Wednesday, March 22, 2017
Tuesday, March 21, 2017
Friday, March 10, 2017
Tuesday, March 7, 2017
Monday, March 6, 2017
Wednesday, February 1, 2017
Successfully Burning Belly Fat
Dear Friend,
Are you still buying into the myth that you’re “too old” to get a flat tummy?
Or that a skinny waistline is only available to movie stars, supermodels, celebrities and the ultra-rich who can afford expensive personal trainers?
Or the only way to shrink your belly after a “certain age” is through costly and risky surgical procedures, such as tummy tucks?
Or that having a big belly is an inevitable part of aging, and there’s nothing you can do about it?
Or that it’s “too late” for you to slim your waistline and look fabulous in a bikini?
The certified personal trainer, nutritionist, author and founder of the most effective and safe method to burn belly fat and look 10 pounds leaner in only 10 short days!
Sure, it would be easy for me to tell you those ridiculous myths are dangerously wrong and keeping you trapped in an overweight body you hate….
But I want to do something better than that.
I want to show you right here and now that all those outdated myths are total nonsense.
So… I’m doing something incredible and maybe a little crazy…
I want to show you that my amazing fat-burning program works better, faster and more effectively than any other weight loss program out there… no matter if you’re 35, 55, or even if you’re 75…
…by giving you my ‘Flat Belly Fast’ DVD and other fat-burning goodies for totally free!
Monday, January 30, 2017
The Fat Burning Kitchen
Here's Your Simple Fat Loss Solution...
I'm going to show you that eating for permanent fat loss and prevention of terrible diseases like diabetes, heart disease or cancer does NOT have to be complicated.
In fact, if you choose the RIGHT foods, and understand how these foods react with your body, this method is a way for you to automatically attain the right calorie level without the need to EVER count calories again.
That's why I've teamed up with expert nutrition researcher, Catherine Ebeling, and we've co-authored this new program for you:
Click Here!
Sunday, January 29, 2017
Drag and Drop Software Creates All Your Landing Pages
All-in-one Plugin Lets You Create High Converting, Profit-pulling Pages In Just Minutes! ...and Our State-of-the-art, Drag-and-drop Technology Lets You Do Just That!
- Drag-n-Drop Page Builder
- Mobile/Tablet Responsive
- 100+ Done For You Templates
- 2 & 3 Step Opt-in Technology
- Built-In Image Editor
- One-Click HTML Converter
- Export & Import
- Welcome Gate
- Split Testing
- Advance Analytics
- Scarcity Builder
- and much much more....
Reverse Phone Lookup, Phonedetective.com, 75% + Trial Bounty
Most Lucrative People Search Products On CB For 3+ Years In Reverse Phone - People Search - Email Search - Public Records - Criminal Records. Best Data, Conversions, And Customer Support Team. Click Here!
Computer Terms and Definitions
Computer : A computer is a computing device that is similar to an automated abacus that can execute a program, that is, a sequence of automatic instructions.
Program : A program is a is an executable software that runs on a computer. It contains compiled codes that run directly from the computer's operating system.
Operating System : The operating system (OS) is the software that communicates with the computer hardware on the primary level. No software can be run on the computer without the operating system. It serves as a user interface and helps allocating memory, processes tasks, accesses disks and peripheral.
Command : A command is a series of step by step instructions that helps the computer perform a specific action.
Command : A command is a series of step by step instructions that helps the computer perform a specific action.
CPU : The central processing unit or CPU, also known as the microprocessor or processor is the brain of the computer. It helps execute instructions in a software program and helps retrieve instructions form the computer's memory, comprehending and executing instructions and helping direct the input and output of the computer.
Desktop : The computer monitor or the screen of the computer against which, the operating system and access application programs, files and documents are displayed is called the desktop.
File : The file is a unit for information storage that includes word-processor, spreadsheet, pictures, music, etc. Each file is differentiated with the help of a unique file name.
Folder : The folder is a unique system that helps in organizing the files, topics, programs and projects on the computer. The similar applications in a folder will be grouped together when an application program is loaded. It is similar to organizing files on a shelf in your cabinet.
Hard Drive : The hard drive is the region where the information is stored and helps the computer to permanently retain and store the data.
Hardware : The computer system that comprises of a computer, that is, monitor, keyboard, mouse, printer, computer unit, scanner, etc. is known as the hardware. When the CPU is opened, the components that make a CPU are also the hardware. You can read and learn more on computer hardware basic information.
Hyperlink : An hyperlink is a program that helps one move from one web page to another. The text is underlined and the cursor that moves over this text document, takes the shape of a hand. This means there is a hyperlink added to the text and you can click on it to move over to another page or document.
Internet : The Internet is a world wide network that helps connect millions of users around the world to share and exchange data, information, opinions, etc. The Internet is not similar to World Wide Web (WWW). The WWW is a service that is provided on the Internet for the users.
Monitor : The computer monitor is defined as the computer screen or display unit. The monitor helps in displaying the user interface and programs. It is a way for the user to interact with the computer, using the keyboard and mouse.
Mouse : Do not be baffled, a computer mouse is a hand held device that helps the user move across the flat surface and help control the pointer on the screen. It is a very accessible device, as it helps one move faster across the screen and perform many tasks quickly.
Keyboard : The computer keyboard is the peripheral unit of the computer that helps in typing in the words and numbers along with the symbols and thus communicate with computer. In other words, it is the way, how you can feed in information that needs to processed into your computer. You can read more on computer keyboard shortcuts.
RAM : Random Access Memory or RAM is the temporary storage space in the computer that helps place information so that is can execute the program and instructions given. Once a program is closed, the data is removed from RAM. The amount of RAM helps in determining the number of programs that can be run.
Browser : The web browser is an application that helps render the source code of World Wide Web or web pages that can be used by the user. The information is rendered in understandable form for the user by the browser. The Microsoft Internet Explorer is an example of the browser.
Peripherals : The peripherals are the input devices that are connected to the machines. The keyboard, mouse and printer are computer peripherals. Some peripherals are important for the working of the machine and some are added components, without which one can work on the computer.
Networks : The network is a physical or logical construction that connects different computers together and helps them communicate. The computer networking is carried out through cabling or through wireless networking. The best example is the Internet that helps sites to connect on different computers.
Software : The instructions that are provided to the computer with step-by-step actions that help executing a specific task is a software. A computer cannot function without a software.
Computer Hacking
Computer hacking is both an art and science, for the people who try to break into protected or unprotected networks. Art, because it involves creativity which is equivalent to the painting of a beautiful landscape, and science because of its technical aspects. People practicing unethical hacking, generally tend to steal personal information, change a corporation's financial data, break security codes to gain unauthorized network access, or conduct other destructive activities. There are two kinds of people who indulge in computer hacking, namely those who develop an interest in computer hacking out of simple intellectual curiosity, and others with less noble motives. But the common traits amongst all hackers is that they possess technological savvy, are willing to take the risks and are passionate about various
Computer hacking invariably involves some degree of infringement on the privacy of others, breaching the network security, and thus causing damage to confidential files, web pages or software. It may also involve downloading or alteration of files through unauthorized access, and the impact resulting from such activities will vary from being simply inquisitive to being illegal. However, many big shot companies often hire a team of hackers, in order to probe into their own loopholes. These individuals use their skills to find flaws in the company's security system, and to prevent them from getting discovered by unethical hackers. In most cases, ethical hacking helps to prevent identity theft and other serious computer-related crimes.
Computer hacking invariably involves some degree of infringement on the privacy of others, breaching the network security, and thus causing damage to confidential files, web pages or software. It may also involve downloading or alteration of files through unauthorized access, and the impact resulting from such activities will vary from being simply inquisitive to being illegal. However, many big shot companies often hire a team of hackers, in order to probe into their own loopholes. These individuals use their skills to find flaws in the company's security system, and to prevent them from getting discovered by unethical hackers. In most cases, ethical hacking helps to prevent identity theft and other serious computer-related crimes.
Depending on the domain of their work, there are basically three types of hackers. A white hat hacker is the one who breaks security for non-malicious purposes. These purposes may range from testing the security system, to finding the major loopholes in the network. Such people normally follow the legitimate ways and work within the precincts of cyber laws. The second category includes the black hat hackers, who generally subvert computer security without authorization, with the help of viruses and various other hacking tools. These hackers use technology for vandalism, credit card fraud or identity theft. The third category includes grey hat hackers, whose domain of work lies mid-way between black hat and white hat hackers. They are of ambiguous ethics and work on the borderline of legality.
The best way to learn computer hacking is to master programming languages like Python, C/C++, Java, Perl, and LISP because these particular languages teach the programmer a very different approach towards problem solving and algorithms. This in turn provides a stronger hold on the machine and its components. However, it is not possible to reach the skill level of a hacker, just by accumulating various languages in the knowledge box. It is important to learn the algorithms and working of computers in general. It is also necessary to gain knowledge about the operating system and the various important files which are used by it.
Computer hacking is an interesting way to discover the myriad latent aspects of the wonderful world of computers. The more one tries to learn about it, the more one gets inquisitive about the different domains he can probe into. However, one should always try to understand and follow cyber laws, before trying out one's hand at computer hacking.
Thursday, January 12, 2017
Thursday, November 4, 2010
Top Computers for College Students
These were the tips on selecting the best computers for college students. The above configurations were minimum that should be present, because as time passes by more advanced features will be added to laptops or desktops. So, it is wise that you select a product which is loaded with some extra features, so that you don't have to replace the old laptop or desktop within a short period of time.
Dell Studio 15: This is one of the most practical and best laptops for students, as it has got it all. It comes for a price of USD 900. It looks good, has a Core 2 Duo processor, in built 2 mega pixel camera, decent battery life, and a good sound system.
Sony VAIO VGN-FZ280E: It is thin and light, has a Blu-ray compatible writer, Core 2 Duo processor, 2GB RAM, and a large 250 GB hard drive.Dell Studio 15: This is one of the most practical and best laptops for students, as it has got it all. It comes for a price of USD 900. It looks good, has a Core 2 Duo processor, in built 2 mega pixel camera, decent battery life, and a good sound system.
Apple MacBook: The Macbook is a very good looking laptop, and the prices of this laptop starts at USD 1299. It has a Core 2 Duo processor, 2GB RAM, and a 160GB hard disk capacity, which also includes nVidia GeForce 9400M graphics card and a 13 inch display.
Assembled Desktop PC: If you are thinking of buying a desktop PC, then assembling a computer is the best deal for you, as you can pick the individual features you need installed in the machine. Make a list of the must have configurations and other requirement like WiFi, extra USB sockets, extra large hard disk, etc. Talk to a couple of computer stores who assemble desktops, and get an estimate.
Dell XPS One: If you don't want to go for an assembled computer then consider this desktop. Dell XPS One comes with a large 20" high definition wide screen monitor. It has a Core 2 Duo processor, 320 GB hard disk and an ATI Radeon graphics card, with a DVD-RW or Blu-ray optical drive.
iMac: Another good choice of desktop computer is the iMac, which comes with a screen of 20 to 24 inches high resolution monitor. It has a sleek design, and a Core Duo 2 processor up to 3GHz along with nVidia or ATI Radeon graphics card.
This were tips on selecting the best computers for college students. So, select any of the above models which suits your budget, and meet the configuration requirements of a computer that you want.
This were tips on selecting the best computers for college students. So, select any of the above models which suits your budget, and meet the configuration requirements of a computer that you want.
Tuesday, November 2, 2010
General Tips on Buying a Home Computer
Here is some technical information that can be a helpful guide to buying a home computer.
· There are various operating systems, such as the Windows Vista and Windows XP Media Center Edition 2005, which allows a user to avail the facilities of a television through a computer.
· The processor could be a Celeron or a Sempron, if you want to purchase one at an affordable price, or you could want a high-end one, like the 64-bit Pentium 4 or Athlon CPU.
· The memory should be selected according to the operating system; hence, faster the hertz of the memory, better the performance. So, why not go in for a 1 GB of RAM with the Windows XP home operating system.
· The hard drive should have at least 60 GB or more memory, as there are more downloads in a house computer.
· You can choose a CD-RW drive with a DVD writer which is able to burn most things onto your disks and choose a dedicated graphics board after considering your needs.
· For the computer monitor, you can go in for a LCD or a flat panel, which might be expensive but takes less space, or you could even go for a cost-effective option like a 17-inch CRT, which comes for $50.
· There are new desktops made especially for home users that come with a modem and a network interface or even both together, or you can opt for a broadband connection.
· You can also pick accessories, such as a headphone and a microphone with an easy to connect jack.
· Make sure of the amount of memory, PCI slots and drive bays available for upgrades.
· Additional software is provided for home users with the purchase of computers.
Some More Tips
Buying a home computer is expensive, so you should make sure that you are getting your money's worth. Always check the different kinds of warranty that they offer and choose the one that is the longest. Make sure that you are aware of how to use the computer, before you purchase one.
Buying a home computer is expensive, so you should make sure that you are getting your money's worth. Always check the different kinds of warranty that they offer and choose the one that is the longest. Make sure that you are aware of how to use the computer, before you purchase one.
If you decide upon the use of the computer, then it will be easier to determine the minimum requirements. Inquire about the helpline and technical support that the dealer offers and also check on the quality by reading reports and other publications. A salesman will always try to charge the highest selling price, if the customer is not knowledgeable about the product. So, make sure that you are aware of the inventory of the accessories that come with the computer. Now, the process of buying a computer for your home use will not be as difficult, with these tips on buying a home computer available to you.
Thursday, October 28, 2010
Different types of Computers
Following are some important types of computers.
Analog Computers: These are almost extinct today. These are different from a digital computer because an analog computer can perform several mathematical operations simultaneously. It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy.
Hybrid Computers: These computers are a combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversion of analog signals to digital ones.
Mainframe Computers: Large organizations use mainframes for highly critical applications such as bulk data processing and ERP. Most of the mainframe computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can thus substitute for several small servers.
Microcomputers: A computer with a microprocessor and its central processing unit is known as a microcomputer. They do not occupy space as much as mainframes. When supplemented with a keyboard and a mouse, microcomputers can be called as personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and serve as the best choices for single-user tasks.
Microcomputers: A computer with a microprocessor and its central processing unit is known as a microcomputer. They do not occupy space as much as mainframes. When supplemented with a keyboard and a mouse, microcomputers can be called as personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and serve as the best choices for single-user tasks.
Desktops: A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relative lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in workplaces and households.
Laptops: Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries. They are enabled with an inbuilt keyboard, touch pad acting as a mouse and a liquid crystal display. Its portability and capacity to operate on battery power have served as a boon for mobile users.
Personal Digital Assistants (PDAs): It is a handheld computer and popularly known as a palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be effectively used as portable audio players, web browsers and smart phones. Most of them can access the Internet by means of Bluetooth or Wi-Fi communication.
Minicomputers: In terms of size and processing capacity, minicomputers lie in between mainframes and microcomputers. Minicomputers are also called mid-range systems or workstations. The term began to be popularly used in the 1960s to refer to relatively smaller third generation computers. They took up the space that would be needed for a refrigerator or two and used transistor and core memory technologies. The 12-bit PDP-8 minicomputer of the Digital Equipment Corporation was the first successful minicomputer.
Supercomputers: The highly calculation-intensive tasks can be effectively performed by means of supercomputers. Quantum physics, mechanics, weather forecasting, molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-designed memory hierarchy give the supercomputers, large transaction processing powers.
Wearable Computers: A record-setting step in the evolution of computers was the creation of wearable computers. These computers can be worn on the body and are often used in the study of behavior modeling and human health. Military and health professionals have incorporated wearable computers into their daily routine, as a part of such studies. When the users' hands and sensory organs are engaged in other activities, wearable computers are of great help in tracking human actions. Wearable computers are consistently in operation as they do not have to be turned on and off and are constantly interacting with the user.
These were some of the different types of computers available today.
Friday, October 22, 2010
CRT Monitor vs LCD Monitor
There are hosts of differences between LCD and CRT monitors with regards to various features and specifications. Know what differentiates these two major monitor technologies.
CRT monitor LCD monitor
LCD monitors win over CRT monitors when it comes to physical size. LCD monitors are small, light and require less space. CRT monitors, on the other hand, are big, bulky, heavy and acquire large spaces. LCD monitors can be easily maneuvered between computers, if due to any reason you change monitors. CRT monitors are incompatible for small desks and small places.
CRT monitors are also not easily portable. On an average, a 17 inch CRT monitor weighs around 40 pound and a similar LCD monitor would weigh close to 15 pounds. When it comes to size, the viewable area on a monitor matters. A 17 inch CRT monitor will provide a viewable area of around 16.1 inches whereas a 17 inch LCD monitor will provide complete viewable area, that is 17 inches.
Picture Quality
Picture Quality
In general, picture quality in both the CRT and LCD monitors differs slightly. New models of both monitors provide good color display. LCDs lag behind in providing a maximum range of color displays unlike CRT monitors. In terms of sharpness, an LCD running at its native resolution or fixed resolution is better than a CRT monitor that can give unclear edges.
Viewing Angle
CRT monitors can be viewed from any angle while LCD monitors can show different views depending on your angle of viewing. At some angles, the picture may be blurred, faded and unclear in LCD monitors.
Price
LCDs are long term investments and profitable one, though expensive. In the recent years prices of both these monitors have gone down and they're well within the reach of consumers. Since LCD monitors have captured mainstream market of computer monitors, the production of CRT monitors has gone down, drastically.
Power Consumption
LCDs are long term investments and profitable one, though expensive. In the recent years prices of both these monitors have gone down and they're well within the reach of consumers. Since LCD monitors have captured mainstream market of computer monitors, the production of CRT monitors has gone down, drastically.
Power Consumption
CRT monitor power consumption rate is much higher than LCD power consumption rate and this is one of the major CRT monitor problems in the long run.
Wednesday, October 20, 2010
How to Check RAM on Windows XP
Users of Windows XP have many ways that they can use to check the RAM on their machines. Computer manufacturers have made this a highly simple task so that everyone knows how to check RAM speed as and when they please. This makes a lot of future installations and purchases simpler. Here are 3 ways of how to check RAM on Windows XP.
· Click on the 'Start' menu and wait for the Start menu window to pop up. Right click on 'My Computer', and then click on 'Properties'. Choose the tab that says 'General'. You will be able to view the RAM on your computer here.
· Click on the 'Start' menu and then select the 'Run' option. In the dialog box that opens, type in 'DXDIAG' and then press enter. Your system configuration will open up in the subsequent window that comes.
· The 3rd option for you is to follow this trail of instructions. Click on 'Start' menu, go to 'Programs', go to 'Accessories', go to 'System Tools', and then go to 'System Information'. You can also view your computers RAM and configuration from here.
How to Check RAM on Vista
How to check RAM on Vista is not very different either. You can follow the same methods of clicking on 'Start' tab and then either selecting 'Run' and entering 'DXDIAG' and hitting enter, or you can right click on 'My Computer' and select 'Properties' and then choose the 'General' tab to view your computers configuration. Another path for you to follow is select the 'Start' orb, then go to 'Control Panel' and select 'System Maintenance' in the Classic View. Now select 'System' and then check the system category to view the information about your computers configuration.
How to Check RAM on Mac
People using Apple Macintosh computers also wish to check their RAM for the same purposes. The method is primarily the same, but the options and the items to select are obviously different. Try out this method on how to check RAM on Mac.
· Click on the 'Apple' menu, and then select one of 'About This Macintosh' or 'About This Computer'. Now you need to select the 'More Info' button to get more information and to get what is known as the System Profiler screen. In the subsequent screen that opens you have to search for the 'Hardware' option on the left column and then select the 'Memory' tab. You will now be able to view details about your systems configuration and see how much RAM you have.
Monday, October 18, 2010
Different types of Computers
Following are some important types of computers.
Analog Computers: These are almost extinct today. These are different from a digital computer because an analog computer can perform several mathematical operations simultaneously. It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy.
Hybrid Computers: These computers are a combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversion of analog signals to digital ones.
Analog Computers: These are almost extinct today. These are different from a digital computer because an analog computer can perform several mathematical operations simultaneously. It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy.
Hybrid Computers: These computers are a combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversion of analog signals to digital ones.
Mainframe Computers: Large organizations use mainframes for highly critical applications such as bulk data processing and ERP. Most of the mainframe computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can thus substitute for several small servers.
Microcomputers: A computer with a microprocessor and its central processing unit is known as a microcomputer. They do not occupy space as much as mainframes. When supplemented with a keyboard and a mouse, microcomputers can be called as personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and serve as the best choices for single-user tasks.
Microcomputers: A computer with a microprocessor and its central processing unit is known as a microcomputer. They do not occupy space as much as mainframes. When supplemented with a keyboard and a mouse, microcomputers can be called as personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and serve as the best choices for single-user tasks.
Desktops: A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relative lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in workplaces and households.
Laptops: Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries. They are enabled with an inbuilt keyboard, touch pad acting as a mouse and a liquid crystal display. Its portability and capacity to operate on battery power have served as a boon for mobile users.
Personal Digital Assistants (PDAs): It is a handheld computer and popularly known as a palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be effectively used as portable audio players, web browsers and smart phones. Most of them can access the Internet by means of Bluetooth or Wi-Fi communication.
Minicomputers: In terms of size and processing capacity, minicomputers lie in between mainframes and microcomputers. Minicomputers are also called mid-range systems or workstations. The term began to be popularly used in the 1960s to refer to relatively smaller third generation computers. They took up the space that would be needed for a refrigerator or two and used transistor and core memory technologies. The 12-bit PDP-8 minicomputer of the Digital Equipment Corporation was the first successful minicomputer.
Supercomputers: The highly calculation-intensive tasks can be effectively performed by means of supercomputers. Quantum physics, mechanics, weather forecasting, molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-designed memory hierarchy give the supercomputers, large transaction processing powers.
Wearable Computers: A record-setting step in the evolution of computers was the creation of wearable computers. These computers can be worn on the body and are often used in the study of behavior modeling and human health. Military and health professionals have incorporated wearable computers into their daily routine, as a part of such studies. When the users' hands and sensory organs are engaged in other activities, wearable computers are of great help in tracking human actions. Wearable computers are consistently in operation as they do not have to be turned on and off and are constantly interacting with the user.
These were some of the different types of computers available today.
Thursday, October 14, 2010
Different Types of Computer Viruses
There are Different Types of Computer Viruses could be classified in (origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack) etc.
Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.
File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.
Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.
Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.
Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.
Tuesday, October 12, 2010
What is a Computer Virus?
Computer viruses are a major problem for computer users worldwide. It has individuals and even governments worried. Major efforts are going on to tackle it.
What is a Computer Virus?
A computer virus is a man-made program or code that can cause damage to your data and software on a computer. It is able to replicate usually without knowledge and permission of the computer user.
How does it spread?
They are spread unknowingly from one infected computer to another via emails and instant messaging.
Types of Computer Viruses
Trojan horse- These are programs that claim to do one thing but actually do something else (usually damaging activity).
Resident virus- These dwell in the RAM memory and work by overcoming and interrupting all of the operations executed by the system including corrupting of the files and programs that are opened and closed.
Direct action virus- This has a main purpose of replicating and taking action when it is executed. The batch file of this virus is always found in the root directory of the hard disk.
Overwrite virus- These are characterized by the fact that they delete the information that is contained in the files that they infect, and this renders the files as being partially or even totally useless once they have been infected.
Boot virus- These affect the boot sector of a floppy or hard disk.
Boot virus- These affect the boot sector of a floppy or hard disk.
Macro virus- These infect files that are created using certain applications or certain programs that contain macros.
E-mail virus- These can infect your desktop email system. They proliferate through e-mail messages and usually replicate by automatically e-mailing copies to all entries in your e-mail address book.
Worm- These are programs that are able to replicate on their own over computer networks. It scans a network for computers with same security hole that it can exploit to infect that machine, scan other machines for that security loophole, and continue replicating itself independently.
One should use licensed anti-virus software to protect one's computer from computer viruses.
Subscribe to:
Posts (Atom)