ComputersOS

Latinism etc .: deciphering abbreviations

Practically in all modern languages of the peoples of the world, so-called Latinisms are used to define certain universal concepts, which are abbreviations of standard and most common terms. One such is cutting etc. Deciphering it is quite simple, however, since we are talking about computer technologies, we will consider it from this point of view. As examples we use Windows operating systems.

Abbreviation etc .: transcript in English in general sense

As many sources say, Latinism, etc., which we got from the "old Romans", is a derivative of the phrase et cetera, which in general terms means "and so on."

For the term etc. The decoding is always the same, but the Latin abbreviation can change. It is often possible to find a contraction of the contraction itself, when instead of etc. In the writing applies & c.

Abbreviation etc .: decoding with reference to computer technologies

As for this reduction with respect to modern computers, in its usual representation it is encountered because-to that extent.

However, in relation to the family of Windows operating systems for etc. The decryption is only that among the system components you can find the folder of the same name. All the components in it are more or less responsible for the network settings (this will be discussed below).

Where is the folder etc.?

The directory itself, depending on the version of the system, can be located at the System32 / etc or System32 / drivers / etc address of the Windows main directory on the system disk or partition. As a rule, by default it is a C drive, although when installing two or more OSs, virtual logical partitions can also be system.

In some modifications, you can find such a directory in the Windows / etc location, which is extremely rare and depends on the installation of some types of software. In addition, very often the directory itself can be hidden, and to display it you need to use the appropriate view settings, customizable in the usual "Explorer" or any other file manager.

What files are contained in the directory etc.?

Now the most important point. The folder etc must contain only five objects (files), no more or less:

  • Hosts;
  • Lmhosts.sam;
  • Networks;
  • Protocol;
  • Services.

If there is something else in this directory, it's safe to say that these are the consequences of virus infection by the system.

The main role among all the objects is assigned to the hosts file, which is a text document, although it does not have an extension. As a rule, it is hidden. You can see it in the same "Explorer" or in any other file manager under the condition of setting the appropriate view parameters, as mentioned above.

The text part itself is responsible for domain names and network addresses of the nodes used for translation. However, access to this file has a higher priority than requests addressed to DNS servers. Control over the change in the contents of a text object is carried out at the administrator level of the computer terminal. To open a file for viewing and editing it is possible in any text editor like the usual "Notepad", included in the standard set of any Windows-system.

It would be superfluous to say that many viruses use this particular file to restrict or block access to certain sites. Therefore, it is worth familiar with its original content.

Remember! The last line should contain only the local address and look like this:

# 127.0.0.1 localhost

In some cases, there may be two lines:

# 127.0.0.1 localhost

# :: 1 localhost

After them, there should not be any other records. If there are any, then most often these are local addresses of blocked resources. They should be deleted. But it turns out to be impossible, because most anti-virus programs, as well as the operating system itself, prohibit editing of this object. I'll have to disable the protection, create a new file, rename, then delete the old one, manipulate the associated objects, in particular with the lmhosts file, etc. In general, there is enough trouble.

The impact of viruses manifests itself in such a way that the original site or resource is blocked at the hosts file level, and the malicious program redirects the user to clone sites whose addresses and appearance may resemble popular social networks. There are often cases when such resources contain threats, but most often a redirect is produced on some pages with a huge amount of advertising goods and services that nobody wants. It is even possible to steal personal information that the user enters when entering the social network. And this is fraught with serious consequences for both the registered user and the Internet community. Who has not met in the "social networks" mass mailing spam? This is the simplest and most graphic example of how such viruses and codes work.

Instead of the total

Here in a nutshell and everything, as to the standard reduction etc. Deciphering it, as you can see, is quite simple. But this applies only to the commonly used concept. In the field of computer technology, such an interpretation is practically not used, because at the system level a slightly different meaning is embedded in it. Therefore, it is necessary to clearly delineate the common meaning and understanding of this Latinism in relation to IT technologies.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.