Computer virus names  and definitions

Whether you’re on a Windows, Apple, or Linux computer, a desktop, laptop, smartphone, or tablet, you’re susceptible to ever-evolving cyber threats from computer viruses and other sorts of malware. it's always good to understand about malware and new threats.

Explained in a very smart way for you to know and you'll like it . This is the house for everybody who is curious about studying and becoming more conversant in computer viruses, whether you're an educator , student, engineer, or anyone else who shares a passion for Computer Viruses.

Who we are

Computer Malwares

Computer Virus,Tech Terms,Product of Day,Let us Talk,Blog

LastAgency brings together Malware definitions, technologies, and effect of Gadgets on life, that interest Students and IT professionals.

LastAgency provides the within of computer viruses, trojans, etc. You would like to follow hot topics on malware and newest viruses,

LastAgency is the destination for you for knowing complex computer malware. We aims to teach and promote awareness of varied viruses, offering free and straightforward access to information on these topics.


Stay Connected

One can escape coronavirus, if you use smart wifi bulbs where nobody has to touch switches

What is Smart LED Light?

A smart home requires Smart LED lighting that can elevate your room’s ambiance in a jiffy. LED smart bulbs are more energy-efficient than traditional incandescent bulbs. Smart lighting doesn’t mean your bulbs can solve your puzzle,  quiz, or answer a mathematical question. They are smart as they are no longer restricted to just on and off, controlled by the nearby switch. Now, you can change the color of the light, turn it on and off when you’re anywhere inside a home or outside anywhere in the world. You can set it to turn on a schedule, or turn off when you say the words “turn off the living room light” or can turn off all lights by the single command “Good Night”
tckin bulb

Smart WiFi Light Bulb with Soft White Light, TECKIN 16 Million RGB Color Changing LED Bulb That Work with Alexa, Google Home (No Hub Required), 7.5W (60w Equivalent),4 Pack.
Price $37.99.
Prime FREE One-Day & FREE Return

How Smart LED Light works?

The smart bulb connects directly to your Wi-Fi network which allows you to control them from your smartphonetablet, or gadgets like the Amazon Echo, Amazon dot, or Amazon Studio (Amazon’s Alexa voice assistant), Google Home (Google Assistant). You need to give voice instructions to act accordingly. Alternatively, you can use the relevant app in the smartphone to operate these LED Smart Lights. In most cases, the full spectrum of colors is available,
16 Million Colors and 1000 shades of warm to cool whites.
THE following LED smart bulbs, most popular, are wifi enabled and are competent with Alexa Voice assistance and Google voice .These Smart light bulbs work with Alexa and Google Home. Control your smart light bulb via voice commands to turn your smart bulbs on/off, adjust brightness, create schedules for on/off, create a group of different rooms, and more

Alexa Smart Light Bulb, RGB Color Changing LED Bulbs, Works with Alexa and Google Home, Dimmable A19 E26 Bulb 60 Watt Equivalent, No Hub Required, 2.4GHz WiFi (Pack of 2).


LOHAS Candelabra LED Bulb E12 Base Smart Bulbs, Dimmable Color Changing WiFi Lights, RGB &Daylight Warm White Ceiling Fan Light, 5W(40W Equivalent) 450LM Compatible with Alexa Google Home Siri, 2 Pack

What is Bar Code?

Barcodes make doing business more efficient for companies. Barcodes provide a way to track/trace store, information about goods, from individual items to large stocks of millions of items. They serve a crucial role and provide advantages over manually entering information.

A barcode essentially is a method to encode information in a visual pattern that a machine can read. Barcode is a machine-readable code number and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control. The combination of black and white bars (elements) represents different text characters following a set algorithm for that barcode type. If you change the sequence of elements you get the different text. A barcode scanner reads this pattern of black and white which is then turned into a line of text your computer can understand.

A barcode can hold any sort of text information you encode. Normally, with product labels, the price is not usually encoded. The barcode will denote what product it is and your POS software or database will have pricing information associated with this.

Type of Barcodes

 1D (linear,one dimensional) code is the typical vertical-style barcode that most people are familiar with. There are several versions of 1D codes and few encode only numbers while others can encode any keyboard character. All the information in the code is organized horizontally from left to right. These types of codes can be read by any type of barcode scanner.1D barcodes can have from 20-25 characters.

The first three digits of the merchandise barcode identify where the product was made. Let us understand what is the significance of digits read by the barcode reader.

EAN stands for European Article Number (manufacturing code ). EAN is a 13 digit barcode used on products to be sold outside the USA and is used internationally.  
UPC stands for Universal Product Code.UPC is a 12-digit bar code used extensively for retail packaging in the United States or Canada (00 to 13)
An item incorporating a barcode with prefix number ‘890’ signifies ownership by an Indian organization.
The first 3 digits are 690,691, to 695 then the product is Made in China.

2D barcodes are a little more complex as they organize information vertically and horizontally. This allows 2D codes to carry for much more information and take up less space than a 1D code. 2D codes require an imager scanner to be read properly.2D codes can have up to 2,000 characters.

Barcode 1

What is QR Code?

QR code, short for Quick Response, is a two-dimensional (2D) barcode, most of the time linked to a website (URL), and is readable by smartphones.  Every QR code consists of a variety of black squares and dots which represent certain pieces of information. The data in a QR code can be alphanumeric, numeric, binary or Kanji (Kanji is a form of Chinese characters that are used in the modern Japanese writing system)
The cell phone needs a QR code reader. It allows encoding more than 4000 characters in a two-dimensional barcode. QR code can store (and digitally present) far more data, including URL links, geo coordinates, and text. The other key feature of QR Codes is that instead of requiring a chunky hand-held scanner to scan them, many modern cell phones can scan them. “QR Code” is a registered trademark of DENSO WAVE INCORPORATED, created in 1994.
You can easily generate a QR code using one of the sites like content of a QR Code cannot be changed once generated. However, Dynamic QR Code is customizable. QR Code pointing to a static URL that hosts the actual content can be changed after the QR Code has been printed.

QR code doesn’t need to be standard black and white. Multiple colors can be embedded with a color gradient without affecting scanability. The only rule of thumb is that the code color should generally be dark and placed against a light-colored background. 

Significance of the first three digits in Bar Codes

GS1 is a non-profit organization that assigns unique numbers in barcodes.GS1 notes that “since GS1 member companies can manufacture products anywhere in the world, GS1 prefixes do not identify the country of origin for a given product. The first three digits of European Article Number (EAN) barcodes refer to the manufacturing code. Every country that uses the EAN system has its own numbering authority which is liable for assigning manufacturer codes for companies within its jurisdiction.

Assume, a company may have its headquarters in India. The EAN organization in India has the code “890”, but all the products of the company may be manufactured in Mexico. The Mexico-made products would still have the “890” prefix code.

A live example is my iPhone X which has bar code no 019 (EAN), which is of the USA, while it is manufactured in China.
 The first three digits of the product barcode may sometimes indicate where the product was manufactured, but it will not always do so. For example, a barcode that has 690 as the first three digits indicates that the barcode was assigned by the Chinese EAN numbering authority. However, it does not necessarily mean that the product was actually manufactured in China.

Credits-How To Make Your Own QR Code For Free by Tech Nerds

NADAMOO Wireless Barcode Scanner 328 Feet Transmission Distance USB Cordless 1D Laser Automatic Barcode Reader Handhold Bar Code Scanner with USB Receiver for Store, Supermarket,Warehouse
4.3 out of 5 stars  Amazon’sChoicefor “barcode printer with scanner
Save 5% with coupon
FREE Delivery

NADAMOO Wireless Barcode Scanner with USB Cradle Charging Base 328Ft Long Transmission Handheld 1D Cordless Laser Barcode Reader Portable Bar Code Scanning for Retail Supermaket Warehouse
3.9 out of 5 stars 125 $54.99

Wireless scanner that can transmit wirelessly or save to a USB device.

Barcode Scanner Wireless, Basecent USB Quick Laser Barcode Scanner Reader (Lector De Codigo De Barras), Handheld Barcode Reader Scanner for Library Book, Warehouse Inventory, Store by BASECENT,Amazon Choice
4.4 out of 5 stars 
$26.83  & FREE Returns

Tera Barcode Scanner Handheld [Upgraded Version] 6.6ft Extra Long USB Wired Bar Code Scanner Reader Laser 1D Barcode Reader Plug and Tera,
4.4 out of 5 stars
Amazon’s Choice
Price-$19.89 & Free Returns

Barcode Scanner, Inateck USB Barcode Scanner with Stand, 1D Wired, BCST-33
by Inateck
4.2 out of 5 stars 

Many people complain that their television or electronic appliance got “burnt” as the voltage shot up suddenly. By saying “burnt” they obviously don’t mean that it has burnt in flames, but they are referring to a very common phenomenon of an appliance becoming non-functional all of a sudden due to extreme fluctuation within the incoming voltage. When the voltage increases abruptly to a very high value for a very short span of time, it is referred to as voltage surges.
A power surge is a momentary boost in voltage ( electrical pressure) above the normal range. An oversupply of voltage from the power facility can last up to 50 microseconds. Normally surges are very short in duration, often reaches 6,000 volts and 3,000 amps once they reach the equipment. Power surges are a common cause of damage to refrigerators, air conditioners, computers, and electronic equipment. It is a very brief spike but it can still cause damage to your home and appliances.

What causes a power surge?

Power surges occur when something boosts the electrical charge at some point within the power lines. This causes a rise in the electrical potential energy, which may increase the current flowing to your wall outlet.

How to know if there is a power surge?

1. Smell the area around the power strip. Power surges can cause acrid, burnt odors resulting from the voltage spike shorting out electronics’ inner components
2. Locate the strip’s reset button. Following a surge, the button will switch into the reset position and can’t work until manually reset. If this is this happens the strip may have experienced a power surge.
3. If they are flashing, such as clock radios, there is a chance the power has experienced a surge.

What causes a power surge?

1. Switching on/off large home appliances. High-power electrical devices can create a spike in the electrical current when they’re switched on. Refrigerators, air conditioners can cause a power surge strong enough to damage electrical systems.
2. Faulty wiring may affect your home’s ability to withstand spikes.
3. Effects of harsh weather. Lightning strikes can cause power surges.
Play Video

Yellow Jacket 2884 12/3 Heavy-Duty 15-Amp SJTW Contractor Extension Cord with Lighted Ends, Ideal for Heavy Duty Equipment and Tools, Durable Clear Molded Plugs, High Gloss Yellow Jacket, 50-Feet

How to protect Home from a Power Surge?

There are different surge protectors on the market, and you should choose the one that fits your home’s needs. When you go for buying a surge protector, you will encounter two words, Joule ratings and Clamping Voltage (Let Through voltage)
1. Joule Rating is the capacity of the surge protector to absorb electrical spikes. For best protection, select a surge protector that lists “400 Joules” or higher which can provide surge protection for computers, peripherals, and household electronics. Always try to buy a surge protector with a high joule rating for better protection of appliances.
2. Clamping Voltage is the maximum voltage that the surge protector will allow to flow through it( standard voltage, maybe 240 or 110 depending on the country)before absorbing (or blocking or dissipating) the excess energy. 
3. Response time-The period of time between the instant the power surge starts and the instant the surge protector starts functioning is called the response time. It should be minimum, Best is 1 Nanosecond (one thousand-millionth of a second.).
Belkin surge protector

Belkin Essential Series Surge Protector Universal Socket is one of the best surge protectors. It is Universal Socket as it can fit plugs of Asia, US and others. It features a 420-joule surge protection rating and a maximum spike current of 13,000 amperes. This is a good product for those interested in surge protection. If you are using an inverter you will still require surge protection particularly when there is a change over from mains to inverter power and vice versa.

Siemens FS140 Whole House Surge Protection

Play Video

Clean a file VS Delete a file

Clean a file:
Removes the infection from the file but does not actually delete the file itself. This is the best option if you need to keep the file.

  • Automatically on, automatically connected
  • Easy setup for all your Apple devices
  • Quick access to Siri by saying “Hey Siri”
  • Double-tap to play or skip forward
  • Charges quickly in the case
  • Case can be charged using the Lightning connector

Delete a file:

Completely removes the file from the computer, which is useful if you don’t want it anymore. As with any deleted file, a file that your antivirus program deletes is no longer visible and can’t be used.

The EarPods with Lightning Connector also include a built-in remote that lets you adjust the volume, control the playback of music and video, and answer or end calls with a pinch of the cord

 4K X-Reality™ PRO

Broadband and Router

Computer Software

What is Stealth Virus

A stealth virus is a hidden computer virus that attacks operating system processes and averts typical anti-virus or anti-malware scans. Stealth viruses hide in files, partitions and boot sectors and are adept at deliberately avoiding detection.

These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

This virus is one of rare virus which is Resident,Boot Sector,File infector and sparse TYPE.

Effects of Stealth Viruses

On 22nd Sept of any year, if you get the message “FRODO LIVES” in large letters on the screen, surrounded by a moving pattern, your system is affected by FRODO STEALTH VIRUS.

On January 5 of any year, if the screen turns green and the text “TYPE HAPPY BIRTHDAY JOSHI” is displayed then your system is infected with JOSHI STEALTH VIRUS. The system will not respond until “HAPPY BIRTHDAY JOSHI” is typed.

How Stealth Viruses Infect Computers

kaspersky explains

A stealth virus can infect a computer system in a number of ways: For instance, when a user downloads a malicious email attachment; installs malware masquerading as programs from websites; or uses unverified software infected with malware. Similar to other viruses, it can take over a wide variety of system tasks and can affect the computer’s performance. When performing such tasks, antivirus programs detect the malware, but the stealth virus is designed to actively remain hidden from antivirus programs. It accomplishes this by temporarily moving itself away from the infected file and copying itself to another drive and replacing itself with a clean file. The stealth virus can also avoid detection by concealing the size of the file it has infected.

Protection from Stealth Virus

It is impossible to fully rid oneself of it once infected.You have to completely wipe the computer and rebuild it from scratch to fully eradicate the presence of a stealth virus.

Regularly-updated antivirus software can reduce risk, but antivirus software is also caught in an endless cycle of finding new threats and protecting against them.

Stealth virus eradication requires advanced anti-virus software or a clean system reboot.

Directory virus

What is Encrypted Virus

What is Companion Virus