PC Security: It’s Bigger Than Viruses And Spyware
Simplified, it means keeping your computer and of course, its data secure and safe. In the present age, most of personal data are stored in the computer. But some of us don’t have the fundamental knowledge of keeping those data in safety. This basic knowledge is very simple; all you have to do is following some uncomplicated rules that will improve the security of your computer hugely.
First of all let’s see what the internet connection is all about. We can take up a comparison- a computer with internet connection resembles your very own house. Your house has many openings- doors, windows. With the increase in number of openings, increases the number of chances for someone to enter into your house. I am not saying that some robbers are going to come, but more openings imply more chances of getting robbed.
So to check these visits from strangers you need to install a quality firewall and also update this installed firewall on a regular basis.
Nowadays, it’s not a headache to update your software or operating system. Microsoft Windows Update feature is a good instance. Ensure updating all your installations of your computer.
You will come across two basic kinds of firewalls. Both of these (one, hardware and another, software) carry out the same task. Generally, a hardware firewall is included in your router in case you use one but you may not have a software firewall on your computer.
Sometimes we quite foolishly let strangers come in. just opening an email or browsing the net can invite strangers. Your guards are often fooled by viruses, Trojans or spyware. Sometimes an email from your buddy can carry a fatal virus. So how does your computer fight these unwanted ‘guests’? - By installing anti virus software.
In the present days, anti-virus falls under a huge category. Usually these packages or suites include a spyware scanner and a firewall. Although these guards are quite effective in their jobs, you are advised not to relax and rely completely on them. The protection plan of your computer’s requires multi-tiered protection plan but they are just a single layer. The ultimate yet one of the most crucial advices that I must give you is that your computer’s anti virus software should always be in a state of updated. They should be updated manually regularly since your computer can be subjected to new threats everyday.
10:32 PM | 0 Comments
Password Protect Your Computer!
Using passwords that are strong or utilizing authentication technology that is strong helps you protect your personal info.
As much as possible, keep all your passwords in a secure and safe place. Do not share your passwords over the Internet, phone or e-mail.
Remember that your ISP should not ask your password.
Hackers have the ability to acquire your password, unless of course you make it difficult for them to guess it through the following efforts: use passwords that contain eight characters including with it symbols and numerals; avoiding words that are common; avoiding using personal info; changing regularly your passwords (at least every three months).
A good way of creating a password is to come up with a phrase that is memorable and using first letters of every word as the password of your choice. Convert these letters into particular numbers that look like letters.
Do not forget to back up files that are important The fact of the matter is that there is no such system that is one hundred percent secure. If there are any files that are important and are currently stored in your own computer, always copy them in discs that are removable.
After which, store them in a place that is secure.
You could also consider software encryption. It is also best if the start-up disks in the original software you bought are readily available just in case your computer system crashes.
All in all, helping your children safe from online security threats is an effort that is well worth it.
Make your computer immune to attack
Prevention is always better than a pound of cure. Believe it or not, it is now utterly impossible to survive without a computer. Almost anything and everything could be done on-line nowadays.
From purchasing to selling to paying bills, one really need not go out as any transaction could actually be made thru the computer thanks to the Internet. Unless, of course, fresh air is also available online.
However, the computer’s flexibility has also allowed it to be vulnerable to attack from one of the most potentially harmful entities around: the computer virus. Get Free Registry Cleaner Scan at The instance you detect that the computer you own is infected with a virus, the following are helpful tasks that you could do to protect it further and to also avoid other personal computers to be affected as well.
10:31 PM | 0 Comments
When, Why, And How Should I Reformat My Hard Drive?
When should I reformat my hard drive? If your windows files are corrupted beyond repair or you have files missing and all your attempts to repair have failed. If you have a virus and all your attempts at removal has not worked. Another reason would be if your computer is infected with spy-ware to the point you cannot open Internet Explorer or your computer's performance has slowed considerably. Another reason would be if your computer will not finish a successful de-frag
Why should I reformat my hard drive? One of the biggest complaints I used to get when working with a clients computer was that it was so slow and it used to be a lot faster. Computers will lose performance over many months of use if it has not been de-fragged, multiple spy-ware infections, multiple virus infections, registry errors, files left after we un-installed programs we are not using. All these factors over time will slow your computer to a crawl. It would be a good idea when your computer is to the point that all your attempts to correct the problems have not improved the situation. If your at this point than its time you make preparations to reload your computer.
How should I reformat my hard drive?
1. Before you can begin to reformat your hard drive you must try to backup any files you may want to keep. Keep in mind if your computer is infected so can the files your backing up be infected. Before you proceed with the backup process separate the files you want to keep into a separate folder. Any folders that contain files you want to keep you can drag and drop those into this folder too.
2. Run a scan virus and spy-ware on this folder and make sure these files are not infected. Any files that cannot be repaired get rid of them.
3. You can backup your folder easy if you have CDRW or zip drive. If you have a secondary hard drive you could just drag and drop those files into it. Just make sure you label your folder backup so you can find it easily. Many of you have songs and pictures you want to keep you can backup those too as long as they are clean from infection.
4. Don't forget to backup your history and bookmarks folder if you do not want to los that information. Take inventory of all items you want to keep and put them in this folder and scan them. This should keep your losses to minimum.
5. Your computer manufacturer would have given you a restore CD and driver CD. You should have least one of each depending on the manufacturer you may have more than just two. If you cannot find your CD's or they are damaged you can get replacement from your computer manufacturer for nominal fee. It is a good idea when you first take your computer out of the box to put the CD's in a safe place. You can also make backups of them so if they become damaged you don't have to buy replacements.
6. If your computer came loaded with Windows XP it is very easy to reformat your computer with the CD. Do not copy Windows over Windows always delete the partition when it prompts you and create a new partition. The next step it will ask you to format the drive and it completes these steps easily for you.
7. It will than run Windows setup and load XP back onto your computer.
8. If your computer is older and your running Windows 98/ME the process is basically the same except depending on your computer manufacturers restore disk you may have a some different steps. You may be required to reformat your drive with a DOS boot disk. Consult your manual for instructions.
9. Your computer manufacturer also supplied driver disks and possibly applications disks. Once Windows is loaded you would use your driver disk to load the applicable drivers you need to operate your computer efficiently. Once all your drivers are installed and working correctly you can install any applications.
10. Your computer manufacturer bundled some trial applications with your computer that the licenses have expired putting those back on at this point is not necessary. You do not have to put on any applications you are not using. If your not using them just save the space for other things.
11. Now you can put the backup folder you created back on your computer. Once you have accomplished that you can drag and drop the files and folders into their original positions over writing any folders Windows created.
12. Now you would install your virus and spy-ware program and make sure you can get on the Internet.
13. Once your on the Internet do not do anything else until you have done all the windows updates. This is critical so you get your browsers security updated. Install any service packs and make sure your Windows firewall is activated.
14. Run any virus definition updates and spy-ware updates.
15. This process make take several hours to get everything up and running but it is important that you do this so your computer operates efficiently.
If you have completed all the steps congratulations you just reloaded your computer and your ready to go.
10:29 PM | 0 Comments
Earning A Degree From Baker College Online
Baker College is accredited by the Higher Learning Commission, in addition to being a member of the North Central Association. The Baker Center for Graduate Studies also carries professional accreditation by the International Assembly for Collegiate Business Education
The Complete List of Online Degrees Offered by Baker Online:
Undergraduate Programs
1. Certificate
• Web Design
2. Associate of Applied Science Degree
• Computer Programming• Computer Programming - Java Option• Industrial Technology• Web Design
3. Associate of Business Degree
• Accounting• Accounting/Computer Information Systems• Accounting/Management• Computer Information Systems/Micro Applications• General Business• Human Resource Management• Management• Marketing
4. Bachelor of Business Administration
• Accounting• Business Administration - Accelerated Program• Finance• Human Resource Management• Management• Marketing
5. Bachelor of Computer Information Systems
• Computer Information Systems• Project Management and Planning
6. Bachelor of Computer Science
• Computer Science• Database Technology
7. Bachelor of Health Services Administration
• Health Services Administration - Accelerated Program
8. Bachelor of Web Development
• Web Development
9. Postbaccalaureate Certificate
• Project Management and Planning
Graduate Programs
Master of Business Administration
• Accounting• Finance• General Business• Health Care Management• Human Resources Management• Leadership Studies• Marketing
Enrollment Requirements:
There are separate specific admission procedures for the Undergraduate and Graduate programs. Before enrolling for a degree program on Baker Online, students are required to have an experience in computer operation, such as loading software, using a word processor etc. There is also a three week online class to review and evaluate all the requirements, as well as introduce students to the Baker Online classroom. Additional courses only come after you have successfully completed this preliminary course, with instructions from a Development Coordinator or Academic Office.
The Blackboard, the Virtual Classroom, and the Asynchronous System:
Baker online uses several methods in their online teaching system.
The internet based “Blackboard” allows students to receive and send information with the instructor, the classroom, other students, and groups. Access to the internet is the only requirement, without the need for special software. The online common meeting area for students assigned to a specific online class is the “virtual classroom”, and each one is designated a unique name to ensure privacy. The "asynchronous” system is not dependant on time or place, and allows you to participate in discussion, read lectures, and complete exams.
The Library:
Baker online students can access and use any of the nine campus libraries, and online resources are available 24 hours a day, 7 days a week. Besides the Baker libraries, Baker online also allows you to browse the library collection of other libraries all over North America, as well as access to downloadable journal articles.
10:28 PM | 0 Comments
Combating Computer Espionage
Have you noticed a suspicious slow down of your computer's processing without any particular reason? Are you bombarded by unsolicited pop up ads that indiscriminately appear whether you are running a program or not? These symptoms may continue to happen despite checking your system and running your recently updated anti virus program to run diagnostics on your computer.
Unless you run the correct program, you will not be able to detect the real problem in your system: spyware and adware.
Adware are unsolicited programs that usually come bundled with freeware or shareware. Yes, sometimes things that seem to be good to be true usually come with unwanted invisible strings attached. Companies usually pay freeware or shareware creators to be able to capitalize and prey on unsuspecting individuals who download these programs. Adware cause unsolicited pop up advertisements in your computer and in severe cases, adware causes pop up advertisements to pop up soon as you boot your system http://www.loss1.com
Spyware on the other hand is more covert and usually undetected in your system until you run an anti spyware program. Spyware is used exactly to spy on you. In relatively mild cases, spyware is used to track your Internet browsing habits so that the spyware can report your preferences to build a marketing profile. This means that as you go about your Internet business, you are under surveillance and your basic right to privacy is impinged upon.
In severe cases though, certain spyware better labeled as malware, are used for criminal purposes and can steal keywords and other sensitive information based on your computer and Internet usage.
For instance, malware can take note of your keystrokes or take note of your credit card number and other vital information that can be used to steal your identity and generally put your security at risk.It is said that 9 out 10 computers are infected with spyware and to make sure that you are not part of statistical majority, you need run an adware and spyware cleaner to detect unwanted security and privacy breach within your system.
There are a lot of reliable adware and spyware cleaners in available to remove these unwanted programs in your computer. You must note however that some adware and spyware are intricately bundled within their parent programs that cleaning them out from your computer will inadvertently disable the legitimate programs they infect. This consequence is a necessary evil to clean your computer of unwanted adware and spyware. You should choose an adware and spyware cleaner that can also work proactively by preventing future accidental installation of these nuisances.
Adware and spyware cleaners work like your anti virus programs except that these particular cleaners target adware and spyware.Considering the trouble adware and spyware creators take to ensure that extracting installed adware and spyware from your computer system will be difficult, the adage about an ounce of prevention being worth more than a pound of cure applies in this situation. Be sure to install a reliable and secure adware and spyware cleaner in your system to remove existing security and privacy risks as well as preventing future hassle.
10:27 PM | 0 Comments
Dig Out That Virus
Is your PC infected?
If your computer has become infected with a worm, don’t panic, it is not the end of the world.
There are a number of things that you can do.
Microsoft has a security web page.www.microsoft.com/security/default.mspx It offers up to the minute information on the latest security threats and worms. It also provides you with all of the tools to dig out the worms and fix any damage that they may have caused.
I expect that most of you are saying that you already have protection. May I ask a question? “Is it up-to-date?”
We all know that virus protection is essential. The trouble is that a lot of us have not updated our virus protection software since we purchased our computer, possibly three or four years ago.
The chances are, it is completely useless against the latest threats.
I am using AGV anti virus. I have found it to be totally reliable. There are other programs, I expect, that are just as good. Zone alarm also has a very good reputation. There are lots of others that won't break the bank.
Go to Google and type in “anti virus programs” and you will get more results than you could shake a stick at.
You only need one of these programs on your computer at one time. More than one and they tend to get confused and anything could happen.
Whatever program you use, be sure to keep it up-to-date. There are new viruses coming out almost on a daily basis. Try to get an update at least once a week. It’s always better to be safe than sorry.
A lot of programs will email you when a new virus appears and offer the appropriate update as part of their service.
Whatever you do, don’t leave it until tomorrow. Tomorrow may be too late.
Do it now and sleep easy. Viruses have been known to cause nightmares.
All the best. Bob…
10:25 PM | 0 Comments
Protecting Your Computer From Viruses, Spyware, And Other Security Threats
One way that people accidentally end up with viruses or spyware on their computer is by not paying attention to the sites they use. Don’t get into the habit of giving out your personal information online just because a site asks for it. To opt in, you should only have to give them a first name and an email address.
Always check the address in the URL to make sure you are accessing a secure site. It should start with “https” as this will let you know it is very secure. If it only starts with “http” then the site is not secure and you can end up compromising the security of your computer if you continue entering information on the site.
Viruses can spread very rapidly so if you think your computer may be infected, you should take care not to pass it to any other area of your computer or to others via email. By disconnecting your computer from the network you have a good chance of isolating the damages.
Always be on the alert for various types of emails known as phishing. This is a scam to get you to provide personal information. Once you do, spyware can be attached to your computer. Never respond to emails asking you for personal information as most credible companies won’t contact you for such information.
Make sure you purchase a virus and spyware protection program that is very easy to install. Most of them offer step by step instructions for you to follow. You can find out how easy such software programs are to install before you buy them just by reading some independent reviews online.
You need to choose the program for your computer protection very carefully. While they are designed to give you the very best security, you can be sure those trying to pass viruses or get spyware into your system are very smart. They have learned elaborate tricks to be able to gain access to your information.
One of the latest tactics that these criminals have been using is to sell software that is supposed to protect your computer from viruses and spyware. Unfortunately, what they are selling you is actually the very thing you are trying to protect yourself against. Always get such software from a company that has an excellent reputation, not just any one that you come across online for a good price.
In order to ensure your computer is well protected against viruses and spyware, you want a program that offers you instant updates. These will usually happen for one full year after you install the program. This ensures that your protective software is always the most current available and criminals will have a hard time infecting your computer system with viruses or spyware.
10:24 PM | 0 Comments
Tips For Choosing The Right Computer For You
The first choice you'll need to make is whether to buy a desktop or a laptop. If you need any amount of mobility at all, we'd suggest a laptop. If you don't plan on moving your computer around or using away from your home or office, you might want a desktop. Desktop computers are easier to repair and are cheaper for what you get.
Next, you'll need to make a choice on some of the major features and components of the computer.
Memory is a big factor in determining how quickly your computer performs tasks - I would not buy a computer with less than 512 MB of memory. 1 GB of memory would be even better. If you are planning on doing lots of multimedia work or other tasks that require a lot of operating resources, you should probably get 2 GB of memory. Also keep in mind that memory is classified by speed as well as storage size.
You'll also need to decide on what processor you want and/or need. If you're not familiar with the technical aspects of computer processors and you are going to need a processor that's more powerful than standard, you might want to consult with a computer expert to help you make the choice.
You'll also need to choose the hard drive size you'll need. This is any easy choice to make - just see how much hard drive space you're using now, add in any increases you expect to need, then add some space for expansion.
There are many, many different components of a computer that you'll have to choose. It's worth a little time to think about exactly what you need so you make the right choice the first time.
10:23 PM | 0 Comments
Computer Basics
Computer is an electronic device with a ability to: -
1. Accept data 2. Input, Store and execute instruction. 3. Perform mathematical and logical operation 4. Output results according to users requirement
Computer has certain Limitation:-
1. Cannot think on their own 2. Task has to be described in detail. 3. Do not learn from experience. 4. Cannot detect or correct errors in logic or data.
HISTORY OF THE COMPUTER : People have always needed to count. Earlier they counted with their fingers and probably through scratch making on trees or bones or on the walls of their caves. Over the centuries the science of numbers and computing has changed dramatically. People are now able to solve very sophisticated problems, and increasingly so with the aid of computers. Today we use computers in virtually every environment. From the executive in an office to the housewife and her washing machine to the teenager recording his/her favorite television programme, computers have entered into practically every sphere of human activity. The history of computing can be traced back to Abacus (2000 BC). Used primarily by merchants, the Abacus was a mechanical device used to add, subtract, multiply and divide numbers. Centuries later, mechanically operated devices were developed. These machines could add and subtract numbers (in 1642 Blaise Pascal's Calculating Machine), as well as multiply divide numbers (in 1671 Leibniz's Calculator) A few years later Charles Babbage, referred to as the "father of computers" devised a machine (Analytical Engine) which could be "programmed" by instructions coded initially on punched cards and then stored internally.
GENERATION OF COMPUTERS :
First Generation Computers - 1951-59 : They used vacuum Tubes as their principal component. They could store 10,000 to 20,000 characters. Magnetic Core Memory was used.
Second Generation Computers - 1959-64 : The Second Generation Computers replaced the Vacuum Tubes with Transistors. This led to the miniaturization of Computers. The concept of Multi Programming was introduced with Second Generation Computers. The most popular Second Generation Computer was the IBM 1401.
Third Generation Computers - 1964-70 : The Third Computers introduced integrated circuits, the equivalent of hundred and thousands of transistors on a small silicon chip. This drastically reduced the cost, size and power requirements. This technology produces powerful Mini Computers.
Fourth Generation Computers - 1970 till now The LSI (Large Size Integrated) Technology with many thousand of Electronic Devices on a small silicon chip signaled the Fourth Large Number of Character could be stored and also these Computers were much faster. IBM 370 was most popular machine.
A computer system can be viewed as a system of three Major Components:-
Hardware : It deals with a computer equipment that is mechanical, electrical, and electronic parts of the computer.
Software: It contains programs that instruct a computer how to process data and generate required information.
Human-ware : Person who operate the computer and also those who write the program i.e. - operator, programmers etc
CENTRAL PROCESSING UNIT :-
The heart of the computer is CPU It performs the various function with help of following components :-
1. RITHMETIC LOGICAL UNIT (ALU) :- Performs the actual calculations such as addition, multiplication, subtraction, and comparison like greater than lesser than, equal to, positive, negative or zero
2. MEMORY UNIT (MU) :- Memory unit or main storage unit holds data, instruction (that are being interpreted and executed, the results are ready for the output)
3. CONTROL UNIT (CU) :- The control unit co-ordinates the operation ofthe hardware. It also co-ordinate the flow and execution of data and instruction that are feed into the memory or main storage of CPU.
PERIPHERAL DEVICES
Peripheral devices can be classified as
1) INPUT DEVICES: - It allows feed the data into C.PU. (Computer) Examples of output devices are explained below: -
1) KEYBOARD - It is a important input device which is use every where. The keys are same as typewriter. They are classified as follows: -A) Alphabet Keys (A to Z). B) Numeric Key (0 to 9) C) Alphanumeric keys (!@#$% ~ &*) D) Function keys (Fl, F2, F3,..... F12) E) Arrow keys (Up arrow, Down arrow, Right arrow, Left arrow) F) Special keys (ENTER, TAB, CAPS LOCK, SHIFT, CTRL, ESC, ALT) 2) MOUSE - It is a device, which can easy to operate by one hand only.
It looks like a rat or mouse. It includes a three buttons & we can operate mouse through that buttons
2) OUTPUT DEVICES - The data, which we feed in computer through input device that data are displayed through, output device whenever called. Examples of output device as follows: -
1) Monitor (Screen of the computer)
2) Printer (DOT Matrix, Laser, etc.)
3) Backing Storage Devices :- Are those devices which can store data feed in by the use of input device. Some examples of backing storage devices are as below:-1) Hard Disk 2) Floppy Disk 3) Compact Disk (CD)
CLASSIFICATION OF COMPUTER
Computers can be classified on purpose, components and size
1.ANALOG COMPUTERS 2.DIGITAL COMPUTERS 3.HYBRID COMPUTERS
Analog Computers : Analog computers are computer that measures physical quantities (eg. Temperature, length, pressure, Whether reports etc...) and convert them to numeric values. It is used mainly for scientific & engineering purpose.
Digital Computers : Digital computers are used for mathematical operations such as (eg . addition ,subtraction, letters, symbols)
Hybrid Computers: The features of analog and digital computer are combined to create a hybrid computing system. The doctors to measure hearts beats SIZE mostly use hybrid computers –
All digital computer store numbers, letters and other characters in coded form. The code used to represent characters is the binary code - i.e. a code made up of binary digits or bits. Every character is represent by a string of "Os" and ""Is" - the only digits found in the binary numbering system. When data is types into a computer the keyboard convert each keystroke into a binary character code. This code is then transmitted to the computer, when the computer transmits the data to the - printer or the screen, or to the disk, each individual character is communicated in binary code. It is then converted back to the specific character while displaying or printing the data.
One 'Bit1 is a short of Binary Digit. A collection of 8 bits is known as a BYTE and half of byte i.e. a collection of 4 bits is known as a NIBBLE; 1 Byte= 8 Bits; 1 Kilobyte (KB)= 1024 Bytes; 1 Megabyte (MB)= 1024 KB; 1 Gigabyte (GB)= 1024 MB.
Note :- Every character you type occupies 1 byte, Every Space occupies 2 bytes and every Enter you hit occupies 2 bytes.
TYPES OF STORAGE SYSTEM
1. INTERNAL STORAGE :-
RAM :- (Random Access Memory ).Where programs arid data are held during processing temporarily. Data stored in the RAM is lost when either the machine is switched off. ROM :- (Read Only Memory). Where permanent instructions or data are held. The ROM does not require a continuous supply of power to retain it contents.
2. EXTERNAL STORAGE:-
(A) HARD DISK : Hard disks are a collection of/ pack of diskettes, known as platters, made of aluminum, with their surface being coated with iron oxide joined together to form a cylinder. They have more storage capacity and speed than floppy disks.
(B) Floppies are made of Mylar plastic coated with magnetic oxide. The flexible material is cut into circular pieces.5 1/4" or 3 1/2" in diameter. They are called Floppy disk"
10:21 PM | 0 Comments