Maukie - the virtual cat

Wednesday, March 17, 2010

How to prevent computer VIRUS?

No matter why you have a computer at home or what do you do with it at office, viruses are going to get you some day.Virus prevention is of utmost importance to save your data as well as hardware. In the following paragraphs we discuss different aspects of computer virus prevention and how to prevent computer viruses.
Software companies in the antivirus business tell you step by step, how to prevent computer virus from attacking your computers. This brings us to the first question, does an antivirus prevent all viruses from attacking my computer.

Does an Antivirus Prevent All Viruses from Attacking My Computer?

Thanks to antivirus software, you can prevent most of the viruses from playing havoc on your computer. Well, why this 'most' tag here? It is a sort of 'sleuth and burglar' game being played by antivirus and virus producers. The most and ever updated antivirus, shields you against all defined threats till that time. You can subscribe to auto update feature which works for you behind the screens giving the best possible protection when you go online. They warn you about suspicious files. In the rare case of their failure to catch and kill the worms, you can quarantine them. Also running a full system scan regularly helps a lot.

Here is the suggestion by me of 5 best antivirus ever!

AVG Free provides protection against the various nasties floating around the internet. Like many of the options in the Hive Five, AVG provides freeware (with limitations) and commercial versions of their software, but most users find AVG Free is all they need—though many users prefer versions prior to the most recent 8.0 release.  

NOD32 is best known for its speed and small system footprint, but users also swear by NOD32 as a comprehensive and bulletproof solution. At $40/year for a home license, it's not free, but NOD32 die-hards claim the pricetag is well worth it.

 Available in both freeware (Home) and shareware (Professional) flavors, Avast Antivirus is the happy home of many an AVG-switcher. Avast is slightly heavier on system resources, but users argue its excellent protection more than makes up for the increased footprint. The freeware version will cost you an email address to get a free registration code from their website.

According to many of its users, Avira is the go-to freeware app for detecting viruses and other malware that other antivirus apps miss. Like several of its peers, Avira is available in both freeware (Personal) and shareware (Premium) versions, and most people find the freeware alternative plenty to suit their needs. One downside to Avira on install is pop-up ads enabled by default (adware, anyone?), but you can disable the ads with a couple of clicks. 

Fans of shareware antivirus app Kaspersky point out its consistently strong ratings in malware protection as well worth the $60 license. Kaspersky also boasts an extremely quick response time to new viruses, earning it a special place in the hearts and system trays of its users.
 

Computer VIRUS!

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. 
A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

3 Most wanted hackers :)

  1. Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."
    James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.
    James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."
    Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.
  2. Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."
    Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.
    When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.
    For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.
  3. Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
    Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
    Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
    Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

COMPUTER HACKERS - WHAT DOES IT MEANS?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
 Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.

Online learning and traditional learning - The Comparisons

Ever since online learning has come of age, there has been debate about whether students retain information better from face-to-face interaction than from online programs. There is no particular answer to this dilemma because students who enroll for online education are normally those who have been unable to complete their education or join a new study program for various reasons like family commitments, work pressure, financial constraints or simply because they live too far away from a regular college. They enroll into online education programs to fulfill ambitions or realize dreams. It has been argued that these reasons in no way reflect the nature or quality of online learning negatively.
There have been constant comparisons between online learning results and direct learning from traditional institutions. There are many who are of the opinion that face-to-face interaction allows students to have lively discussions with their teachers and fellow students. Students see their queries being answered immediately in a traditional setup.
Many feel online education is a very isolated activity. One has to be very determined and focused to be able to complete a program with only online tutors for support. However, online learning allows one-on-one teaching which is enormously beneficial to students. It allows them to catch up with difficult subjects. The flexibility online courses offer along with convenience in timings is what most students look for in an online course.

Revolution of web browsers - Mobile or Handphone web browsers :)

While most of us talking about which internet web browsers is the best, now let me talk about mobile web browsers (surfing the internet using available mobile web browsers)
Mobile web browsers differ greatly in terms of features offered an operating systems supported. The best can display most websites and offer page zoom and keyboard shortcuts, while others can only display websites optimizes for mobile devices.
While some devices don't offer much of a choice in which mobile web browser you can use, many new devices are running operating systems like Windows Mobile that has several different mobile web browsers built for it. Mobile devices running the Symbian S60 also have a few choices for which mobile web browser you can use.
Below are the example of mobile web browsers that are available to use on our handphone :)

1.

click here to go to the website for free download
 


2.

 click here to go to the website for free download



3.
click here to go to the website for free download

4.
click here to go to the website for free download
5.

 





click here to go to the website for free download

Web Browser :)

An Internet browser is your window to the web, where you can find almost anything from the comfort of your own living room. Today, the Internet is widely used for media, research, communication, shopping and entertainment. The better your browser, the more you will see and experience.

Up–to–date web browsers are equipped with the latest features and technology to simplify, accelerate and enhance your Internet experience. The newest features include tabbed browsing, RSS feeds and voice interaction. Browsers are also more customizable and entertaining with skins, informative and fun widgets and additional add–ons.
Safety is a common concern among web surfers, and for good reasons. The number of hazards seems to grow every day. Viruses, spyware, phishing schemes and identity theft are some of the concerns. Other worries come fr :)om the threat of online predators and the appropriateness of material for children. Modern Internet browsers shield against all of these factors to keep you, your family and your PC safe.

Below is the rank of the best 2010 internet web browsers :) Please kindly click on pitcure to enlarge it


Wednesday, February 3, 2010

Ten of the coolest and most powerful supercomputers of all time


For decades, supercomputers have helped scientists perform calculations that would not have been possible on regular computers of that time. Not only has the construction of supercomputers helped push the envolope of what is possible within the computing field, but the calculations supercomputers have performed for us have helped further both science and technology, and ultimately our lives.

Cray-1

The first Cray computer was developed by a team lead by the legendary Seymor Cray. It was a freon-cooled 64-bit system running at 80 MHz with 8 megabytes of RAM. Careful use of vector instructions could yield a peak performance of 250 megaflops. Together with its freon cooling system, the first model of the Cray-1 (Cray-1A) weighed 5.5 tons and was delivered to the Los Alamos National Laboratory in 1976.

The famous C-shape was created in an effort to keep the cables as short as possible (the curve makes the distances on the inside shorter). Shorter cables allowed the system to operate at a higher frequency (80 MHz was insanely fast at the time).

Cray-2

The Cray-2 was the world’s fastest computer between 1985-1989, capable of 1.9 gigaflops. Like the Cray-1, it was a 64-bit system. The first Cray-2 was delivered with 2 gigabytes of RAM which was considered massive at the time. Its circuit boards were packed in eight tight, interconnected layers on top of each other, which made any form of air cooling impossible. Instead a special electrically insulating liquid called Flourinert (from 3M, the company that brought you Post-it notes) was used to cool the circuits. Thanks to the heat exchanger water tank that came with the liquid cooling system, visible in the pictures below, the Cray-2 earned the nickname “Bubbles”.

The Connection Machine 5

The CM-5 was part of a family of supercomputers by Thinking Machines Corporation initially intended for artificial intelligence applications and symbolic processing, but found more success in the field of computational science. A famous CM-5 system was FROSTBURG which was installed at the US National Security Agency (NSA) in 1991, operating until 1997. The FROSTBURG computer was initially delivered with 256 processing nodes, but was upgraded in 1993 to a total of 512 processing nodes and 2 terabytes of RAM. It used SPARC RISC processors and had a peak performance of 65.5 gigaflops. It had cool-looking light panels that showed processing node usage and could also be used for diagnostics purposes. A CM-5 was also featured in the movie Jurassic Park (in the island control room).

Fujitsu Numerical Wind Tunnel

Fujitsu developed the supercomputer known as the Numerical Wind Tunnel in cooperation with Japan’s National Aerospace Laboratory. As its name implies, it was used to simulate wind turbulence on aircraft and spacecraft, and also to forecast weather. The system was capable of 124.5 gigaflops and was the fastest in the world when it debuted in 1993. It was the first computer to break the 100 gigaflops barrier.

ASCI Red

The ASCI Red, a collaboration between Intel and Sandia Labs, was the world’s fastest computer between 1997-2000. The original ASCI Red used Pentium Pro processors clocked at 200 MHz, later upgraded to Pentium II Overdrive processors operating at 333 MHz. It was the first computer to break the teraflops barrier (and after the processor upgrade it passed 2 teraflops). The machine had 4,510 compute nodes (with close to 10,000 Pentium Pro processors), a total of 1,212 gigabytes of RAM, and 12.5 terabytes of disk storage. The upgraded version of ASCI Red was housed in 104 cabinets, taking up 2,500 square feet (230 square meters). ASCI stands for Accelerated Strategic Computing Initiative, a US government initiative to replace live nuclear testing with simulation.

ASCI White

ASCI White took over as the world’s fastest supercomputer after ASCI Red and kept that position between 2000-2002. Although similar in name, the ASCI White was completely different from ASCI Red. Intel had constructed the ASCI Red, but the ASCI White was an IBM system, based on IBM’s RS/6000 SP computer system. It housed a total of 8,192 POWER3 processors operating at 375 MHz, 6 terabytes of RAM and 160 terabytes of disk storage. The ASCI White was capable of more than 7 teraflops.

The Earth Simulator

The Earth Simulator was built by NEC for the Japan Aerospace Exploration Agency, the Japan Atomic Energy Research Institute and the Japan Marina Science and Technology Center. It was the world’s fastest computer between 2002-2004. The Earth Simulator is used to run global climate simulations for both the atmosphere and the oceans. Based on NEC’s SX-6 architecture, it had a total of 5,120 processors, 10 terabytes of RAM and 700 terabytes of disk space (plus 1.6 petabytes of mass storage in tape drives). The initial Earth Simulator was capable of a theoretical top performance of 40 teraflops, though “only” 35.86 teraflops have been achieved. An upgraded version of the system is still in use.

Blue Gene/L

IBM initially developed the Blue Gene family of supercomputers to simulate biochemical processes involving proteins. The Blue Gene/L at the Lawrence Livermore National Laboratory (LLNL) was the world’s fastest computer between November 2004 until 2008 when it lost its crown to another IBM project, the Roadrunner. In its current configuration, the Blue Gene/L at LLNL has 131,072 IBM PowerPC processors running at 700 MHz, a total of 49.1 terabytes of RAM, 1.89 petabytes of disk space and a theoretical peak performance of 367 teraflops. A more beefed up version of the system previously achieved a peak performance of 596 teraflops. (For another very powerful Blue Gene computer, this time based on Blue Gene/P, check out the newly updated Jugene which is currently the fastest supercomputer in Europe.)

Jaguar

Located at the Oak Ridge National Laboratory, this Cray supercomputer is currently capable of 1.64 petaflops. The Jaguar has gone through several iterations, and is currently using Cray’s XT4 and XT5 architecture with quad-core AMD Opteron processors. It has more than 181,000 processing cores with a total of 362 terabytes of RAM and 10 petabytes of disk space. The Jaguar occupies 284 cabinets, and the XT5 section alone (200 cabinets) is as large as an NBA basketball court. With a performance of just over 1 petaflops, it was the second-fastest computer in the world in 2008.

IBM Roadrunner

The IBM Roadrunner is capable of 1.71 petaflops and has been the world’s fastest computer since June 2008 and was the first computer able to keep a sustained 1 petaflops performance. It has 12,960 IBM PowerXCell 8i processors operating at 3.2 GHz and 6,480 dual-core AMD Opteron processors operating at 1.8 GHz, resulting in a total of 130,464 processor cores. It also has more than 100 terabytes of RAM. The Roadrunner supercomputer is housed in 296 racks and occupies 6,000 square feet (560 square meters) at the Los Alamos National Laboratory in New Mexico.


Above: The Roadrunner fills up almost 6,000 square feet. It’s funny how although computer components keep getting smaller over the years, supercomputers just keep getting larger.

And if you think these were impressive, just wait a couple of years. There are several projects in the works that will make these systems look like yesterday’s budget PCs. For example, IBM’s recently announced Sequoia is set to become the flagship of IBM’s armada of supercomputers. If things go according to plan, it will be capable of 20 petaflops by 2011, about 20 times faster than today’s most powerful supercomputers.

Followers

Funny or Die: Hot Right Now

Bart Simpson Chalkboard Generator