Totatly infomative and funtainment
This blog is all about infomative and funtainment. Everyone can share their thoughts on this blog.
Monday, 4 February 2013
Tuesday, 22 January 2013
Monday, 21 January 2013
Saturday, 19 January 2013
Protect Your Computer And Your Personal Information From Spyware
Guys today we are learn about the Spyware, Very common but we suffered with it harmfully. Lets Start....!
First of all a little description of Spyware
Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware.
Very important Summary !!!!
Spyware is placed on your computer in order to track your internet surfing habits. It knows every site you visit and every page on that site. Spyware also collects your personal information through software that tracks your actual keystrokes. If you fill in a form to make a purchase all your personal information, including name, address and credit card information can be tracked. The potential abuse of spyware tracking is also being discussed in some businesses that store secure information, such as credit card numbers or even medical records.
Adware is another type of spyware. It doesn't work by tracking your information as spyware does, but what it can do is actually change your browser settings without your consent. It can cause pop up ads to show on your computer. It can even place a new toolbar on your computer. Most people are unaware they even have any type of adware installed on their computer until their computer starts to slow down.
What are the reasons of doing this?
Answer:
The spyware business is a billion dollar a year industry with people getting very rich selling the information they steal about you. There is a case currently in court in the State of New York against a spyware company. The outcome of this legal case will hopefully mean the end of secretly placed spyware.
Preventions:
In order to not fall prey to these types of malwares there are steps you can take. First, don't download freebies. A lot of services that are offered to you as "free" such as free music downloads are free per say, but the price you pay is allowing them to place spyware software or adware targeted advertisements on your computer. Read any agreements about the software very carefully before you download it.
Run an anti spyware software program often along with your virus protection software. Generally spyware and adware are designed to be difficult to remove from you computer and they leave behind "ticklers" which reinstall the software.
Thursday, 17 January 2013
Access Your PC From The Road
Have you ever sat in front of your computer and wished you could show someone else what appeared on your screen?
Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.
Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?
Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.
Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.
Imagine you need to take a trip and you either don't want to or can't take your computer.
The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc. Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.
One of the most common and easy to use remote desktop service is TEAMVIEWER
.If you want to use your computer from anywhere in the world go to teamviewer.com
The other think which is very attractive feature in this software is it can be use on mobile phones, Ipad, Iphone, Nokia, Android etc. Its free of cost. If any questions comment and ask.
Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.
Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?
Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.
Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.
Imagine you need to take a trip and you either don't want to or can't take your computer.
The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc. Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.
.If you want to use your computer from anywhere in the world go to teamviewer.com
The other think which is very attractive feature in this software is it can be use on mobile phones, Ipad, Iphone, Nokia, Android etc. Its free of cost. If any questions comment and ask.
Wednesday, 16 January 2013
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway? Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway? Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
Subscribe to:
Posts (Atom)