Monday, 8 July 2013

What is it?



What are malware, viruses, Spyware, and cookies, and what differentiates them ?
"Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.
Worms:-
Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again. It doesn’t harm any data/file on the computer. Unlike a virus, it does not need to attach itself to an existing program. Worms spread by exploiting vulnerabilities in operating systems
Examples of worm are: - W32.SillyFDC.BBY
Packed.Generic.236
W32.Troresba
Due to its replication nature it takes a lot of space in the hard drive and consumes more cpu uses which in turn makes the pc too slow also consumes more network bandwidth.
Virus:-Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. A computer Virus is more dangerous than a computer worm as it makes changes or deletes your files while worms only replicates itself with out making changes to your files/data.
Examples of virus are: - W32.Sfc!mod
ABAP.Rivpas.A
Accept.3773
Viruses can enter to your computer as an attachment of images, greeting, or audio / video files. Viruses also enters through downloads on the Internet. They can be hidden in a free/trial softwares or other files that you download.
So before you download anything from internet be sure about it first. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, such as running an infected program to keep it going.
Virus is of different types which are as follows.
1) File viruses
2) Macro viruses
3) Master boot record viruses
4) Boot sector viruses
5) Multipartite viruses
6) Polymorphic viruses
7) Stealth viruses
File Virus:-This type of virus normally infects program files such as .exe, .com, .bat. Once this virus stays in memory it tries to infect all programs that load on to memory.
Macro Virus: - These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
Master boot record files: - MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,
Boot sector virus: - Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.
Cleaning this type of virus is very difficult.
Multipartite virus: - A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk
Polymorphic viruses: - A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
Stealth viruses: - These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.
Trojans: - A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.
Example: - JS.Debeski.Trojan
Trojan horses are broken down in classification based on how they infect the systems and the damage caused by them. The seven main types of Trojan horses are:
• Remote Access Trojans
• Data Sending Trojans
• Destructive Trojans
• Proxy Trojans
• FTP Trojans
• security software disabler Trojans
• denial-of-service attack Trojans
Adware: - Generically adware is a software application in which advertising banners are displayed while any program is running. Adware can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on a computer screen automatically. Adwares are used by companies for marketing purpose.
Spywares: - Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. It also can download other malicious programs from internet and install it on the computer.Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application.
Spam: - Spamming is a method of flooding the Internet with copies of the same message. Most spams are commercial advertisements which are sent as an unwanted email to users. Spams are also known as Electronic junk mails or junk newsgroup postings. These spam mails are very annoying as it keeps coming every day and keeps your mailbox full.
Tracking cookies: - A cookie is a plain text file that is stored on your computer in a cookies folder and it stores data about your browsing session. Cookies are used by many websites to track visitor information A tracking cookie is a cookie which keeps tracks of all your browsing information and this is used by hackers and companies to know all your personal details like bank account details, your credit card information etc. which is dangerous .
Misleading applications: - Misleading applications misguide you about the security status of your computer and shows you that your computer is infected by some malware and you have to download the tool to remove the threat. As you download the tool it shows some threats in your computer and to remove it you have to buy the product for which it asks some personal information like credit card information etc. which is dangerous.

Window 8

Running Windows 8

First of all, it's worth noting that the finished version of Windows 8 is still only for x86/64 PCs; there isn't a version of the specially-made Windows RT for ARM devices that you can download and install on existing devices. It's only available on released tablets such as Microsoft Surface RT.
Microsoft Windows 8 review
There's also a new Office
Office 2013 also gets the Windows 8 treatment, with a touch-friendly interface and a sparser look, as well as new features in every application. Read our Office 2013 review for more.
The vast majority of apps in the Windows Store will run on both. Microsoft has even confirmed it will offer Flash functionality for IE on Windows RT (at least on what it calls the "initial delivery of Windows RT PCs").
Windows 8 doesn't include the desktop Office apps that will be bundled with Windows RT either and of course it runs all the x86 desktop apps that won't work on RT. It also has the optional Windows Media Center.

The Difference between Intel's i3,i5, and i7 Core Processors

Special thanks to:


With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best?
This is something that I have been pondering upon and I found out that I wasn’t the only one wondering what on earth Intel has done by releasing these new processors.
Well, the time is here for you to discover the difference between Intel’s i3, i5, and i7 processors. You can thank the coffee on a late night for this post. :)

Intel Core i3 Processor

This particular Intel processor is the enter level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.
Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.
  • Uses 4 threads. Yes, it uses hyperthreading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.
  • This processor consists of 2-4 cores, depending on which one you get your hands on.
  • Contains A 3-4 MB Cache
  • Uses less heat and energy than earlier processors, which is always a good thing in this day and age.

Intel Core i5 Processor

  • This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.
  • As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.
  • This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.
  • The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyperthreading technology for a boost in performance.
  • The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.
  • The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.

Intel Core i7 Processor

  • This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. :)
  • The cache on this one is 4-8 MB.
  • This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky. ;) And yes it also utilizes hyperthreading technology.
  • You will have four cores to take advantage of with this particular series.
  • And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.

6 Ways to Hack a Computer

Enjoy!



Hack your registry

  1. 1
    Go to Start>Run>Regedit and then press ENTER
  2. 2
    You are free to go! Remember, one wrong step can totally make your computer unusable. Try experimenting where you feel safe.

Hack a Windows Password

  1. 1
    Go to Start>Run>cmd, and then press ENTER.
  2. 2
    Type in Net User and then press ENTER.
  3. 3
    Look through the list for the user whose password you would like to reset.
  4. 4
    Type in net user [UserNameHere]* (ex. net user Administrator *)
  5. 5
    Press ENTER three times to blank out their password. (Or you can type in you password that you want to change it to)

DIY is a password reset disk

  1. 1
    Download Windows Password Recovery Corporation and install it to another computer properly.
  2. 2
    Prepare a blank CD/DVD or USB flash drive.
  3. 3
    Insert the CD/DVD/USB flash drive to the accessible computer, and then click “Burn” button to start burning an ISO image file to the CD/DVD or USB flash drive.
  4. 4
    After finishing the burning, remove the CD/DVD or USB flash drive from the computer and then insert this CD/DVD or USB flash drive to the locked computer.
  5. 5
    Set the locked computer to boot from CD/DVD or USB flash drive in BIOS.
  6. 6
    Recover the forgotten windows 7/XP/Vista password with burned CD/DVD/USB flash drive.

Hack Windows Password with Windows Password Rescuer

  1. 1
    Download Windows Password Rescuer Advanced and install it on a computer which you have access to.
  2. 2
    Using Windows Password Rescuer create a bootable CD/DVD disc or USB Drive.
  3. 3
    Insert a CD/DVD disk or USB Flash Drive and run Windows password rescuer. Specify the CD or USB Drive for burning from the pull-down list. Click Burn. Subsequent you will see that it successfully burn to the CD or USB.
  4. 4
    Set up boot sequence in BIOS that set your computer boot from CD/DVD or USB.
  5. 5
    Press F2 or DELETE when you start/restart your PC to get into the BIOS SETUP list.Use arrow keys to select boot menu,and use +/- key to move the CD/DVD or USB option to the first site.Then inset the CD/DVD or USB you have just created. Press F10 to save and exit.BIOS setting please refer to: How to boot from CD/USB.
  6. 6
    Insert CD/DVD disc or unplug USB flash you have just created to your locked computer, and then reboot your computer. You will see a friendly operating window.
  7. 7
    Select the Operation System of your computer.And choose whose password you want to reset (admin/user/domain admin),and click Reset Password.
  8. 8
    Restart your computer to reset your locked computer boot sequence. Then you can login to windows without password or with your a new password.
  9. 9
    You also can use Windows Password Rescuer to create a administrator account and log on Windows with it that you can copy important data from your locked computer if you want to re-install the operating system.If you use it to stole other's data, you may be arrested by police.

Hack Windows login password with Spower Windows password tool

  1. 1
    Get Spower Window password tool
  2. 2
    Create a USB or CD/DVD windows password reset disk with Spower Window password tool
  3. 3
    Boot computer from Spower Window password tool.
  4. 4
    Select a user you want to reset its password.
  5. 5
    Click reset button to reset the user password to blank.
  6. 6
    Reboot computer and login with blank password.

Hack Windows password with Ophcrack

  1. 1
    Download ophcrack xp liveCD (for xp) or Ophcrack vista liveCD fromhttp://ophcrack.sourceforge.net/
  2. 2
    Burn ophcrack live CD to cd or dvd disc.
  3. 3
    Boot computer form ophcrack live disk
  4. 4
    If the password has been found, it will be shown on list.

Computer Science

This information coppied from :
http://en.wikipedia.org/wiki/Computer_science

CONNECTION BETWEEN COMPUTER & SCIENCE

Computer science or computing science (abbreviated CS or CompSci) is the scientific and practical approach to computation and its applications. A computer scientist specializes in the theory of computation and the design of computational systems.[1]
Its subfields can be divided into a variety of theoretical and practical disciplines. Some fields, such as computational complexity theory (which explores the fundamental properties of computational problems), are highly abstract, whilst fields such as computer graphics emphasize real-world visual applications. Still other fields focus on the challenges in implementing computation. For example, programming language theory considers various approaches to the description of computation, whilst the study of computer programming itself investigates various aspects of the use of programming language and complex systemsHuman-computer interaction considers the challenges in making computers and computations useful, usable, and universally accessible to humans.


Sunday, 7 July 2013

This is it!

1nadia syaheera a latiff
1na,nadia,nanad
1batu pahat,johor
121november1993
1milk,yogurt
1choc,ice cream
1uitm k.pilah,n9
1csc134
1as1204a2
1madam azyan yusra