Professional Documents
Culture Documents
A
Practical File
On
Step 3: Understanding what the infected file does and how it affects the
network system is essential to clean the virus effectively. The system or file
could be infected with a virus, a Trojan or a keylogger--the most common types
of network threats. Configure the antivirus so it also scans hidden files, the root
directory, and running programs. Depending on the results, check the vendor's
website to know more about the threat the network is exposed to.
Counterstrike
Step 1: Back up all your system files and the registry using relevant tools.
Many infections spread to files vital for running the system, and cleaning or
deleting them might render your system unstable. With a Mac or a conventional
PC, backing up integral files ensures data isn't lost and the network remains
stable. The "system restore" option available in all modern versions of Windows
allows the administrator to set a restore point to which the operating system can
revert in emergencies.
Step 2: Quarantine all suspicious files. Options available in antivirus software
allow isolation of infected files and prevent all their exchanges from other files
or the system registry. By altering or faking registry entries of the operating
system, some network viruses can render themselves "invisible" to an antivirus
program. A scan of the registry and subsequent isolation can pinpoint these
particular problems.
Step 3: Disinfect or clean all quarantined files. Certain antiviruses also check
mailboxes for potentially dangerous emails. Once identified by the antivirus,
such emails should be cleaned or deleted manually.
2. Unable to Connect to the Internet
The Problem: The wireless network shows a signal, but my device won’t
connect
Using a wireless network is great for mobility, but can hinder your productivity
when it decides to malfunction. There are a few different reasons why your
wireless network is having connectivity issues, such as the wireless router or the
network card itself. This issue will require a bit of network troubleshooting to
find a solution, so let’s get to work:
Solution
Try disconnecting and reconnecting to the network
In most cases just a simple disconnect and reconnect might fix the issue. For
doing this you can turn off then on your WiFi or Airplane mode.
• You’ll see several options you can enable and disable for your adapter.
Untick the box that says Internet Protocol Version 6 (TCP/IPv6) to
disable IPv6. Then click on OK at the bottom.
The Problem: I got an error message that says that the IP address is
already in use.
• A small error window just popped up on your screen saying that your IP
address is already in use. How is this even possible and what causes this
IP address conflict? Well, there are a few reasons why this can happen:
• Your system administrator could have assigned two computers on a local
area network (LAN) the same static IP address.
• Your internet service provider accidentally assigned two people the same
IP address.
• The network’s Dynamic Host Configuration Protocol (DHCP) server has
allowed the same dynamic address to be assigned to multiple computers
automatically.
• Your system administrator has assigned a static IP address to a computer
within the local network’s DHCP range, and the same address is
automatically given by the local DHCP server
These are just a few of the plethora of reasons why IP address conflicts take
place. Here are some ways to fix this issue:
Solution
Restart your computer
Try restarting your computer. Sometimes machines simply get “stuck” and need
a reboot, and often that will solve this issue.
Release IP and get a new one
• Click Start and select Run.
• Type “cmd” in the box and click OK. A window with a command prompt
with an old-school DOS aesthetic appears.
• Type “ipconfig /release” and press Enter. This should release your
computer’s current IP addresses.
• Type “ipconfig /renew” and press Enter. This assigns your computer a
new set of IP addresses.
• Type Exit and press Enter to close that window.
change the TCP/IP settings. To enable your DHCP
Microsoft recommends using automated Dynamic Host Configuration Protocol
(DHCP), which automatically assigns IP addresses to your network’s
computers.to use this follow step
Modules Needed
• pyttsx3: It is a text-to-speech conversion library in Python. Unlike
alternative libraries, it works offline and is compatible with both Python 2
and 3. An application invokes the pyttsx3.init() factory function to get a
reference to a pyttsx3. Engine instance. It is a very easy to use tool which
converts the entered text into speech. It can be installed using the below
command:
• pip install pyttsx3
Below code snippet showcases the use of the above module:
# create object
engine = pyttsx3.init()
# assign voice
voices = engine.getProperty('voices')
#changing index changes voices but ony 0 and 1 are working here
engine.setProperty('voice', voices[1].id)
# run tool
engine.runAndWait()
print("")
• os: The OS module in python provides functions for interacting with the
operating system. OS, comes under Python’s standard utility modules.
This module provides a portable way of using operating system
dependent functionality.
# driver code
# introduction
print(" =============================================== Hello World!!
================================================")
engine.say('Hello World!!')
print("")
print(" My name is Divy Shah,I make this tool With this help of tool
you can open below things.......")
print("\n (YOU CAN USE NUMBER OR YOU CAN DO CHAT LIKE 'OPEN
NOTEBOOK' etc....)")
while True:
# take input
print(" CHAT WITH ME WITH YOUR REQUIREMENTS : ", end='')
p = input()
p = p.upper()
print(p)