Friday 10 August 2012

Symptoms of Computer Viruses

August 10,2012
As a computer user there is the need to be familiar with the operations and functionality of computer machines generally. This will help early detection of anything strange as the computer is used. Computers are of different makes and configuration hence the speed and the programming varies. However, when there is abnormal behaviour of a PC it calls for examining the cause and the possible remedies. Below are symptoms of computer viruses and their effects on PC:

1. Abnormal Short Down: When a computer system often shut down abnormally apart from a power outage, there is the tendency that there is a virus infection.
2. Abnormal Booting: The system may not boot normally either it takes a longer time, or the user may have to reboot it over and over again.
3. A complete blackout: A virus infection may be responsible for this especially when it happens frequently.
4. Files slow to Open or Deleted Automatically: When files get deleted automatically and very difficult to open. When an application become corrupt when uploaded.
5. Hardware Malfunctions: When some of the hardware operates without a command, like the CD Rom opening and closing by itself.
6. Program Launches automatically: Programs or files opening by itself without the user operation or command.This could be a symptom of Computer Virus infection
7. Computer Freezes: When the PC completely freezes. This sometimes may take a very long time to boot or even to switch off.
8. Abnormal noises: When a system makes abnormal noises often, the presence of a computer virus should be probed.
9. Error messages: When error messages show often in the cause of using a computer machine.
10. Difficult to open or close a browser window: A browser window may become very difficult to open or close. In some cases an unauthorised browser switches on and behaves erratically by opening pages that are not originally installed or commanded.
11. Email sent automatically: An infected system can through a browser send unauthorized emails to addresses stored in an email account and even to strange addresses. Such email attachments could be infected with virus. Spam messages could also be received from strange addresses.
12. Task Manager Indicate Exhausted Memory: This message comes up even when there is nothing of such. It is an indication of computer virus.

Please be informed that some of these symptoms of computer viruses indicated above can also be as result of hardware fault. So a proper diagnosis should be carried out. It is pertinent to mention that the surest means of avoiding these symptoms is to install trusted anti-virus software and do a backup for your files and programs.

If you find this post useful, share it with others through the means provided below. Bookmark it and express your observation or contribution.

Computer Viruses: Causes and Solution

August 10,2012
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.

It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.

The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.

Sources of Computer Virus

Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:

1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.

Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.

They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:

1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.

If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.

The Impact of Computer Technology On Education

August 10,2012
There is hardly any facet of Science and Technology advancement without the use of Computer. In fact Computer or ‘’artificial intelligence’’ as it is otherwise called occupies a centre stage when reseaching advancement in Technology. Because it cannot just by-passed if there is a focus of any meaningful impact .

Computer configuration and make are being upgraded constantly to meet emerging trends.The impact of Computer technology on education in recent times is amazing. We can now bring the most advanced machines right inside the convenience of our home; offices and the class room and perform infinite tasks with them unlike what was obtainable with the first generation of computers.

The Computer World is an industry that will never grow old. It permeates every facet of human endeavour, so talking about its impact of Computer on Education we look beyond pupil- teacher relationship in the class room since knowledge is dynamic. Engineers, Economics, Accountants, Architects, Artisans etc, are finding better ways of doing things through advancement in Computer Technology and its applications. The field of Medicine has made tremendous discoveries in diseases diagnoses and treatment through the use of advanced software in Computer Technology.

Clinical consultations and advanced medical procedures are better done in connections with the use of computer automation. This is extended to the classroom and laboratories. So leanings and improvement in this regard is continuous, if not one can grow obsolete. Noticeably, there is a paradigm shift, except we would want to reverse back to the dark ages.

The impact of Computer Technology on education is noticable on how it has revolutionised the learning process. It is easier for the Teacher to impact knowledge with the use of Computer through the aid of audio-visual medium. Power point animation software can be used to present information in an interactive manner, a situation when the Teacher just watch on and do a stress less moderation. This medium makes teaching and learning process more interesting and less tedious. This method has been proven to be very effective at increasing students’ retentiveness and attention span.

Students can now make presentation in a digitalised manner with Computer software that takes learning and presentations far deeper and more comprehensible. It is also easier to carry a PDF or e-book reader than a bulky note or Text books. In the same vein, it is easier to carry and retrieve bulky information through the computer for the Teacher than the stress of lesson notes and text books.

Unlike in the time past, students from different parts of the World can interact simultaneously through the use of computer connected to the Internet. It is possible to discuss and share latest developments in the different fields of human endeavour without necessarily having to travel or through the orthodox means of exchange of information with delays that are unavoidable.

In the course of doing so, such information and knowledge acquired can be stored same time without the hassle of writing which ordinarily would have taken several hours and perhaps a number of information not captured.

We can say that the so called digital-gap between the advanced economies and the developing ones is bridged as a result of impact of Computer Technology on education.

With the wide range of application of computer Technology it has become a compulsory part of our school curriculum. It is not enough to appreciate what a computer can do by been able to switch it on and off it. It is equally imperative to constantly keep abreast with the latest discoveries and developments as it impact on current realities of our daily living.

In time to come, some persons may lose their relevance in their field or career just because of lack of self improvement in this regard; and it is becoming a compulsory requirement to be computer literate in order to be gainfully employed in most establishments.

It is also pertinent to note that if the impact of computer technology on education will be sustained, it has to be a compulsory subject up to the tertiary level and in all facet of learning. I think this informed the reason why in recent times some institutions have made computer literacy a compulsory requirement before gaining admission for further learning as the entire process is digitalised.

Feel free to share and comment on this post. You can also keep yourself updated by subscribing to post from this blog on matters relative to this subject and other crucial posts on Technology which permeates all area of our daily living.







Tuesday 24 July 2012

The 3.75G Internet Network

July 24,2012
Since the advent of internet services whether on mobile phones or other devices, Internet Data services have witnessed a phenomenal growth and development over the years. 3G is a term used to describe third generation of mobile internet systems. It provides a high speed mobile broadband services such as downloading heavy attachments, video streaming, participating in video blogs, make video calls, download music while enjoying the usual voice call and text messaging. The speed of 3.75G can come up to 42mbps.

If your mobile phone is of lower configuration you will find it impossible to download bulky or heavy attachments and other services that the 3.75G provides. So your device ( phones, Tablets, Modem and Router) have to be 3G enabled to take full advantage of these benefits. The beauty of the 3G network as it progresses is that what you could only do on your computer before, you can now do on the comfort of your mobile phones. Also note that your device has to be configured to browse the internet which could be automatic or done manually. You will find details about this as you go through similar posts on this blog. You will also find other measures or software that will make your internet surfing more enjoyable. For more information on the 3G Network,feel free to contact us on onlinenaija@gmail.com or submit your comment.

Airtel WAP,MMS and Internet Configuration for Mobile Phones

July 24,2012
Airtel WAP,MMS and Internet configuration for Mobile Phones offers one of the fastest and cheapest internet services via mobile cell phones with a continuous improvement. It is necessary to keep abreast with these developments in order to take full advantage of it. As soon as a registered Sim Card is inserted into a cell phone, if the phone is compatible with over the air configuration three messages showing WAP, MMS and Internet configuration settings would be received from Airtel.Each of them should be saved. All we need to do is to choose the ''save'' or ''install'' option by pressing the MENU key , click on ‘’save’’ or ‘’install’’.
However if the phone model can not be configured automatically for Airtel WAP, MMS, and Internet Configuration for Mobile Phones there will be the need to do it manually. Navigate to internet connection settings, select network, which is Airtel Gprs this time around, and fill in the following information for the steps that is outlined:

AIRTEL WAP
Homepage URL---http://airtellive.com
Bearer----GPRS
APN-------wap.ng.airtel.com
User name---wap
Password----0000

AIRTEL MMS
Homepage URL----http://aitellive.com
Bearer-----GPRS
IP address---- 192.168.175.184
APN---------mms.ng.airtel.com
User name-----mms
Password------ 0000

AIRTEL INTERNET
Homepage URL…..http://airtellive.com
Bearer----- GPRS
APN----- Internet.ng.airtel.com
User name------internet
Password----- 0000

For any further query on Airtel WAP,MMS and Internet Configuration for Mobile Phones, contact Airtel customer care on 111 free of charge. You can also contact the Nigeria Technology Archive through onlinenaija@gmail.com. Subscribe to our periodic updates through www.onlinenaijatech.blogspot.com

If you find this information useful share it with friends and family members. Please note that this information may change without any prior notice. It is your duty to update yourself regularly by visiting Airtel website or the Nigeria Technology Archive.Bookmark this Site for easy reference.

How to Configure China Phones To Browse the Internet

July 24,2012
How to configure China Phones to browse the internet before now have always been the concern of users. China phones cannot be configured over the air or automatically to browse the internet at the moment .Though in recent time some come with Google application but in most cases they still have to be configured manually. The dominance of China Phones in the GSM market especially due to its affordability and for the fact that most makes accommodate the use of more than one Sim Cards made it gain so much prominence. This is why an alternative measure as to how to configure them to browse the internet was a welcome development. But note that you may find slight variation in the various steps given by different authors on how to achieve this aim this could be due to modification and use of internet terms by different manufacturers of China Phones. Below are steps you will find useful in configuration of China Phones:

Step 1. Click on MENU
Step 2. Click on Services or Web services
Step 3. Click on Data Account
Step 4. Click on GPRS and edit it
After this you will be given a number options (profiles) choose any , renamed it and set it as default. For example if MTN is your Network, you named it mtn gprs . Fill in the other required information as follows:
APN= web.gprs.mtnnigeria.net
Username = web
Password=web
Authentication Type= Normal
After this click on save. Go back again and click on MENU, then click on services and proceed to click on wap. Select the profile you activated earlier.
Select http as the connection type
-IP Address= 10.199.212.2
Port=9201(for wap) 8080(for html)
Save and activate profile, your China Phone is now ready to browse the internet.
How to configure china phones to browse the internet is not an uphill task. It take a simple understanding of internet terms used by different manufacturers.

Feel free to give your comment and if you find this post useful share it with your friends and family members through your referral to this blog or other means provided . You can subscribe to our periodic updates by logging on to www.onlinenaijatech.blogspot.com. You can also contact us through onlinenaija@gmail.com

Friday 13 July 2012

GLO Data Bundles for Browsing the Internet

July 13,2012
Below are the Glo Data Bundles for browsing the internet with respect to Handsets, Tablets and Smart Phones. Streaming audio and Video, download applications and chat with Family and Friends on their Data enabled Devices. Data plan can be purchased by the USSD code or through SENDING an SMS code for any of the Data plans to 127.To check Data usage or balance text INFO to 127.

Plans(Instant surf)-Data(10MB)—Price(N100)—Validity(24hrs)—Code(*127*51#)—SMS Code(51)
Plan(Weekly)-Data(50MB)—Price(N400)—Validity(7days)—Code(*127*52#)—SMS Code(52)
Plan(Always Micro)-Data(200MB)—Price(N1000)—Validity(30days)—Code(*127*53#)—SMS Code(53)
Plan(Always Macro)-Data(1024MB)—Price(N3000)—Validity(30days)—Code(*127*54#)—SMS Code(54)

You can call customer care on 121 for any other further query toll free for glo data bundles for browsing the internet or you can text MENU to 127 to get more details about these plans. Subscribe to Nigeria Technology Archive periodic updates through www.onlinenaijatech.blogspot.com or reach us through onlinenaija@gmail.com Please note that this information can change without any prior notice from Globacom or from the Nigeria Technology Archive, it is your duty therefore to constantly visit these websites.

GLO Router Plans

Plan (Silver)- Data(10GB)—Price(N10,000)—Validity(30days)—Code(*127*11#)
Plan (Gold)-Data(15GB)—Price(N15000)—Validity(30days)—Code(*127*12#)
Plan (Platinium)-Data(20GB)—Price(N18000)—Validity(30days)—Code(*127*13#)

With Router you can share GLO Internet access with more than one Laptop or PC. Router can connect up to 100 Laptops or Computers simultaneously. It is ideal for small internet business and offices.

If you find this information on glo data bundles for browsing the internet useful share it with friends and family members. You can also bookmark this site for easy access and for subsequent posts.