SlideShare a Scribd company logo
1 of 9
Setup Setup has 5 PCs  in a Network. Only one PC connects to Internet. Others are simply a part of Network and access internet through Proxy Server. No PC has a right to access local media like CD/Floppy/USB drive etc. Problem If QH had been installed on the Server (Proxy Machine) it should ideally protect the whole setup. But it gets infected often. It seems that QH is not a complete product.
Reason Proxy passes packets directly to the Desktops without compiling the file at the server. Thus machines will directly get infected.  It needs QH on every machine .
Setup have a tight Policy. A UTM device which scans for Virus infection at the Internet and email gateway. No CD/Floppy/USB/Memory card are directly allowed inside the network. QH is installed on one PC and they are scanned over there before sending it to others. So, QH will not be required on the Desktop.
Reason No solution is 100%. The gateway solution will be passed say 8-10 times in a year. This can lead to infection internally. Gateway starts detecting the threat say after 6 hours, but it does not know of the infection inside. If Desktop QH is installed, it will detect it even after infection and help in restoring the systems to normal.
It is single Machine & gets infected regularly by viruses like Fun love etc. QH is installed on the machine but still I see that the machine gets infected. It seems that QH is not working properly.
Reason In most of such cases it is found to be a part of Cable Network or Internet connection with improper sharing on the machine. When it connects to the Internet it becomes the part of the network and hence some machine from the network attempts to infect the computer and QH keeps on blocking it.  Solution: Restrict sharing. Patch the Operating System. Turn Off “DISPLAY ALERT MESSAGE”.
Issue I know that in my Network there are many machines infected. I have put QH on one machine and it should be protected properly. But, it keeps on giving so many messages and it even hangs up. QH is not able to protect the system properly.
Explanation The attack is too severe. With multiple machine trying to attack the system it crosses it’s buffer limits and this can lead to the symptoms reported. A proper sharing rights on this machine can protect the system in such environment.
When I am attaching my USB to QH system, QH do not catch any virus. But when I attach same USB into other system, it gives a virus warning. QH is not catching virus.

More Related Content

What's hot

Enabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitEnabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitRavi Kumar Lanke
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crashShae
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slowcrissy
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusJames Smith
 
How to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacHow to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacPertino
 
How to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCAshok Albert
 
Basic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureBasic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureAbhishek Porwal
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.comcoseanonans
 
How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCAshok Albert
 

What's hot (12)

Enabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bitEnabling remote desktop connection on windows 7 64 bit
Enabling remote desktop connection on windows 7 64 bit
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slow
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virus
 
How to Enable Screen Sharing on Mac
How to Enable Screen Sharing on MacHow to Enable Screen Sharing on Mac
How to Enable Screen Sharing on Mac
 
How to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PC
 
Basic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital SignatureBasic Settings for Creating and Using a Digital Signature
Basic Settings for Creating and Using a Digital Signature
 
Error 0x800ccc0f
Error 0x800ccc0fError 0x800ccc0f
Error 0x800ccc0f
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.com
 
How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PC
 
Pat's Computers Acceptable Use Policy (1)
Pat's Computers Acceptable Use Policy (1)Pat's Computers Acceptable Use Policy (1)
Pat's Computers Acceptable Use Policy (1)
 
Malwarebytes Installation
Malwarebytes InstallationMalwarebytes Installation
Malwarebytes Installation
 

Viewers also liked

About Food Technical Consulting
About Food Technical ConsultingAbout Food Technical Consulting
About Food Technical ConsultingDarrel Suderman
 
กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์onionnui
 
Marketing budoucnosti? Online!
Marketing budoucnosti? Online!Marketing budoucnosti? Online!
Marketing budoucnosti? Online!marketupcz
 
Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Candace Newton
 
La història d'Internet
La història d'InternetLa història d'Internet
La història d'Internetnoemicamps
 

Viewers also liked (8)

Mergado představuje modul Image
Mergado představuje modul ImageMergado představuje modul Image
Mergado představuje modul Image
 
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
Digitálne chuťovky s ADMA 21.4.2016: Nové formáty na Facebooku a potenciál ic...
 
Facebook Ads
Facebook AdsFacebook Ads
Facebook Ads
 
About Food Technical Consulting
About Food Technical ConsultingAbout Food Technical Consulting
About Food Technical Consulting
 
กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์กาแฟสตาร์บัคส์
กาแฟสตาร์บัคส์
 
Marketing budoucnosti? Online!
Marketing budoucnosti? Online!Marketing budoucnosti? Online!
Marketing budoucnosti? Online!
 
Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013Facebook Ad Changes & Updates - 10 Sept 2013
Facebook Ad Changes & Updates - 10 Sept 2013
 
La història d'Internet
La història d'InternetLa història d'Internet
La història d'Internet
 

Similar to Magic questions

Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12AbdullahMunir32
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Nurse call software where and why
 Nurse call software where and why Nurse call software where and why
Nurse call software where and whyQBsoft Solutions
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdfgulshan16175gs
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart UtilitiesPasan Alagiyawanna
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 

Similar to Magic questions (20)

Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12Parallel and Distributed Computing Chapter 12
Parallel and Distributed Computing Chapter 12
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer virus
Computer virus Computer virus
Computer virus
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
Nurse call software where and why
 Nurse call software where and why Nurse call software where and why
Nurse call software where and why
 
Process and threads
Process and threadsProcess and threads
Process and threads
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
1. In OS, multiple jobs can run in parallel and finish faster than i.pdf
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart Utilities
 
Remote Login
Remote LoginRemote Login
Remote Login
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 

Recently uploaded

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Magic questions

  • 1. Setup Setup has 5 PCs in a Network. Only one PC connects to Internet. Others are simply a part of Network and access internet through Proxy Server. No PC has a right to access local media like CD/Floppy/USB drive etc. Problem If QH had been installed on the Server (Proxy Machine) it should ideally protect the whole setup. But it gets infected often. It seems that QH is not a complete product.
  • 2. Reason Proxy passes packets directly to the Desktops without compiling the file at the server. Thus machines will directly get infected. It needs QH on every machine .
  • 3. Setup have a tight Policy. A UTM device which scans for Virus infection at the Internet and email gateway. No CD/Floppy/USB/Memory card are directly allowed inside the network. QH is installed on one PC and they are scanned over there before sending it to others. So, QH will not be required on the Desktop.
  • 4. Reason No solution is 100%. The gateway solution will be passed say 8-10 times in a year. This can lead to infection internally. Gateway starts detecting the threat say after 6 hours, but it does not know of the infection inside. If Desktop QH is installed, it will detect it even after infection and help in restoring the systems to normal.
  • 5. It is single Machine & gets infected regularly by viruses like Fun love etc. QH is installed on the machine but still I see that the machine gets infected. It seems that QH is not working properly.
  • 6. Reason In most of such cases it is found to be a part of Cable Network or Internet connection with improper sharing on the machine. When it connects to the Internet it becomes the part of the network and hence some machine from the network attempts to infect the computer and QH keeps on blocking it. Solution: Restrict sharing. Patch the Operating System. Turn Off “DISPLAY ALERT MESSAGE”.
  • 7. Issue I know that in my Network there are many machines infected. I have put QH on one machine and it should be protected properly. But, it keeps on giving so many messages and it even hangs up. QH is not able to protect the system properly.
  • 8. Explanation The attack is too severe. With multiple machine trying to attack the system it crosses it’s buffer limits and this can lead to the symptoms reported. A proper sharing rights on this machine can protect the system in such environment.
  • 9. When I am attaching my USB to QH system, QH do not catch any virus. But when I attach same USB into other system, it gives a virus warning. QH is not catching virus.