Computer Viruses And Guarding Against Them

In this modern Information Age, computers are necessities in life. Whether we use them for simple functions such as typing our homework and business reports, up to more important acts like online business meetings and transactions, one cannot deny that computers are a big part in our daily lives. Using a computer, particularly the Internet, is one task that even a ten year old can do at this particular period in time.

With the growing increase of popularity and reliance on computers, as well as the demand for it, security risks have also gone up, which is a reality that cannot be ignored. With the billions of information bits being spread across the World Wide Web, hackers and computer intruders (criminals) see the value in focusing their attention to computers and the Internet. The information they would retrieve here is (more often than not) more useful than when doing it the old-fashioned way.

As such, these intruders have devised some methods into getting information out of computer users, with or without these people knowing that they’ve been hacked into. As is the case in real life, there are some computer programs that are disguised to be innocent, but actually act as spies, providing information to the intruders. These malicious programs which are security threats are called computer viruses.

Computer viruses should not be taken lightly. They work in many different ways; one of them may be to provide data to the one who planted the virus. Other viruses can simply be annoying - slowing down your computer, building unwanted files, etc. – while some can be very disruptive, such as deleting your hard drive, compromising your operating system, etc.

As such, there are different types of viruses which normally differ in how they function and how they are spread. Examples of these include Trojan horses, worms, email viruses, and logic bombs. It would be important for you to know these kinds of viruses in order to better protect you from them, as well as to have the proper programs to get rid of them.

Trojan horses are simply computer program that cannot reproduce themselves, but can do damage anywhere from minimal to extremely dangerous. It usually disguises itself as a common file (maybe an .mp3 music file or a .jpeg picture file) but does the damage when the computer user opens it. This is why you should take extra care when opening a suspicious looking file – it could very well be a Trojan horse.

Worms are self reproducing programs that mainly use security holes in order to spread itself throughout the network. If your computer is infected with a worm and is able to replicate itself a number of times, this usually causes your computer to slow down noticeably since it uses your computer resources and memory to do so. They often use security flaws in operating systems (such as Windows) in order to self reproduce.

Email viruses are self explanatory – they spread via email. Once a user opens the infected email, what it usually does is send itself to other computer users via the email addresses found in the user’s address book. Because it uses email and a lot of people open emails without really checking or being careful, it spreads very quickly across the entire world and can cause chaos within just a few days.

Logic bombs are viruses that target specific computer applications, causing them to crash (for example, Windows). This can also be spread via email attachments or by innocently downloading it off the Internet. It can cause a great deal of harm (particularly if it infects Windows and the like), or just a small amount (small program).

Fortunately for computer users, there are anti-virus programs available anywhere, whether in the Internet or at the computer shop. These programs specifically target over thousands of viruses and wipe them clean from your system (if infected) or protect you from incoming attacks (if not yet infected).

Anti-virus programs are constantly updated (normally everyday) since there are always new virus definitions each day, and you can get infected by these new viruses. These software developers are always researching about the newest viruses to ensure you, the user, are protected from these viruses as much as possible. Your PC security and safety are always being considered.

http://www.freearticles.com

Types Of Blogs

* Political Blog: About the news, politics, activist, and all the issues-based blogs (like the campaign).

* Personal Blog: Also called an online diary which contained about someone everyday experiences,

complaints, poems or poetry, bad ideas, and conversations of friends.

* Stubs Blog: Blog which discusses about something, and focus on a particular discussion.


* Health Blog: More specific about health. Health blog mostly about the patients' complaints, the latest health news, information about health-ketarangan, etc..


* Blog of literature: Better known as litblog (Literary blog).


* Blog trip: Focus on the discussion of travel stories that tell the details about the trip / travel.


* Blog of research: The question of academic as the latest research news.


* Blog the law: The question of law or legal affairs; known as blawgs (Blog Laws).


* Blog the media: Focus on the discussion lies or ketidakkonsistensi mass media, usually only for a newspaper or television network.


* Blog of religion: To discuss about religion.


* Blog of education: Usually written by students or teachers.


* Blog of togetherness: more specific topics written by a particular group.


* Blog guide (directory): Contains hundreds of links pages.


* Blog business: Used by employees or entrepreneurs for their business promotion activities


* Blog embodiments: Focus on an object outside of human beings; like dogs.


* Blog bullies (spam): Used for business promotion affiliate, also known as splogs (Spam Blogs).

History Of The Internet And Internet Development


History of the intenet began in 1969 when the U.S. Department of Defense, U.S. Defense Advanced Research Projects Agency (DARPA) has decided to conduct research on how to connect a computer to form an organic network.

Meaning of The Internet


a.  The Internet is a network of computer circuits with a series of other computers around the world. The Internet is useful for us to communicate and exchange information, files, data, voice, image and so forth between the individual and mankind throughout the world.

b.  Every computer and network connected - directly or indirectly - to some of the main trail, called the internet backbone and are distinguished from one another using a unique name that is normal with 32-bit IP address. Contoh: 202.155.4.230 . Example: 202.155.4.230.

Mobile Intruding Water Tips


There is always a possibility of cell phone fell into the water accidentally, or soaking wet when you hit the rain. Though damaged electronic goods are particularly vulnerable if exposed to water. Before you rush to the repair technician, you should first try to save the cell phone. Who knew your cell phone recovered without the need to 'shop'. Consider the following tips, which quoted from wikiHow, Monday (03/03/2008).

* If your phone is submerged, remove the phone from the water as soon as possible to prevent the component parts of the contaminated water. In some cases, mobile phone casing it closely enough to prevent water seepage. But this will only last for a few tens of seconds.

* Immediately remove the battery from the phone. Cutting off the flow of resources is essential to minimize the possibility of damage to the phone. Several electronic circuits could otherwise survive in wet conditions, if not connected with resources.

* Immediately remove your SIM card as well to prevent possible damage or loss of data. You certainly do not want your phonebook or SMS importance vanished. Let your SIM card to dry completely before you check its condition.

* Dry the phone to dry completely. Use a cloth that can absorb water. If there is, use a hair dryer aka Hair Dryer. But be sure your phone should not be too hot. Do not also put it in the microwave. Phones that are too hot can explode reported.

* Test the condition of your phone after completely dry. If the phone error, please check whether your phone or battery is damaged, using a spare battery. If only the battery that is damaged, you simply buy a new one.

* If all these steps you have done but the phone remained undamaged, what may make, you seem to have to rely on mobile service technicians. But remember, you need to find a reliable cell phone technician. 

Source :  http://excell.xtgem.com/kemasukanair

The Story Of Blogger



 
Blogger or Blogspot what is now familiar among bloggers. This free blog service providers are large companies that compete with Wordpress so that practically a free blog provider of best-selling number one in the world. Here's the history of Bloggers :

Blogger is actually a blog publishing system (blog publishing system) that was originally created by Pyra Labs on August 23, 1999 and is a dedicated blog-publishing tool, which is applied first to help popularize the format.

In Februari2003, due to its popularity, eventually Pyra Labs was acquired by Google. This acquisition premium features previously memnyebabkan charge, then changed for free.

In 2004, Google introduced its new service "Picasa", ie an application for organizing and editing digital photos. This service then integrate with photo sharing utility Hello into Blogger, allowing a Blogger users to post their photographs made into a blog.

On May 9, 2004, "Blogger" redesign the main display, the various changes made in Blogger to add various features such as web standards-compliant templates, individual archive pages for posts, comments and posting menggunankan email.

On December 14 Agustus2006, "Blogger" launched the latest release in "beta" with code "Invader", together with the Gold release version. This makes the transfer of Blogger users to Google's servers and is accompanied with the addition of some "new features" in it.

In the month of December 2006, the latest version of Blogger is finally no longer in "beta" and the "month of May 2007", Blogger has completely moved to the Google servers.

Computer


A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.


Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs). Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space