The Internet Archive has recently released The Malware Museum, a collection of old viruses and malware from the eighties and nineties.
→ https://archive.org/details/malwaremuseum
The idea behind the "museum" is to experience what it was like to have your computer infected with a virus, back in the day when there was no internet and hardly any anti-virus software available.
The malware on this site is usually so old you need to use an emulator (such as DOSBox) and has been stripped from all malicious code, leaving only the on-screen messages intact.
Our website has been moved to a new server to allow for a better and faster service.
Although everything has been tested thouroughly, please contact us (use the contact form) if you notice something's wrong.
After uninstalling Malwarebytes Anti-Malware from a domain-joined computer, you may get the following error each time the computer reboots:
To resolve the issue, you need to manually remove a registry key using regedit:
Remove the value with name Malwarebytes Anti-Malware.
You can disable the keyboard shortcuts, the so-called sticky keys, through a group policy. This is a user setting, and although there's no true policy for this, you can disable it through a group policy preference registry entry:
HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys\Flags="506"
Navigate to:
User Configuration → Preferences → Windows Settings → Registry
There, create a new entry:
You can quickly get a list of VMs, the datastores they are using and the logical folder they are in through PowerCLI:
Get-VM | Select Name,@{N="Datastore";E={[string]::Join(',',(Get-Datastore -Id $_.DatastoreIdList | Select -ExpandProperty Name))}},@{N="Folder";E={$_.Folder.Name}}
Combine it with Export-CSV to export the results to a CSV file.
« ‹ | December 2024 | › » | ||||
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 | 31 |