SlideShare a Scribd company logo
1 of 9
Setup Setup has 5 PCs  in a Network. Only one PC connects to Internet. Others are simply a part of Network and access internet through Proxy Server. No PC has a right to access local media like CD/Floppy/USB drive etc. Problem If QH had been installed on the Server (Proxy Machine) it should ideally protect the whole setup. But it gets infected often. It seems that QH is not a complete product.
Reason Proxy passes packets directly to the Desktops without compiling the file at the server. Thus machines will directly get infected.  It needs QH on every machine .
Setup have a tight Policy. A UTM device which scans for Virus infection at the Internet and email gateway. No CD/Floppy/USB/Memory card are directly allowed inside the network. QH is installed on one PC and they are scanned over there before sending it to others. So, QH will not be required on the Desktop.
Reason No solution is 100%. The gateway solution will be passed say 8-10 times in a year. This can lead to infection internally. Gateway starts detecting the threat say after 6 hours, but it does not know of the infection inside. If Desktop QH is installed, it will detect it even after infection and help in restoring the systems to normal.
It is single Machine & gets infected regularly by viruses like Fun love etc. QH is installed on the machine but still I see that the machine gets infected. It seems that QH is not working properly.
Reason In most of such cases it is found to be a part of Cable Network or Internet connection with improper sharing on the machine. When it connects to the Internet it becomes the part of the network and hence some machine from the network attempts to infect the computer and QH keeps on blocking it.  Solution: Restrict sharing. Patch the Operating System. Turn Off “DISPLAY ALERT MESSAGE”.
Issue I know that in my Network there are many machines infected. I have put QH on one machine and it should be protected properly. But, it keeps on giving so many messages and it even hangs up. QH is not able to protect the system properly.
Explanation The attack is too severe. With multiple machine trying to attack the system it crosses it’s buffer limits and this can lead to the symptoms reported. A proper sharing rights on this machine can protect the system in such environment.
When I am attaching my USB to QH system, QH do not catch any virus. But when I attach same USB into other system, it gives a virus warning. QH is not catching virus.

More Related Content

What's hot

Enabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitEnabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitRavi Kumar Lanke
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crashShae
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slowcrissy
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusJames Smith
 
How to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacHow to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacPertino
 
How to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCAshok Albert
 
Basic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureBasic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureAbhishek Porwal
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.comcoseanonans
 
How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCAshok Albert
 

What's hot (12)

Enabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitEnabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bit
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slow
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virus
 
How to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacHow to Enable Screen Sharing on Mac
How to Enable Screen Sharing on Mac
 
How to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PC
 
Basic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureBasic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital Signature
 
Error 0x800ccc0f
Error 0x800ccc0fError 0x800ccc0f
Error 0x800ccc0f
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.com
 
How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PC
 
Pat's Computers Acceptable Use Policy (1)
Pat's Computers Acceptable Use Policy (1)Pat's Computers Acceptable Use Policy (1)
Pat's Computers Acceptable Use Policy (1)
 
Malwarebytes Installation
Malwarebytes InstallationMalwarebytes Installation
Malwarebytes Installation
 

Viewers also liked

About Food Technical Consulting
About Food Technical ConsultingAbout Food Technical Consulting
About Food Technical ConsultingDarrel Suderman
 
กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์onionnui
 
Marketing budoucnosti? Online!
Marketing budoucnosti? Online!Marketing budoucnosti? Online!
Marketing budoucnosti? Online!marketupcz
 
Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Candace Newton
 
La història d'Internet
La història d'InternetLa història d'Internet
La història d'Internetnoemicamps
 

Viewers also liked (8)

Mergado představuje modul Image
Mergado představuje modul ImageMergado představuje modul Image
Mergado představuje modul Image
 
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
 
Facebook Ads
Facebook AdsFacebook Ads
Facebook Ads
 
About Food Technical Consulting
About Food Technical ConsultingAbout Food Technical Consulting
About Food Technical Consulting
 
กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์
 
Marketing budoucnosti? Online!
Marketing budoucnosti? Online!Marketing budoucnosti? Online!
Marketing budoucnosti? Online!
 
Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013
 
La història d'Internet
La història d'InternetLa història d'Internet
La història d'Internet
 

Similar to Magic questions

Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12AbdullahMunir32
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Nurse call software where and why
 Nurse call software where and why Nurse call software where and why
Nurse call software where and whyQBsoft Solutions
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdfgulshan16175gs
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart UtilitiesPasan Alagiyawanna
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 

Similar to Magic questions (20)

Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer virus
Computer virus Computer virus
Computer virus
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
Nurse call software where and why
 Nurse call software where and why Nurse call software where and why
Nurse call software where and why
 
Process and threads
Process and threadsProcess and threads
Process and threads
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart Utilities
 
Remote Login
Remote LoginRemote Login
Remote Login
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Magic questions

  • 1. Setup Setup has 5 PCs in a Network. Only one PC connects to Internet. Others are simply a part of Network and access internet through Proxy Server. No PC has a right to access local media like CD/Floppy/USB drive etc. Problem If QH had been installed on the Server (Proxy Machine) it should ideally protect the whole setup. But it gets infected often. It seems that QH is not a complete product.
  • 2. Reason Proxy passes packets directly to the Desktops without compiling the file at the server. Thus machines will directly get infected. It needs QH on every machine .
  • 3. Setup have a tight Policy. A UTM device which scans for Virus infection at the Internet and email gateway. No CD/Floppy/USB/Memory card are directly allowed inside the network. QH is installed on one PC and they are scanned over there before sending it to others. So, QH will not be required on the Desktop.
  • 4. Reason No solution is 100%. The gateway solution will be passed say 8-10 times in a year. This can lead to infection internally. Gateway starts detecting the threat say after 6 hours, but it does not know of the infection inside. If Desktop QH is installed, it will detect it even after infection and help in restoring the systems to normal.
  • 5. It is single Machine & gets infected regularly by viruses like Fun love etc. QH is installed on the machine but still I see that the machine gets infected. It seems that QH is not working properly.
  • 6. Reason In most of such cases it is found to be a part of Cable Network or Internet connection with improper sharing on the machine. When it connects to the Internet it becomes the part of the network and hence some machine from the network attempts to infect the computer and QH keeps on blocking it. Solution: Restrict sharing. Patch the Operating System. Turn Off “DISPLAY ALERT MESSAGE”.
  • 7. Issue I know that in my Network there are many machines infected. I have put QH on one machine and it should be protected properly. But, it keeps on giving so many messages and it even hangs up. QH is not able to protect the system properly.
  • 8. Explanation The attack is too severe. With multiple machine trying to attack the system it crosses it’s buffer limits and this can lead to the symptoms reported. A proper sharing rights on this machine can protect the system in such environment.
  • 9. When I am attaching my USB to QH system, QH do not catch any virus. But when I attach same USB into other system, it gives a virus warning. QH is not catching virus.