August 17,2012
With our knowledge of the destructive effects of computer viruses, employing the services of a trusted anti-virus sofware will be worthwhile and worth searching for. There are many types of anti-virus software there in the market, but we shall be describing ten of the most prominent ones. Prominent in the sense that they have been tested and validated over the years by users and reputable experts representing various schools and spectrum in advanced Information and communication Technology.
1. AVG Anti-Virus
This one of the most reliable anti-virus and a front-liner in the market. It can be obtained for free. It has a comprehensive coverage as it is both anti-virus and anti-spyware. Unlike previously, AVG 2012 version comes with a firewall against any attempt to destroy the internal security of a system by saboteurs or hackers. It has been validated that this version is faster and Can be downloaded and ready for use in a about five minutes. Also Incorporated with it is a free internet security. Upgrading for a paid version will yield greater result.
2. Norton Anti-Virus
This has proven to be the World most trusted anti-virus. Its virus and malware detection and removal is not common place. It has the facility to automatically scan a system every week using symantic security technologies. In the process it deletes any virus detected. This replaces the traditional method of scanning manually. It has a free and paid version. Norton 2012 version is fortified further with a higher internet security features and a less than two minutes download and ready to use time.
3. Mc Afee Anti-Virus
Mc Afee is known as one of the most popular anti-virus. Its peculiarity is such that it offers all encompassing ant-virus coverage for viruses and spyware with a very strong internet security feature. Although it has a free version, it is advisable to subscribe to the paid version in order to gain access to the periodic updates. It has a proven highly optimised virtual environment security.
4. Bitdefender Anti-Virus
The 2013 version of this anti-virus software could be said to be the most comprehensive one ever because of its peculiar features such as firewall, parental control, protection against internet security threats, anti-spam, antispyware, and device anti-theft protection suites .It uphold the system internal security and block unwanted traffic. It is rated as one of the top five anti-virus software in the market and the 2011 winner of the ‘Editor’s of choice’ award from PC MAG.
5. Kasperskey Anti-Virus
This anti-virus software provides a very comprehensive anti-virus protection against viruses, Trojan horses and spyware. It maximises PC security and enhances optimum performance. It has a proactive detection of unknown malware with high internet security features. It has a schedule automated data backup thereby protecting very sensitive files that would have been deleted. The 2012 version also has remote parental control feature to checkmate kids’ online experience.
6 Avira Anti-Virus
Avira anti-virus is a tested and proven anti-virus with high anti-phishing and privacy protection. It is very good for those who browse the internet often as its online security is unbreakable by internet hackers. In addition it renders automatic scan on schedule with all the features of prompt assessment of all files downloaded or uploaded for viruses, worms and Trojan horses detection and destruction. It’s able to achieve this through its highly acclaimed webguard suit. Avira Antivir 2012 edition (personal Edition) can be downloaded for free-user friendly. For greater features you may need to opt for a paid version.
7. ESET NOD32 Anti-Virus 5
This is also a highly recognised anti-virus with a comprehensive coverage against viruses, worms, Trojans, Rootkits and other malicious software. It offers both online and offline security against any possible threat on a computer system. It has high proactive protection with speedy identification of even virus that is yet to be formally identified. It has a good recommendation for those who use their PC for games downloading and playing as it has high propensity to suspend pop-up notifications and scheduled task scanning while the game is being played. It does this without stepping your way. ESET NOD32 Anti-virus has a free trial and a paid version.
8. Trend Micro Anti-Virus
Trend Micro anti-virus is known for its high tactics in detecting and removal of highly sophisticated viruses, malware and spyware with its online and offline advanced internet security technologies. It renders protection against identity theft and other malicious invasion of individual or corporate privacy. It offers full system and custom scan options which help focusing on critical threat areas thereby reducing average time spent. Trend Micro Anti-virus is amenable to any latest development with respect to PC malicious software threats and security with its referencing threat intelligence in the cloud in alliance with global intelligence network which is able to deliver the latest protection. It renders free trial and a paid version.
9. Panda Anti-virus Pro
This is a name that is beginning to gain prominence in the sphere of PC anti-virus online security among rivals. Its coverage is holistic as per its fight against viruses, worms and malware. Despite of its advanced collective intelligence technology in the fight against malicious software, it is highly user friendly. Panda Anti-virus 2012 occupies lesser space as the data base of its software is in the cloud. This is what enhances its prompt response when a new threat is discovered, in a matter of seconds their clients worldwide are protected.
10. Avast Anti-Virus
Avast anti-virus is a household name with reference to various archival report indicating high success story in the fight against computer and internet security threats. Avast anti-virus 2012 edition has improved and unique features among free software solutions. It has improved automatic sandbox updates for latest definitions instead of going the traditional way. Suspicious programs and files are quarantined and kept inside the sandbox until thorough investigation is carried out with recommendations on how to treat such programs in the future. Offers a safe zone for browsing the internet as this is the most potent avenue for virus invasion. It has a trial and a paid version.
11. Defend PRO Anti-Virus
Defend PRO is one of the top ten award winning anti-virus Vendors. It offers one of the most advanced technology in protection against viruses and malware. It has the facility of keeping ones identity online secret from predators and malicious malware designers. The prompt response of its support team 7 days a week on any query relative to quality services rendered, makes them more outstanding than equals.
It is advisable to visit the websites of these anti-virus vendors for detailed information on the packages they offer and perhaps their online information desk.The type of anti-virus software one uses matters, I think these above mentioned vendors have proven themselves worthwhile over the years.
If you find this information useful, feel free to drop a comment, findings and even a question. You can share this information online and otherwise. For easy reference bookmark this page and subscribe for more posts.
Friday, 17 August 2012
Thursday, 16 August 2012
How to Remove Virus from Infected Computer
August 16,2012
A study on how to remove virus from infected computer is worthwhile. Computer Viruses can be deceptively evasive. If for whatever reason a system became infected with a virus, there are number of measures that can be taken to remove it. First and foremost a proper diagnosis as to be carried out so as to know the type of virus and component of the computer it has affected. Without the knowledge of the severity of the damage done, one can end up proffering the wrong solution or deleting the wrong files.
Virus removal from a PC can be done manually or online. But one has to be very familiar with windows registry and how to view and delete system program and files in windows. The following steps will be useful:
The first step is to boot your system into a save mode, press the f8 function key (this disable most of the start up routine) and run a scan through anti-virus software to identify the type of virus. Is the virus in the operating system or in the applications’ files? The ensuing message will display a couple of suggestions or findings which has to be written down. Viruses that infect applications are easier to remove that than those in the operating system, like the boot sector virus, which may completely deter the system from booting.
In a situation of this nature one has to remove the hard disk from the computer and with the aid of a USB connector, it can be scan and cleaned from another computer machine with trusted anti-virus software. There will be no need to remove the Hard disk if networking tools are available. When the instruction given is followed the virus will be deleted .Help centre from an anti-virus vendor can be visited for clarity of procedure, most of top place anti-virus vendors have almost the same procedure.
Once a virus is detected one have to ensure a back up of the data in the system so they are not completely lost. It is advisable to do a back up for each data as soon as they are uploaded to forestall any eventuality.
But for a situation when there is no anti-virus installed, check through a suspected email attachment or any other means to access the subject of the message or the information received. It should be copied out and mailed to an anti-virus vendor to help identify the type and name of the virus responsible. It will pay more if anti-virus software is installed on the PC earlier to checkmate virus invasion.
The second method is the online approach. There are number of paid or free tools which teaches how to remove viruses from infected computer online.Just do a quick Google search it will bring out a number of options in terms of vendors. After making the choice, a number of steps to follow will be given. Switch on the computer in a save mode. The next step is to download an installer and a cloud-based anti-virus and carry out all the necessary updates. Carry out a full can and delete any references indicative of the presence of a virus and other malicious software. However this has to be done with some degree of caution so that some important files are not destroyed. But just a situation of extreme cases when the files are deleted such as the Microsoft outlook files; it is advisable to consult a professional for a possible repair because the question of the type of window configuration in the affected system will come to play. This will determine the next line of action.
In a situation when it becomes very difficult to eliminate a computer virus, the only final remedy will be to format the system. This entails the removal of everything in the hard disk which includes the virus. This is a technical process which a professional may be employed to do. Because this entails re-installation of drivers, programs, files etc. In most cases if the procedure is not well executed it will impair optimum functioning of the PC.How to remove virus from infected computer should not be an uphill task or cause unnecessary panic if these above steps are judiciously executed.
If you find this article useful, you can bookmark it, share it or even leave a contribution or comment.
A study on how to remove virus from infected computer is worthwhile. Computer Viruses can be deceptively evasive. If for whatever reason a system became infected with a virus, there are number of measures that can be taken to remove it. First and foremost a proper diagnosis as to be carried out so as to know the type of virus and component of the computer it has affected. Without the knowledge of the severity of the damage done, one can end up proffering the wrong solution or deleting the wrong files.
Virus removal from a PC can be done manually or online. But one has to be very familiar with windows registry and how to view and delete system program and files in windows. The following steps will be useful:
The first step is to boot your system into a save mode, press the f8 function key (this disable most of the start up routine) and run a scan through anti-virus software to identify the type of virus. Is the virus in the operating system or in the applications’ files? The ensuing message will display a couple of suggestions or findings which has to be written down. Viruses that infect applications are easier to remove that than those in the operating system, like the boot sector virus, which may completely deter the system from booting.
In a situation of this nature one has to remove the hard disk from the computer and with the aid of a USB connector, it can be scan and cleaned from another computer machine with trusted anti-virus software. There will be no need to remove the Hard disk if networking tools are available. When the instruction given is followed the virus will be deleted .Help centre from an anti-virus vendor can be visited for clarity of procedure, most of top place anti-virus vendors have almost the same procedure.
Once a virus is detected one have to ensure a back up of the data in the system so they are not completely lost. It is advisable to do a back up for each data as soon as they are uploaded to forestall any eventuality.
But for a situation when there is no anti-virus installed, check through a suspected email attachment or any other means to access the subject of the message or the information received. It should be copied out and mailed to an anti-virus vendor to help identify the type and name of the virus responsible. It will pay more if anti-virus software is installed on the PC earlier to checkmate virus invasion.
The second method is the online approach. There are number of paid or free tools which teaches how to remove viruses from infected computer online.Just do a quick Google search it will bring out a number of options in terms of vendors. After making the choice, a number of steps to follow will be given. Switch on the computer in a save mode. The next step is to download an installer and a cloud-based anti-virus and carry out all the necessary updates. Carry out a full can and delete any references indicative of the presence of a virus and other malicious software. However this has to be done with some degree of caution so that some important files are not destroyed. But just a situation of extreme cases when the files are deleted such as the Microsoft outlook files; it is advisable to consult a professional for a possible repair because the question of the type of window configuration in the affected system will come to play. This will determine the next line of action.
In a situation when it becomes very difficult to eliminate a computer virus, the only final remedy will be to format the system. This entails the removal of everything in the hard disk which includes the virus. This is a technical process which a professional may be employed to do. Because this entails re-installation of drivers, programs, files etc. In most cases if the procedure is not well executed it will impair optimum functioning of the PC.How to remove virus from infected computer should not be an uphill task or cause unnecessary panic if these above steps are judiciously executed.
If you find this article useful, you can bookmark it, share it or even leave a contribution or comment.
Common types of Computer Virus
August 16,2012
Computer Viruses are of various types. Since the mission of the creator of these viruses is malicious and injurious to computer systems a clear knowledge of the Common types of Computer virus is necessary to avert falling a victim. Viruses are coded program or software with the intent of gaining access to a computer machine and performing certain predetermine activities which ranges from collecting confidential information, erasing computer files and programs and for other ulterior motive. The classification of types of computer viruses should not be audacious as there are many literatures with various schools of thought as per their classification. For the sake of simplicity, we shall be looking at two broad categories:
Those that can be executed by the operating system and those that rely on applications before they can get executed.
1. Boot sector Virus: As the name implies, this virus main target are the programs stored in the floppy and hard disk. This can corrupt the programs that make the computer machine to boot or come on; hence the system is completely grounded or crashed. Their task is to run or get executed as the system boot thereby taking control of the entire system. Example of these types of viruses are Polyboot.B, AntiEXE
2. Resident Virus: This type of Virus resides in the Ram of the computer. From this point it can corrupt, interrupt and control other operations in the system. Examples are Mr Klunky, CMJ, Relex-D , Meve etc.
3. Macro Virus: This is one of the most recent types of computer virus that utilises application software macro programming script for the malicious purpose for which it was created. Unlike other virus it does not affect programs, it affects documents. This is usually done by the virus code modifying original instructions on these documents in order to take control of the entire PC. Microsoft word document files are the most infected by this virus. Examples are Relax, Bablas etc
4. File Infectors: Exe or .com files are the target of this virus. The virus can corrupt, change or delete these files each time the program is run. Examples are Cascade and Cleevix.
5. Network Virus: This type of computer virus spread via the internet and through the local network of computers. As long as the computer is in the network it will be infected if not protected. Example is Nimda virus.
6. Logic Bomb: This is the type of coded software that will not operate until certain conditions are met. They are codes that are embedded in the operating system software on the computer. It can be there for a very long time without doing any harm until that particular instruction coded is carried out by the system operator or a specific period of time in the year. At that time the script is activated alongside the normal operation of the computer to execute the purpose for which it was written.
7. Companion Virus: This virus is written in close affinity with existing files in such a way that each time that file is executed it gets activated alongside. They are like the direct action or resident virus. They can wait until that coded action is carried out by the existing files. As they are activated and replicate themselves, they can corrupt and even replace existing file. Example : Asimov virus.
8. Overwrite Viruses: This type of virus deletes or corrupts the files that it infects in such a way that they are rendered partially or totally useless. They can completely lose their original content.The only remedy in removing the virus is to delete files affected completely. Example: Trivial.88.D
9. Fat Virus: The target of this virus is one of the most important part of the computer machine, the section responsible for information dessemination such as the files location directory, amount of space available on the hard disk, unused space etc. The virus can modify the direction or the instruction on this directory in such a way that computer operator will run the virus programme unknowingly while the original files and programs would have been moved or deleted
10. Worms: These are software program that has the ability to replicate themselves like virus with great damaging effects on the computer. It uses computer network to spread when there is security lapses e.g. ExploreZip worm.
11. Trojan Horses: Unlike computer viruses, Trojan horses do not replicate themselves but they are very dangerous and injurious. They have the ability of disguising as useful important software from the surface but can destroy the security and defence system of the computer machine thereby creating loopholes for the malicious intent of the designer to be carried out. Trojans are known for creating access for the invasion of Rootkit virus which disguise as operating system files.
12. Polymorphic Virus: This is a very deceptive type of virus. Apart from the fact that it possesses the ability to replicate itself very fast, in that same process it changes its digital signature. It guards itself with an encryption algorithm that changes its codes under prescribed conditions. So it becomes very difficult to detect it by a less sophisticated anti-virus software. Example is 1260 virus.
13. Multipartite Virus: This type of virus exploits every possible means to spread or replicate itself. In other words it can operate and spread in multiple ways using the operating system and files. The strength the virus exacts also depends on the type of programs and files install on a computer machine.
14. Browser Hijacker: This type of virus can infect a browser by modifying and redirecting an operator completely to sites not intended for malicious gains. Such viruses can later infect other parts of the operating system and files through attachments and other materials downloaded. Example: Coolwebsearch etc.
15. Web Scripting Virus: Websites uses various codes to enable it display certain features such as the ability to play an online video, music, applications etc. A virus can exploit this means to infect and gain control over the entire system.
The list of the Common types of Computer viruse goes on as it is a continuous discovery. Once an existing virus is detected and dealt with, malicious virus designers will always go back to the drawing board to device means of modifying existing ones and creating new ones. The best means to forestal becoming a victim is to be on the guard by installing appropriate anti-virus software.
Feel free to ask for more information, question and comment through the various means provided abelow. Subcribe to our Rss feeds to receive instant updates from this blog.
Computer Viruses are of various types. Since the mission of the creator of these viruses is malicious and injurious to computer systems a clear knowledge of the Common types of Computer virus is necessary to avert falling a victim. Viruses are coded program or software with the intent of gaining access to a computer machine and performing certain predetermine activities which ranges from collecting confidential information, erasing computer files and programs and for other ulterior motive. The classification of types of computer viruses should not be audacious as there are many literatures with various schools of thought as per their classification. For the sake of simplicity, we shall be looking at two broad categories:
Those that can be executed by the operating system and those that rely on applications before they can get executed.
1. Boot sector Virus: As the name implies, this virus main target are the programs stored in the floppy and hard disk. This can corrupt the programs that make the computer machine to boot or come on; hence the system is completely grounded or crashed. Their task is to run or get executed as the system boot thereby taking control of the entire system. Example of these types of viruses are Polyboot.B, AntiEXE
2. Resident Virus: This type of Virus resides in the Ram of the computer. From this point it can corrupt, interrupt and control other operations in the system. Examples are Mr Klunky, CMJ, Relex-D , Meve etc.
3. Macro Virus: This is one of the most recent types of computer virus that utilises application software macro programming script for the malicious purpose for which it was created. Unlike other virus it does not affect programs, it affects documents. This is usually done by the virus code modifying original instructions on these documents in order to take control of the entire PC. Microsoft word document files are the most infected by this virus. Examples are Relax, Bablas etc
4. File Infectors: Exe or .com files are the target of this virus. The virus can corrupt, change or delete these files each time the program is run. Examples are Cascade and Cleevix.
5. Network Virus: This type of computer virus spread via the internet and through the local network of computers. As long as the computer is in the network it will be infected if not protected. Example is Nimda virus.
6. Logic Bomb: This is the type of coded software that will not operate until certain conditions are met. They are codes that are embedded in the operating system software on the computer. It can be there for a very long time without doing any harm until that particular instruction coded is carried out by the system operator or a specific period of time in the year. At that time the script is activated alongside the normal operation of the computer to execute the purpose for which it was written.
7. Companion Virus: This virus is written in close affinity with existing files in such a way that each time that file is executed it gets activated alongside. They are like the direct action or resident virus. They can wait until that coded action is carried out by the existing files. As they are activated and replicate themselves, they can corrupt and even replace existing file. Example : Asimov virus.
8. Overwrite Viruses: This type of virus deletes or corrupts the files that it infects in such a way that they are rendered partially or totally useless. They can completely lose their original content.The only remedy in removing the virus is to delete files affected completely. Example: Trivial.88.D
9. Fat Virus: The target of this virus is one of the most important part of the computer machine, the section responsible for information dessemination such as the files location directory, amount of space available on the hard disk, unused space etc. The virus can modify the direction or the instruction on this directory in such a way that computer operator will run the virus programme unknowingly while the original files and programs would have been moved or deleted
10. Worms: These are software program that has the ability to replicate themselves like virus with great damaging effects on the computer. It uses computer network to spread when there is security lapses e.g. ExploreZip worm.
11. Trojan Horses: Unlike computer viruses, Trojan horses do not replicate themselves but they are very dangerous and injurious. They have the ability of disguising as useful important software from the surface but can destroy the security and defence system of the computer machine thereby creating loopholes for the malicious intent of the designer to be carried out. Trojans are known for creating access for the invasion of Rootkit virus which disguise as operating system files.
12. Polymorphic Virus: This is a very deceptive type of virus. Apart from the fact that it possesses the ability to replicate itself very fast, in that same process it changes its digital signature. It guards itself with an encryption algorithm that changes its codes under prescribed conditions. So it becomes very difficult to detect it by a less sophisticated anti-virus software. Example is 1260 virus.
13. Multipartite Virus: This type of virus exploits every possible means to spread or replicate itself. In other words it can operate and spread in multiple ways using the operating system and files. The strength the virus exacts also depends on the type of programs and files install on a computer machine.
14. Browser Hijacker: This type of virus can infect a browser by modifying and redirecting an operator completely to sites not intended for malicious gains. Such viruses can later infect other parts of the operating system and files through attachments and other materials downloaded. Example: Coolwebsearch etc.
15. Web Scripting Virus: Websites uses various codes to enable it display certain features such as the ability to play an online video, music, applications etc. A virus can exploit this means to infect and gain control over the entire system.
The list of the Common types of Computer viruse goes on as it is a continuous discovery. Once an existing virus is detected and dealt with, malicious virus designers will always go back to the drawing board to device means of modifying existing ones and creating new ones. The best means to forestal becoming a victim is to be on the guard by installing appropriate anti-virus software.
Feel free to ask for more information, question and comment through the various means provided abelow. Subcribe to our Rss feeds to receive instant updates from this blog.
Friday, 10 August 2012
Symptoms of Computer Viruses
August 10,2012
As a computer user there is the need to be familiar with the operations and functionality of computer machines generally. This will help early detection of anything strange as the computer is used. Computers are of different makes and configuration hence the speed and the programming varies. However, when there is abnormal behaviour of a PC it calls for examining the cause and the possible remedies. Below are symptoms of computer viruses and their effects on PC:
1. Abnormal Short Down: When a computer system often shut down abnormally apart from a power outage, there is the tendency that there is a virus infection.
2. Abnormal Booting: The system may not boot normally either it takes a longer time, or the user may have to reboot it over and over again.
3. A complete blackout: A virus infection may be responsible for this especially when it happens frequently.
4. Files slow to Open or Deleted Automatically: When files get deleted automatically and very difficult to open. When an application become corrupt when uploaded.
5. Hardware Malfunctions: When some of the hardware operates without a command, like the CD Rom opening and closing by itself.
6. Program Launches automatically: Programs or files opening by itself without the user operation or command.This could be a symptom of Computer Virus infection
7. Computer Freezes: When the PC completely freezes. This sometimes may take a very long time to boot or even to switch off.
8. Abnormal noises: When a system makes abnormal noises often, the presence of a computer virus should be probed.
9. Error messages: When error messages show often in the cause of using a computer machine.
10. Difficult to open or close a browser window: A browser window may become very difficult to open or close. In some cases an unauthorised browser switches on and behaves erratically by opening pages that are not originally installed or commanded.
11. Email sent automatically: An infected system can through a browser send unauthorized emails to addresses stored in an email account and even to strange addresses. Such email attachments could be infected with virus. Spam messages could also be received from strange addresses.
12. Task Manager Indicate Exhausted Memory: This message comes up even when there is nothing of such. It is an indication of computer virus.
Please be informed that some of these symptoms of computer viruses indicated above can also be as result of hardware fault. So a proper diagnosis should be carried out. It is pertinent to mention that the surest means of avoiding these symptoms is to install trusted anti-virus software and do a backup for your files and programs.
If you find this post useful, share it with others through the means provided below. Bookmark it and express your observation or contribution.
As a computer user there is the need to be familiar with the operations and functionality of computer machines generally. This will help early detection of anything strange as the computer is used. Computers are of different makes and configuration hence the speed and the programming varies. However, when there is abnormal behaviour of a PC it calls for examining the cause and the possible remedies. Below are symptoms of computer viruses and their effects on PC:
1. Abnormal Short Down: When a computer system often shut down abnormally apart from a power outage, there is the tendency that there is a virus infection.
2. Abnormal Booting: The system may not boot normally either it takes a longer time, or the user may have to reboot it over and over again.
3. A complete blackout: A virus infection may be responsible for this especially when it happens frequently.
4. Files slow to Open or Deleted Automatically: When files get deleted automatically and very difficult to open. When an application become corrupt when uploaded.
5. Hardware Malfunctions: When some of the hardware operates without a command, like the CD Rom opening and closing by itself.
6. Program Launches automatically: Programs or files opening by itself without the user operation or command.This could be a symptom of Computer Virus infection
7. Computer Freezes: When the PC completely freezes. This sometimes may take a very long time to boot or even to switch off.
8. Abnormal noises: When a system makes abnormal noises often, the presence of a computer virus should be probed.
9. Error messages: When error messages show often in the cause of using a computer machine.
10. Difficult to open or close a browser window: A browser window may become very difficult to open or close. In some cases an unauthorised browser switches on and behaves erratically by opening pages that are not originally installed or commanded.
11. Email sent automatically: An infected system can through a browser send unauthorized emails to addresses stored in an email account and even to strange addresses. Such email attachments could be infected with virus. Spam messages could also be received from strange addresses.
12. Task Manager Indicate Exhausted Memory: This message comes up even when there is nothing of such. It is an indication of computer virus.
Please be informed that some of these symptoms of computer viruses indicated above can also be as result of hardware fault. So a proper diagnosis should be carried out. It is pertinent to mention that the surest means of avoiding these symptoms is to install trusted anti-virus software and do a backup for your files and programs.
If you find this post useful, share it with others through the means provided below. Bookmark it and express your observation or contribution.
Computer Viruses: Causes and Solution
August 10,2012
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.
It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.
The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.
Sources of Computer Virus
Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:
1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.
Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.
They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:
1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.
If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.
It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.
The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.
Sources of Computer Virus
Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:
1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.
Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.
They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:
1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.
If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.
The Impact of Computer Technology On Education
August 10,2012
There is hardly any facet of Science and Technology advancement without the use of Computer. In fact Computer or ‘’artificial intelligence’’ as it is otherwise called occupies a centre stage when reseaching advancement in Technology. Because it cannot just by-passed if there is a focus of any meaningful impact .
Computer configuration and make are being upgraded constantly to meet emerging trends.The impact of Computer technology on education in recent times is amazing. We can now bring the most advanced machines right inside the convenience of our home; offices and the class room and perform infinite tasks with them unlike what was obtainable with the first generation of computers.
The Computer World is an industry that will never grow old. It permeates every facet of human endeavour, so talking about its impact of Computer on Education we look beyond pupil- teacher relationship in the class room since knowledge is dynamic. Engineers, Economics, Accountants, Architects, Artisans etc, are finding better ways of doing things through advancement in Computer Technology and its applications. The field of Medicine has made tremendous discoveries in diseases diagnoses and treatment through the use of advanced software in Computer Technology.
Clinical consultations and advanced medical procedures are better done in connections with the use of computer automation. This is extended to the classroom and laboratories. So leanings and improvement in this regard is continuous, if not one can grow obsolete. Noticeably, there is a paradigm shift, except we would want to reverse back to the dark ages.
The impact of Computer Technology on education is noticable on how it has revolutionised the learning process. It is easier for the Teacher to impact knowledge with the use of Computer through the aid of audio-visual medium. Power point animation software can be used to present information in an interactive manner, a situation when the Teacher just watch on and do a stress less moderation. This medium makes teaching and learning process more interesting and less tedious. This method has been proven to be very effective at increasing students’ retentiveness and attention span.
Students can now make presentation in a digitalised manner with Computer software that takes learning and presentations far deeper and more comprehensible. It is also easier to carry a PDF or e-book reader than a bulky note or Text books. In the same vein, it is easier to carry and retrieve bulky information through the computer for the Teacher than the stress of lesson notes and text books.
Unlike in the time past, students from different parts of the World can interact simultaneously through the use of computer connected to the Internet. It is possible to discuss and share latest developments in the different fields of human endeavour without necessarily having to travel or through the orthodox means of exchange of information with delays that are unavoidable.
In the course of doing so, such information and knowledge acquired can be stored same time without the hassle of writing which ordinarily would have taken several hours and perhaps a number of information not captured.
We can say that the so called digital-gap between the advanced economies and the developing ones is bridged as a result of impact of Computer Technology on education.
With the wide range of application of computer Technology it has become a compulsory part of our school curriculum. It is not enough to appreciate what a computer can do by been able to switch it on and off it. It is equally imperative to constantly keep abreast with the latest discoveries and developments as it impact on current realities of our daily living.
In time to come, some persons may lose their relevance in their field or career just because of lack of self improvement in this regard; and it is becoming a compulsory requirement to be computer literate in order to be gainfully employed in most establishments.
It is also pertinent to note that if the impact of computer technology on education will be sustained, it has to be a compulsory subject up to the tertiary level and in all facet of learning. I think this informed the reason why in recent times some institutions have made computer literacy a compulsory requirement before gaining admission for further learning as the entire process is digitalised.
Feel free to share and comment on this post. You can also keep yourself updated by subscribing to post from this blog on matters relative to this subject and other crucial posts on Technology which permeates all area of our daily living.
There is hardly any facet of Science and Technology advancement without the use of Computer. In fact Computer or ‘’artificial intelligence’’ as it is otherwise called occupies a centre stage when reseaching advancement in Technology. Because it cannot just by-passed if there is a focus of any meaningful impact .
Computer configuration and make are being upgraded constantly to meet emerging trends.The impact of Computer technology on education in recent times is amazing. We can now bring the most advanced machines right inside the convenience of our home; offices and the class room and perform infinite tasks with them unlike what was obtainable with the first generation of computers.
The Computer World is an industry that will never grow old. It permeates every facet of human endeavour, so talking about its impact of Computer on Education we look beyond pupil- teacher relationship in the class room since knowledge is dynamic. Engineers, Economics, Accountants, Architects, Artisans etc, are finding better ways of doing things through advancement in Computer Technology and its applications. The field of Medicine has made tremendous discoveries in diseases diagnoses and treatment through the use of advanced software in Computer Technology.
Clinical consultations and advanced medical procedures are better done in connections with the use of computer automation. This is extended to the classroom and laboratories. So leanings and improvement in this regard is continuous, if not one can grow obsolete. Noticeably, there is a paradigm shift, except we would want to reverse back to the dark ages.
The impact of Computer Technology on education is noticable on how it has revolutionised the learning process. It is easier for the Teacher to impact knowledge with the use of Computer through the aid of audio-visual medium. Power point animation software can be used to present information in an interactive manner, a situation when the Teacher just watch on and do a stress less moderation. This medium makes teaching and learning process more interesting and less tedious. This method has been proven to be very effective at increasing students’ retentiveness and attention span.
Students can now make presentation in a digitalised manner with Computer software that takes learning and presentations far deeper and more comprehensible. It is also easier to carry a PDF or e-book reader than a bulky note or Text books. In the same vein, it is easier to carry and retrieve bulky information through the computer for the Teacher than the stress of lesson notes and text books.
Unlike in the time past, students from different parts of the World can interact simultaneously through the use of computer connected to the Internet. It is possible to discuss and share latest developments in the different fields of human endeavour without necessarily having to travel or through the orthodox means of exchange of information with delays that are unavoidable.
In the course of doing so, such information and knowledge acquired can be stored same time without the hassle of writing which ordinarily would have taken several hours and perhaps a number of information not captured.
We can say that the so called digital-gap between the advanced economies and the developing ones is bridged as a result of impact of Computer Technology on education.
With the wide range of application of computer Technology it has become a compulsory part of our school curriculum. It is not enough to appreciate what a computer can do by been able to switch it on and off it. It is equally imperative to constantly keep abreast with the latest discoveries and developments as it impact on current realities of our daily living.
In time to come, some persons may lose their relevance in their field or career just because of lack of self improvement in this regard; and it is becoming a compulsory requirement to be computer literate in order to be gainfully employed in most establishments.
It is also pertinent to note that if the impact of computer technology on education will be sustained, it has to be a compulsory subject up to the tertiary level and in all facet of learning. I think this informed the reason why in recent times some institutions have made computer literacy a compulsory requirement before gaining admission for further learning as the entire process is digitalised.
Feel free to share and comment on this post. You can also keep yourself updated by subscribing to post from this blog on matters relative to this subject and other crucial posts on Technology which permeates all area of our daily living.
Tuesday, 24 July 2012
The 3.75G Internet Network
July 24,2012
Since the advent of internet services whether on mobile phones or other devices, Internet Data services have witnessed a phenomenal growth and development over the years. 3G is a term used to describe third generation of mobile internet systems. It provides a high speed mobile broadband services such as downloading heavy attachments, video streaming, participating in video blogs, make video calls, download music while enjoying the usual voice call and text messaging. The speed of 3.75G can come up to 42mbps.
If your mobile phone is of lower configuration you will find it impossible to download bulky or heavy attachments and other services that the 3.75G provides. So your device ( phones, Tablets, Modem and Router) have to be 3G enabled to take full advantage of these benefits. The beauty of the 3G network as it progresses is that what you could only do on your computer before, you can now do on the comfort of your mobile phones. Also note that your device has to be configured to browse the internet which could be automatic or done manually. You will find details about this as you go through similar posts on this blog. You will also find other measures or software that will make your internet surfing more enjoyable. For more information on the 3G Network,feel free to contact us on onlinenaija@gmail.com or submit your comment.
Since the advent of internet services whether on mobile phones or other devices, Internet Data services have witnessed a phenomenal growth and development over the years. 3G is a term used to describe third generation of mobile internet systems. It provides a high speed mobile broadband services such as downloading heavy attachments, video streaming, participating in video blogs, make video calls, download music while enjoying the usual voice call and text messaging. The speed of 3.75G can come up to 42mbps.
If your mobile phone is of lower configuration you will find it impossible to download bulky or heavy attachments and other services that the 3.75G provides. So your device ( phones, Tablets, Modem and Router) have to be 3G enabled to take full advantage of these benefits. The beauty of the 3G network as it progresses is that what you could only do on your computer before, you can now do on the comfort of your mobile phones. Also note that your device has to be configured to browse the internet which could be automatic or done manually. You will find details about this as you go through similar posts on this blog. You will also find other measures or software that will make your internet surfing more enjoyable. For more information on the 3G Network,feel free to contact us on onlinenaija@gmail.com or submit your comment.
Subscribe to:
Posts (Atom)