|
|
Definitions for Computer Modding and Form Factor
Computer Modding
Computer modding (that is, modification) has grown by leaps and bounds into its current standing as a strong and growing industry. Websites such as Cool Case Gallery (http://www.coolcasegallery.net/) demonstrate computer...
Google Wireless - Search Away From Home
For so many web surfers, it's almost automatic to type Google.com in to our address bar when we want to search. So big and well-known is Google that many browsers have a built-in search box or typed shortcut for Google searches. In fact, we tend...
I Spy...Something Terribly Wrong (In Your Computer)
I Spy...Something Terribly Wrong (In Your Computer)
This really chapped my lips...
I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past....
Microsoft Great Plains Dynamics on Pervasive SQL.2000 data repair – overview for Database Administrator
Up to the version 7.5 Microsoft Great Plains, and if you are looking to version 7.0, 6.0, 5.5, 5.0 or 4.0 - then it was Great Plains Dynamics were available on Pervasive SQL.2000 or Btrieve. I am confident that majority of database...
Protecting your HTML and PHP Source Code
There are many reasons now as a web designer, software programmer or website owner that you may want to start considering the safety of your HTML or PHP source code. Some related reasons are: 1. Email Address theft – Have you ever wondered how you...
|
|
|
|
|
|
|
|
Top 10 things everyone must know about computer viruses
You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included and all links are made active. A courtesy copy of your publication would be appreciated: published@antivirus-report.com
Author: Eric Koshinsky Email: articles@antivirus-software.com
Top 10 things everyone must know about computer viruses Eric Koshinsky http://www.antivirus-report.com
1. What is a virus? A virus is the name for a parasitic program written to intentionally enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself so it can spread. Though some viruses do little more than copy themselves, others can cause serious damage or affect program and system performance. Therefore a virus should never be assumed harmless or left on a system.
2. One way you can’t get a virus You cannot get a virus simply by being on the internet or using an online service. You will only become infected via the internet if you download an infected file and then run that file.
3. Three ways you can get a virus There are only three ways you can get a virus: i) by executing an infected program ii) booting from an infected diskette iii) opening an infected email attachment. Strictly speaking i) and iii) are pretty much the same, but most people think of them quite differently, so I will too.
4. What are infected program viruses? Infected program viruses are often attached to other software programs like games, disk utilities, the macros in office documents and screen-savers. They are activated when these normally harmless programs are started. When the infected application is run the virus activates and loads into memory, where it can infect any new program that you open. This means that ever more applications on your system will become infected, which will almost certainly cause system problems. Files downloaded directly from the Internet (either through file-sharing programs or direct download from websites), are among the fastest growing sources of computer virus infections.
5. What is a boot infector? Booting from an infected disk simply means allowing your computer to start up with a disc, CD or DVD in the drive. Even so called ‘non bootable’ diskettes, CD's, and DVD's can be infected by a boot sector virus, so make a point of removing all kinds of discs when you’ve finished with them. Once the ‘boot code’ on your hard drive is infected, the virus will be loaded into your computer’s memory every time you start your computer, from where the virus can infect each and every disk that is put into your computer. Floppy disks, though not as commonly used as in the past, are still a very common way viruses being spread from machine to machine. Anyone with an infected machine, using a floppy disk to copy and save files, can also copy and transfer the virus.
6. How do email infections happen? Email is now a favorite way to spread viruses. They are contained in the attachments (the files that can be sent along with an e-mail message). Often the user of an infected computer unknowingly attaches an infected file to an email message, and then sends the email to a friend or colleague. When the email is received and
the file attachment is opened, the virus launches itself. Email messages with animations, automated greeting cards, jokes, photographs, even spreadsheets and document files, all have been documented to contain virus files. Many of the most dangerous viruses are primarily spread through e-mail attachments.
7. One simple way to avoid infections Obtain software from reputable sources. Downloading a service pack for Windows NT from Microsoft's web site is a very different proposition than downloading a freeware disk utility from a company you've never heard of, on a site in a province of the former Soviet Union. You use common sense – for instance, beware of Automatic Downloads – take care when using programs that download and run update patches and programs automatically. While in most cases these will not be a problem, having downloaded software run automatically without virus checking exposes you to potential problems in my opinion. Regardless of where you get your software even shrink-wrapped CDs from a reputable supplier, ALWAYS scan it for viruses BEFORE you execute the program or installer.
8. A second simple way to avoid infections Control your network connections and access to your computer. You could limit access just to those who have a need - fully 80% of damage caused to information systems is caused by action taken (either accidental or deliberate) by an employee or friend, and not from outside sources.
9. Be safe rather than sorry Make sure you have backups for all your files. Backups are essential not only to safely recover from virus infections, but also to recover from the other threats to your data (such as a hard disk failure or a major coffee spilling accident).
10. Use quality virus protection software Last, but certainly not least, use good quality market leading commercial virus protection software packages. The primary benefit of using top commercial software is the frequency and ease of updating the virus definition files that these programs use to detect viruses. With new viruses popping up all the time, unless your protection software is kept updated (daily and automatically), you become ever more vulnerable to infection.
To learn more about effective, easy to afford and use PC protection tools, visit http://www.antivirus-report.com
+++++++ Note:
If you manage a website with similar content to http://www.antivirus-report.com, we are interested in exchanging links with you. Please visit http://www.antivirus-report.com/link-to-us.html for more details.
+++++++
******** Note II:
We have a 100% brandable version of the antivirus report available to anyone who wants to add an effective broad appeal revenue source to their portfolio. It is available at no expense ( F.R.E.E. ) here: http://www.antivirus-report.com/aa-brand.html
********
About the Author
Eric Koshinsky created the layman’s guide to antivirus and PC protection after helping too many people deal with simple PC problems. Find out exactly how to protect your computer from harmful internet attacks at http://www.antivirus-report.com. The comprehensive antivirus report is available at no cost. Find out how to block trojan horses, spyware, computer viruses, and other malicious software quickly and easily in one place.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|