfing habits
Netpromoter: New Opportunities Professional Web statistics
Robot Helps Salamandra Razgadyvat Riddles Evolution
Aptitude CompactPCI-products of rapid obsolescence
Potential voltage stabilizers for the protection of the personal computer
Mistakes Windows registry repair
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
Using Protection Agency to maintain the security Professional
The destruction of computer data
Technical approaches to increase the security of the computer