Latinism etc .: decryption abbreviation

In almost all modern languages โ€‹โ€‹of the peoples of the world, the so-called Latinisms are used to define some universal concepts, which are abbreviations of standard and most common terms. One such is the abbreviation etc. Decoding it is quite simple, however, since we are talking about computer technology, we will consider it from this point of view. As examples, we use Windows operating systems.

Acronym etc .: decryption in English in a general sense

As many sources say, Latinism etc., inherited from the "old Roman", is derived from the phrase et cetera, which in the general sense means "and so on."

etc decryption

For the term etc. the decoding is always the same, but the Latin abbreviation may vary. You can often find a reduction in the reduction itself, when instead of etc. spelling uses & c.

Acronym etc .: decryption for computer technology

As for this reduction in relation to modern computers, in its usual representation it is encountered insofar as it is.

However, with respect to the Windows family of operating systems for etc. decryption consists only in the fact that among the system components you can find the folder of the same name. All components located in it, to one degree or another, are responsible for network settings (this will be discussed below).

Where is the folder etc. located?

The directory itself, depending on the version of the system, can be located at the address System32 / etc or System32 / drivers / etc of the main Windows directory on the system disk or partition. As a rule, this is the default drive C, although when installing two or more operating systems, virtual logical partitions can also be system.

windows etc

In some modifications, you can find such a directory in the Windows / etc location, which is extremely rare and depends on the installation of some types of software. In addition, very often the directory itself can be hidden, and to display it you need to use the appropriate view parameters that can be configured in the usual "Explorer" or any other file manager.

What files are contained in the etc. directory?

Now the most important point. The etc folder should contain only five objects (files), no more, no less:

  • hosts;
  • lmhosts.sam;
  • networks;
  • protocol;
  • services.

If there is anything else in this directory, it is safe to say that these are consequences of virus infection of the system.

etc decryption in english

The main role among all objects is assigned to the hosts file, which is a text document, although it does not have an extension. It is usually hidden. You can see it in the same "Explorer" or in any other file manager provided that you set the appropriate view parameters, as mentioned above.

The text part itself is responsible for the domain names and network addresses of the nodes used during translation. At the same time, access to this file has a higher priority than queries addressed to DNS servers. Control over the change in the contents of the text object is carried out at the administrator level of the computer terminal. You can open the file for viewing and editing in any text editor, like the usual Notepad, which is included in the standard set of any Windows system.

It will be useful to say that many viruses use this particular file to restrict or block access to certain sites. Therefore, it is worth familiarizing yourself with its original content.

system32 etc

Remember! The last line should contain only the local address and look like this:

# 127.0.0.1 localhost

In some cases, two lines may be contained:

# 127.0.0.1 localhost

# :: 1 localhost

After them, there should not be any other entries. If they are still present, most often these are local addresses of blocked resources. They should be deleted. But this is not possible, since most anti-virus programs, as well as the operating system itself, prohibit editing this object. You have to turn off protection, create a new file, rename, then delete the old one, manipulate related objects, in particular the lmhosts file, etc. In general, there is enough trouble.

The effect of viruses manifests itself in such a way that the original site or resource is blocked at the hosts file level, and the malware redirects the user to clone sites, whose addresses and appearance may somewhat resemble popular social networks. There are frequent cases when such resources contain threats, but most often a redirect is made to some pages with a huge amount of advertising of goods and useless services. Moreover, it is even possible to steal personal information that the user enters when entering the social network. And this is already fraught with serious consequences for both the registered user and the Internet community. Who has not met mass spam in social networks? This is the simplest and most obvious example of how such viruses and codes work.

Instead of a total

Here in a nutshell, and everything related to the generally accepted abbreviation etc. Deciphering it, as we see, is quite simple. But this applies only to the commonly used concept. In the field of computer technology, such an interpretation is practically not used, since at the system level a slightly different meaning is invested in it. Therefore, it is necessary to clearly distinguish between the common sense and understanding of this Latinism in relation to IT-technologies.

Source: https://habr.com/ru/post/C15217/


All Articles