728x90 AdSpace

Trending
copyright, g3leads-2011. Powered by Blogger.

designway4u

free vector download, psd download, tutorial (bangla, english)

Search This Blog

Saturday, November 5, 2011

daily follows for safely using computer

please follow daily
for protecting-saving (spam/virus), 

Today's computer viruses, threats going ballistic
While humans take vaccines to combat a virus like the flu, computers aren't as lucky, because there are no quick-fix vaccines for them, and even after hours of working to rid a computer of a virus, there's no immunity for the computer from catching the same virus or associated problem again.
That's when computer repair shops and well-trained technicians, such as those found at KenputerGuru on Water Street in Henderson, come in handy. Infections are a growing problem in even greater growing numbers.
"About 50 percent of my customer base comes in with virus problems," KenputerGuru owner Ken Goldberg, who has more than 30 years of computer experience, said. "The remainder is network and hard drive problems, but viruses clearly are what we work on the most here in the shop."
A question arising out of a situation like this is why is the virus issue such a problem that it creates "job security" for Goldberg and his two bench technicians, Blaine Stover and Mike Frost?
Three reasons are the sheer number of viruses out there, the relative ease in creating a virus and the computer operators themselves.
"Right now, there are about 300 viruses an hour being generated," Goldberg said. "And those viruses are being reverse engineered by about 10,000 antivirus employees."
Antivirus employees help to detect and evaluate the different viruses as they come across the Internet.

TrendMicro is a 22-year-old Tokyo-based firm with offices in Cupertino, Calif., part of the Silicon Valley. The company, which has some staggering numbers involving virus creation, supports a vision "… of making the world safe for exchanging digital information."
As of Oct. 4, it reported more than 24,300 viruses being generated within a 24-hour period and, in the past 30 days, nearly 28 million new viruses were created.
In 30 days, TrendMicro says North America created 15.3 million viruses, and Asia engineered more than 9 million viruses, making those continents Nos. 1 and 2 with almost 86 percent of all new viruses created worldwide.
What helps in leading to all those viruses is the ability to gather information on how to make a computer virus.
Goldberg demonstrated on his business computer how easy it is to get such information.
"It's too easy to build one, because all you do is Google 'how to make a virus,'" he said. "You can find a gazillion ways. I just tried, and here, within a second, I got 472 million results for 'how to make a virus.'"
When asked who's generating viruses to the degree that it has become such a popular avocation among some people, Goldberg said it's frustrated kids who are sitting at home in their basements looking for something to do and upset old men who are unhappy with life, but, he added, a normal person would never Google this. "If everybody was malicious, I wouldn't exist," he said. "Most people are good and won't associate with those types. These other people just want to have some fun or recognition. They're jerks."
Then there are the three types of viruses and threats that computer owners themselves can install on their computers—adware, malware and spyware—most of the time unknowingly. Adware are those benign but annoying pop-ups that try to sell you something while covering the information you really want to see on the screen. Adware also can collect information about the user in order to display advertisements in the Web browser.
Then there is malware, which is software. It is like a worm in that affects emails, and it is designed specifically to damage or disrupt a system. Spyware, a malicious program, is similar to a Trojan Horse, in that users unwittingly install the product when they install something else.
Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware-type program or application. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware also can gather information about email addresses and even passwords and credit card numbers, according to Webopedia, an Internet dictionary. So, when talking viruses, know that there are subtle differences among terms, says Webopedia. A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
A Trojan Horse is a destructive program that masquerades as a benign application. Unlike viruses, Trojan Horses do not replicate themselves. A worm is a program that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.
A blended threat combines the characteristics of viruses, worms, Trojan Horses and malicious code with server and Internet vulnerabilities. A blended thread can do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time—basically it can cause damage within several areas of your network at one time. Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.
To combat these threats, Goldberg advises buying good quality antivirus software, such as Kasperksy, Norton or McAfee, but not free antivirus protection that pops up on your screen. "Like your daddy told you," Goldberg said, "there's no such thing as a free lunch, so take those ads with a grain of salt."


beware of katrina kife.
don't open or browse related katrina kife picture & webpage. because it affects your computer

18 comments:

Anonymous said...

i did the exact same thing
i did the exact same thing
i did the exact same thing
i did the exact same thing
i did the exact same thing

liberal said...

very useful

Anonymous said...

nice & goodddddd

Anonymous said...

thats a great fiture

Anonymous said...

fine, want more...........

tathya said...

ok, fine

Rashed said...

you're not the only one. There must be a whole lot of nice & my neighborhood if so many guys are working their way through them all.

Anonymous said...

I’m gonna be honest… the 4 latest posts on this blog definitely do just that... I don't even do this for it... I do it outta the love for this post ... THUMBS UP so others can see this and SUBSCRIBE if you like what you hear.

THANKS and STAY BLESSED

Anonymous said...

Тhats awesome

babu said...

i like this post but thats my opinion

vinson said...

Man I can assure you I used to love more than anyone, I even had both Get information and I'm just saying that all of this is very awesome.

vinson said...

Whats the point of censoring when the comments say all the bad words used in the blog and more......

Anonymous said...

I agree..

Anonymous said...

Thats great, im white

vinson said...

This blog is not the shit but great

robiul islam said...

really nice. go ahead. may Allah bless you.

majharul islam said...

fantastic & wishing to more tips.

Free Antivirus Download said...

there is using computer very safely is not possible in these days. free antivirus download

Item Reviewed: daily follows for safely using computer Rating: 5 Reviewed By: Unknown