Maukie - the virtual cat

Wednesday, March 17, 2010

How to prevent computer VIRUS?

No matter why you have a computer at home or what do you do with it at office, viruses are going to get you some day.Virus prevention is of utmost importance to save your data as well as hardware. In the following paragraphs we discuss different aspects of computer virus prevention and how to prevent computer viruses.
Software companies in the antivirus business tell you step by step, how to prevent computer virus from attacking your computers. This brings us to the first question, does an antivirus prevent all viruses from attacking my computer.

Does an Antivirus Prevent All Viruses from Attacking My Computer?

Thanks to antivirus software, you can prevent most of the viruses from playing havoc on your computer. Well, why this 'most' tag here? It is a sort of 'sleuth and burglar' game being played by antivirus and virus producers. The most and ever updated antivirus, shields you against all defined threats till that time. You can subscribe to auto update feature which works for you behind the screens giving the best possible protection when you go online. They warn you about suspicious files. In the rare case of their failure to catch and kill the worms, you can quarantine them. Also running a full system scan regularly helps a lot.

Here is the suggestion by me of 5 best antivirus ever!

AVG Free provides protection against the various nasties floating around the internet. Like many of the options in the Hive Five, AVG provides freeware (with limitations) and commercial versions of their software, but most users find AVG Free is all they need—though many users prefer versions prior to the most recent 8.0 release.  

NOD32 is best known for its speed and small system footprint, but users also swear by NOD32 as a comprehensive and bulletproof solution. At $40/year for a home license, it's not free, but NOD32 die-hards claim the pricetag is well worth it.

 Available in both freeware (Home) and shareware (Professional) flavors, Avast Antivirus is the happy home of many an AVG-switcher. Avast is slightly heavier on system resources, but users argue its excellent protection more than makes up for the increased footprint. The freeware version will cost you an email address to get a free registration code from their website.

According to many of its users, Avira is the go-to freeware app for detecting viruses and other malware that other antivirus apps miss. Like several of its peers, Avira is available in both freeware (Personal) and shareware (Premium) versions, and most people find the freeware alternative plenty to suit their needs. One downside to Avira on install is pop-up ads enabled by default (adware, anyone?), but you can disable the ads with a couple of clicks. 

Fans of shareware antivirus app Kaspersky point out its consistently strong ratings in malware protection as well worth the $60 license. Kaspersky also boasts an extremely quick response time to new viruses, earning it a special place in the hearts and system trays of its users.
 

Computer VIRUS!

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. 
A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

3 Most wanted hackers :)

  1. Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."
    James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.
    James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."
    Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.
  2. Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."
    Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.
    When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.
    For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.
  3. Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
    Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
    Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
    Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

COMPUTER HACKERS - WHAT DOES IT MEANS?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
 Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.

Online learning and traditional learning - The Comparisons

Ever since online learning has come of age, there has been debate about whether students retain information better from face-to-face interaction than from online programs. There is no particular answer to this dilemma because students who enroll for online education are normally those who have been unable to complete their education or join a new study program for various reasons like family commitments, work pressure, financial constraints or simply because they live too far away from a regular college. They enroll into online education programs to fulfill ambitions or realize dreams. It has been argued that these reasons in no way reflect the nature or quality of online learning negatively.
There have been constant comparisons between online learning results and direct learning from traditional institutions. There are many who are of the opinion that face-to-face interaction allows students to have lively discussions with their teachers and fellow students. Students see their queries being answered immediately in a traditional setup.
Many feel online education is a very isolated activity. One has to be very determined and focused to be able to complete a program with only online tutors for support. However, online learning allows one-on-one teaching which is enormously beneficial to students. It allows them to catch up with difficult subjects. The flexibility online courses offer along with convenience in timings is what most students look for in an online course.

Revolution of web browsers - Mobile or Handphone web browsers :)

While most of us talking about which internet web browsers is the best, now let me talk about mobile web browsers (surfing the internet using available mobile web browsers)
Mobile web browsers differ greatly in terms of features offered an operating systems supported. The best can display most websites and offer page zoom and keyboard shortcuts, while others can only display websites optimizes for mobile devices.
While some devices don't offer much of a choice in which mobile web browser you can use, many new devices are running operating systems like Windows Mobile that has several different mobile web browsers built for it. Mobile devices running the Symbian S60 also have a few choices for which mobile web browser you can use.
Below are the example of mobile web browsers that are available to use on our handphone :)

1.

click here to go to the website for free download
 


2.

 click here to go to the website for free download



3.
click here to go to the website for free download

4.
click here to go to the website for free download
5.

 





click here to go to the website for free download

Web Browser :)

An Internet browser is your window to the web, where you can find almost anything from the comfort of your own living room. Today, the Internet is widely used for media, research, communication, shopping and entertainment. The better your browser, the more you will see and experience.

Up–to–date web browsers are equipped with the latest features and technology to simplify, accelerate and enhance your Internet experience. The newest features include tabbed browsing, RSS feeds and voice interaction. Browsers are also more customizable and entertaining with skins, informative and fun widgets and additional add–ons.
Safety is a common concern among web surfers, and for good reasons. The number of hazards seems to grow every day. Viruses, spyware, phishing schemes and identity theft are some of the concerns. Other worries come fr :)om the threat of online predators and the appropriateness of material for children. Modern Internet browsers shield against all of these factors to keep you, your family and your PC safe.

Below is the rank of the best 2010 internet web browsers :) Please kindly click on pitcure to enlarge it


Followers

Funny or Die: Hot Right Now

Bart Simpson Chalkboard Generator