Friday 14 September 2012

Meaning of Computer Hardware (Definition)

September 14,2012
Computer hardware is the framework or the platform on which the computer software is built. It is that tangible part of the computer that we can see for example the hard disk and floppy disk. Just as the human body have different parts with different functions but all combine to form a whole. The same with the computer system. The computer hardware system has input and output devices, storage unit, Memory, Central processing unit, Control Unit, Arithmetic Logic unit, Power Supply Unit, the Motherboard and the Peripherals. It is when all these different parts function properly that the computer system is optimised.

The Computer Motherboard


This could also be referred to as the circuit board or the main board. As the name implies the computer motherboard serves as the connecting points for virtually every other components of the computer. Any discourse on this subject matter without mentioning the motherboard is not complete. It houses the Memory (the brain) of the computer, the Ram, Rom, C MOS battery, BIOS etc. It has expansion slots such as the PCI, AGP, ISA, PCI-e, PCI-x etc. This provides for more attachments if the need be for additional functions. All the interconnectivity is done on the motherboard attached to the case of the computer.
The motherboard specification have to be compatible with the kind of CPU it uses. There are different manufactures of CPU such as Intel, IBM, AMD and Motorola etc. the same has to do with other parts such as the power supply pack. This is one primary factor to consider when purchasing spare parts .The issue of compatibility most always be considered.

The Computer Housing (casing)



This is a vital part of the computer hardware though it is not most of the time mentioned. The Motherboard is attached to the casing (screwed to it) and components like the Floppy drive have their slots.

The Central Processing Unit (CPU)



The central processing unit of computer hardware is analogous to the human brain. It houses the control unit, the arithmetic logic unit, and the cache memory (storage unit). The entire system is controlled from this point. All the instruction the computer receives are interpreted and given to other units for execution from this point. The control unit extracts instruction from the main memory and interpret it for execution .It maintains a control path for every unit connected to the computer. The CPU because of its size is also referred to as the Microprocessor and interchangeably called the Processor.
A very essential part of the CPU is the Arithmetic Logic Unit (ALU), it performs the computational and the logical operations of the computer system such as multiplication, addition, subtraction, division and logical comparison of data extracted from the memory (storage) unit. It has the ability to set appropriate indicators for each of the data so extracted. The ALU has it reserve area called registers where these functions are performed at a very fast speed.
The storage unit (cache memory) which can also be referred to as the registers is a temporary storage unit before data are processed. This is a high speed cache memory because of its limited space it has auxiliary units where data not yet ready to be processed are stored. Such data are usually reloaded when needed for processing. By implication, there is a continuous communication between the Storage Unit, Control Unit and Arithmetic and Logic Unit which in turn controls other components of the PC. The speed of the Processor will determine the speed of the entire computer system. It is usually measured in hertz via the clock unit in the CPU. A very high clock speed means a high CPU speed.

The RAM
The RAM (Random Access Memory) of a computer is a storage unit that work directly with the Microprocessor. Anytime a program is launched, the Random access memory extracts information or data from the Hard drive for execution. Any data extraction stored in the Hard drive met for use at anytime on the computer system is carried out in the RAM. The Random Access Memory is very fragile and temporary storage unit; at any slight power outage all information or data in it would be lost. However it usage is necessitated on its speed which the Hard drive cannot cope with relative to the speed of the processor. There are basically two types of Random Access Memory, the Dynamic RAM and the Static RAM. The SRAM is faster but DRAM is commonly used because the former is very expensive. However both of them are very fragile. The RAM is also called the main memory alongside with the ROM.

The ROM

The ROM is an acronym for Read only memory. The ROM usually contains the manufacturer information termed ‘’read only’’ which cannot be changed. The ROM boot up the computer anytime it is switched on. The content of ROM remains unlike the RAM when there is a power outage.

The Hard Drive
The computer hard drive is also known as the Hard Disk is that part of Computer Hardware that is used to store large volume of data. Modern hard disk has the capacity of storing over five hundred Gig of data. Unlike the temporary storage system of the computer memory the hard disk does not lose its data as a result of a power outage or when the system is switched off. Data can always be retrieved anytime when needed. The hard disk is attached to the motherboard of the system and it is not usually removed.
Removable Data Storage Devices:

1. The Floppy and Compact Disc Drive: These are computer hardware devices with storage facilities that can be removed from the computer. That is the floppy disk and the compact disk can be replaced or changed for ones with higher capacity. However their storage capacity is low as compared with the hard disk.
2. USB Flash Drive: This is also a removable storage device which can store millions of bites. Some can also serve as MP3 player. The system has a number of slots where it can be connected.
3. Memory Card: This is a very common removable data storage facility which can be connected via a data card reader to the computer. In recent times there are memory cards with over ten Gig storage capacities. It is however advisable to use ones with average storage capacity as most makes are subject to breakage and virus infection. This could lead to loss of valuable data if not back up.

The Power Supply Unit
This is a very important unit in the computer hardware system; it is also referred to as the power pack of the system. The power pack is detachable, it is the first point of call in terms of power flow and its type and capacitance will go a long way to determine how well a computer units function with respect to power requirement. The compatibility of the power unit with the motherboard is of utmost importance when considering replacement or spare parts. An expert advice should be sorted for when considering the kind of power back up to employ.

Monitor
The monitor is an output unit of the computer hardware responsible for display of the computer operations. The monitor has a close similarity with the TV. It has a screen which in order to function is connected to the computer motherboard with a data cable. Monitors come in different sizes and resolutions. Most commonly used in recent times are the ones with flat screen and with very high resolutions. The computer display adapter determines to a large extent the number of colours the display supports and how fast the monitor refreshes when in use.

The Keyboard


The input unit responsible for inputting data or information into the computer system with letters, numbers, symbols, signs and buttons is known as the keyboard. The keyboard enables the user to interact with the computer system. A standard keyboard has the Functional keys such as F1, F2…..F12, the alphanumeric section and the numeric cursor keypad.

The Mouse


The mouse is an input facility of the computer hardware externally connected to the computer. It makes navigation with respect to computer usage flexible and easy. The Mouse has two major buttons one on the left and the other on the right. The button on the left is called the primary mouse button. While the one on the right is called the secondary mouse button. When the mouse pointer is navigated to the desired point on the monitor and clicked, the required program, data or file will open. The mouse is usually placed on the mouse pad especially for uneven surfaces. For optimum performance the mouse buttons should always point towards the monitor.

The Speakers

The speaker is an output device in the computer hardware. It main function is to generate sound from the computer. The quality of sound related recording or activity on the PC whether audio or video is felt most when quality speakers are available and connected.

If you found this information useful bookmark this Site and share it with others. Also feel free to make your comment or contribution.



Thursday 6 September 2012

Meaning of Computer Software (Definition)


september 06,2012
The computer software is the masterpiece of the entire PC. It is the control post that determines how the hardware will function in order to achieve the desired outcome. The command is all encompassing; it is inclusive of the total operations of the Computer.
Computer software is arrived at through a programming language derived and embedded in the source code of the PC. It is from this point that a set of system program translate the commands into an executable format (language) that the computer can understand and make available for use. It can be seen as the interface between the hardware and the computer user. It can be sub-divided into two categories. These are System Software and Application Software.

System Software

The system software is programs created to manage the entire computer resources. The control the input and output devices of the PC. The system software has a number of components such as the operating system software, utility software and the programming software. In fact this underlies the basis of the system software. The computer is completely useless without the operating system. Let highlight and discuss this in a considerable detail.

Operating System Software

The operating system software is a set of programs that enable the computer to receive executable instruction such as the storage of data, manage input and output devices and serve as a bridge between hardware and the application software. Examples of Operating systems are:
DOS
UNIX
XENIX
MICROSOFT WINDOWS
MAC OSX
LINKER SOFTWARE
BIOS SOFTWARE
COMPLILER SOFTWARE
LINUX
ANDROID

The operating system has a number of operating modes:

1. Single-User operating system: These are programs that allow only a single task to be executed at a time also by one single user on the PC. Example is the MS-DOS.
2. Real-time processing: This is a program that is designed to execute a given task within a set time. This type of program is mostly use by a manufacturing outfit or factories when output is measured and expected (programmed) relative to input within a set time. With this system, machines, engines and other components productivity are determined. Feed back in this process are therefore used to modify and optimised performances in compliance with set goals.
3. Multi-tasking and Multi-user operating systems: This system allows multiple tasks to be carried out at the same time and by more than one user. For example printing and downloading files from different sites at the same time. E.g. UNIX, XENIX etc.
4. Multi-access and Network operating systems: This allow more than one computer system connected together with different users operating under same system program software or single unit. This is achieved through local area network representing terminals and communication cables .E.g. NOVEL NetWare, ETHERNET etc.

Utility Software

These are those computer software programs that bring about optimum performances of the system. It serves as a check on unwanted intrusion into smooth running of the Computer software system by cleansing, analysing, maintaining and configuring the various processes for the desired outcome. Examples of Utility software are disk cleaners, virus scanners, disk drive partition utilities, backup utilities, sidekick etc.

Programming Software

This is the software use for designing and transforming the computer source code into an executable form (object code). The Computer depends on a set of coded instructions to carry out specific tasks intelligently and producing desired results as tailored for different expectations. This is what the programming software is met for.
This set the platform on which other computer depends on to function properly. Computer programming is a sophisticated process which requires knowledge of system algorithms, compilers, interpreters etc. Programming is done with high level language such as the COBOL, FORTRAN etc. The computer software programmer has the obligation of constant researches in this field so as to keep informed on latest development in this regard.

Application Software

The application software are programs designed to help computer users perform defined and specific task .E.g. Accounting software, graphic software, media player etc.
Different fields of human endeavour such as Medicine, Military, Engineering, Economics, Library Science, Architecture etc have specific application software which they used to analyse and simplify their activities.

Application software can broadly be categorised into two. The horizontal application and the vertical application. The horizontal application has a wider and general usage like the Microsoft word and Microsoft excel. Why the vertical application is narrowed to a specific niche like the accounting software. Examples of application software are as follows:


• Word Processing Application Software: This is the document processing software that make possible for typing memos, letters, curriculum vitae, reports, spelling check, search for terms, store and retrieve documents etc. Examples of this software are Microsoft word, Word star, Wordperfect, Multimate etc
• Data base Software: This is the software that makes data base operations possible. A data base is an organised compilation of structured data, which allow a systematic storage and retrieval system. Examples of data base software are oracle, clippers, paradox, MS access etc.
• Multimedia Software: This software makes it possible to create, play and manage video and audio files. Examples are Real player and Media player.
• Spreadsheet Software: This software is used for activities involving calculations in rows and columns. It is used for the plotting of graph and other mathematical related functions. Examples are Microsoft Excel, lotus 1-2-3 etc.
• Presentation Software: This is the software that is used for formatting, inserting and editing text involving graphics, drawings, images etc. Example of this software is the Microsoft Power point.

Application software can be grouped into a singular suit (Application suite) which consist of applications performing similar or inter related functions. Example is Microsoft Office and Openoffice.org .

Computer Software is a vast topic. Each of these groupings has their sub-divisions that need in-depth knowledge to apply as a software developer. So the knowledge of computer configuration and applications goes beyond mere switching on and off. It comprises of behind the contain elements that may appear a mystery but really has been simplified with recent development and discoveries.

If you find this information useful, feel free to make comment and contribution. You can subscribe to our feeds as more intelligent posts are on the way.

Friday 17 August 2012

Types of Anti-Virus Software

August 17,2012
With our knowledge of the destructive effects of computer viruses, employing the services of a trusted anti-virus sofware will be worthwhile and worth searching for. There are many types of anti-virus software there in the market, but we shall be describing ten of the most prominent ones. Prominent in the sense that they have been tested and validated over the years by users and reputable experts representing various schools and spectrum in advanced Information and communication Technology.

1. AVG Anti-Virus
This one of the most reliable anti-virus and a front-liner in the market. It can be obtained for free. It has a comprehensive coverage as it is both anti-virus and anti-spyware. Unlike previously, AVG 2012 version comes with a firewall against any attempt to destroy the internal security of a system by saboteurs or hackers. It has been validated that this version is faster and Can be downloaded and ready for use in a about five minutes. Also Incorporated with it is a free internet security. Upgrading for a paid version will yield greater result.

2. Norton Anti-Virus
This has proven to be the World most trusted anti-virus. Its virus and malware detection and removal is not common place. It has the facility to automatically scan a system every week using symantic security technologies. In the process it deletes any virus detected. This replaces the traditional method of scanning manually. It has a free and paid version. Norton 2012 version is fortified further with a higher internet security features and a less than two minutes download and ready to use time.

3. Mc Afee Anti-Virus
Mc Afee is known as one of the most popular anti-virus. Its peculiarity is such that it offers all encompassing ant-virus coverage for viruses and spyware with a very strong internet security feature. Although it has a free version, it is advisable to subscribe to the paid version in order to gain access to the periodic updates. It has a proven highly optimised virtual environment security.

4. Bitdefender Anti-Virus
The 2013 version of this anti-virus software could be said to be the most comprehensive one ever because of its peculiar features such as firewall, parental control, protection against internet security threats, anti-spam, antispyware, and device anti-theft protection suites .It uphold the system internal security and block unwanted traffic. It is rated as one of the top five anti-virus software in the market and the 2011 winner of the ‘Editor’s of choice’ award from PC MAG.

5. Kasperskey Anti-Virus
This anti-virus software provides a very comprehensive anti-virus protection against viruses, Trojan horses and spyware. It maximises PC security and enhances optimum performance. It has a proactive detection of unknown malware with high internet security features. It has a schedule automated data backup thereby protecting very sensitive files that would have been deleted. The 2012 version also has remote parental control feature to checkmate kids’ online experience.

6 Avira Anti-Virus
Avira anti-virus is a tested and proven anti-virus with high anti-phishing and privacy protection. It is very good for those who browse the internet often as its online security is unbreakable by internet hackers. In addition it renders automatic scan on schedule with all the features of prompt assessment of all files downloaded or uploaded for viruses, worms and Trojan horses detection and destruction. It’s able to achieve this through its highly acclaimed webguard suit. Avira Antivir 2012 edition (personal Edition) can be downloaded for free-user friendly. For greater features you may need to opt for a paid version.

7. ESET NOD32 Anti-Virus 5
This is also a highly recognised anti-virus with a comprehensive coverage against viruses, worms, Trojans, Rootkits and other malicious software. It offers both online and offline security against any possible threat on a computer system. It has high proactive protection with speedy identification of even virus that is yet to be formally identified. It has a good recommendation for those who use their PC for games downloading and playing as it has high propensity to suspend pop-up notifications and scheduled task scanning while the game is being played. It does this without stepping your way. ESET NOD32 Anti-virus has a free trial and a paid version.

8. Trend Micro Anti-Virus
Trend Micro anti-virus is known for its high tactics in detecting and removal of highly sophisticated viruses, malware and spyware with its online and offline advanced internet security technologies. It renders protection against identity theft and other malicious invasion of individual or corporate privacy. It offers full system and custom scan options which help focusing on critical threat areas thereby reducing average time spent. Trend Micro Anti-virus is amenable to any latest development with respect to PC malicious software threats and security with its referencing threat intelligence in the cloud in alliance with global intelligence network which is able to deliver the latest protection. It renders free trial and a paid version.

9. Panda Anti-virus Pro
This is a name that is beginning to gain prominence in the sphere of PC anti-virus online security among rivals. Its coverage is holistic as per its fight against viruses, worms and malware. Despite of its advanced collective intelligence technology in the fight against malicious software, it is highly user friendly. Panda Anti-virus 2012 occupies lesser space as the data base of its software is in the cloud. This is what enhances its prompt response when a new threat is discovered, in a matter of seconds their clients worldwide are protected.

10. Avast Anti-Virus
Avast anti-virus is a household name with reference to various archival report indicating high success story in the fight against computer and internet security threats. Avast anti-virus 2012 edition has improved and unique features among free software solutions. It has improved automatic sandbox updates for latest definitions instead of going the traditional way. Suspicious programs and files are quarantined and kept inside the sandbox until thorough investigation is carried out with recommendations on how to treat such programs in the future. Offers a safe zone for browsing the internet as this is the most potent avenue for virus invasion. It has a trial and a paid version.

11. Defend PRO Anti-Virus
Defend PRO is one of the top ten award winning anti-virus Vendors. It offers one of the most advanced technology in protection against viruses and malware. It has the facility of keeping ones identity online secret from predators and malicious malware designers. The prompt response of its support team 7 days a week on any query relative to quality services rendered, makes them more outstanding than equals.

It is advisable to visit the websites of these anti-virus vendors for detailed information on the packages they offer and perhaps their online information desk.The type of anti-virus software one uses matters, I think these above mentioned vendors have proven themselves worthwhile over the years.

If you find this information useful, feel free to drop a comment, findings and even a question. You can share this information online and otherwise. For easy reference bookmark this page and subscribe for more posts.


Thursday 16 August 2012

How to Remove Virus from Infected Computer

August 16,2012
A study on how to remove virus from infected computer is worthwhile. Computer Viruses can be deceptively evasive. If for whatever reason a system became infected with a virus, there are number of measures that can be taken to remove it. First and foremost a proper diagnosis as to be carried out so as to know the type of virus and component of the computer it has affected. Without the knowledge of the severity of the damage done, one can end up proffering the wrong solution or deleting the wrong files.

Virus removal from a PC can be done manually or online. But one has to be very familiar with windows registry and how to view and delete system program and files in windows. The following steps will be useful:
The first step is to boot your system into a save mode, press the f8 function key (this disable most of the start up routine) and run a scan through anti-virus software to identify the type of virus. Is the virus in the operating system or in the applications’ files? The ensuing message will display a couple of suggestions or findings which has to be written down. Viruses that infect applications are easier to remove that than those in the operating system, like the boot sector virus, which may completely deter the system from booting.

In a situation of this nature one has to remove the hard disk from the computer and with the aid of a USB connector, it can be scan and cleaned from another computer machine with trusted anti-virus software. There will be no need to remove the Hard disk if networking tools are available. When the instruction given is followed the virus will be deleted .Help centre from an anti-virus vendor can be visited for clarity of procedure, most of top place anti-virus vendors have almost the same procedure.

Once a virus is detected one have to ensure a back up of the data in the system so they are not completely lost. It is advisable to do a back up for each data as soon as they are uploaded to forestall any eventuality.
But for a situation when there is no anti-virus installed, check through a suspected email attachment or any other means to access the subject of the message or the information received. It should be copied out and mailed to an anti-virus vendor to help identify the type and name of the virus responsible. It will pay more if anti-virus software is installed on the PC earlier to checkmate virus invasion.

The second method is the online approach. There are number of paid or free tools which teaches how to remove viruses from infected computer online.Just do a quick Google search it will bring out a number of options in terms of vendors. After making the choice, a number of steps to follow will be given. Switch on the computer in a save mode. The next step is to download an installer and a cloud-based anti-virus and carry out all the necessary updates. Carry out a full can and delete any references indicative of the presence of a virus and other malicious software. However this has to be done with some degree of caution so that some important files are not destroyed. But just a situation of extreme cases when the files are deleted such as the Microsoft outlook files; it is advisable to consult a professional for a possible repair because the question of the type of window configuration in the affected system will come to play. This will determine the next line of action.

In a situation when it becomes very difficult to eliminate a computer virus, the only final remedy will be to format the system. This entails the removal of everything in the hard disk which includes the virus. This is a technical process which a professional may be employed to do. Because this entails re-installation of drivers, programs, files etc. In most cases if the procedure is not well executed it will impair optimum functioning of the PC.How to remove virus from infected computer should not be an uphill task or cause unnecessary panic if these above steps are judiciously executed.

If you find this article useful, you can bookmark it, share it or even leave a contribution or comment.


Common types of Computer Virus

August 16,2012
Computer Viruses are of various types. Since the mission of the creator of these viruses is malicious and injurious to computer systems a clear knowledge of the Common types of Computer virus is necessary to avert falling a victim. Viruses are coded program or software with the intent of gaining access to a computer machine and performing certain predetermine activities which ranges from collecting confidential information, erasing computer files and programs and for other ulterior motive. The classification of types of computer viruses should not be audacious as there are many literatures with various schools of thought as per their classification. For the sake of simplicity, we shall be looking at two broad categories:
Those that can be executed by the operating system and those that rely on applications before they can get executed.

1. Boot sector Virus: As the name implies, this virus main target are the programs stored in the floppy and hard disk. This can corrupt the programs that make the computer machine to boot or come on; hence the system is completely grounded or crashed. Their task is to run or get executed as the system boot thereby taking control of the entire system. Example of these types of viruses are Polyboot.B, AntiEXE
2. Resident Virus: This type of Virus resides in the Ram of the computer. From this point it can corrupt, interrupt and control other operations in the system. Examples are Mr Klunky, CMJ, Relex-D , Meve etc.
3. Macro Virus: This is one of the most recent types of computer virus that utilises application software macro programming script for the malicious purpose for which it was created. Unlike other virus it does not affect programs, it affects documents. This is usually done by the virus code modifying original instructions on these documents in order to take control of the entire PC. Microsoft word document files are the most infected by this virus. Examples are Relax, Bablas etc
4. File Infectors: Exe or .com files are the target of this virus. The virus can corrupt, change or delete these files each time the program is run. Examples are Cascade and Cleevix.
5. Network Virus: This type of computer virus spread via the internet and through the local network of computers. As long as the computer is in the network it will be infected if not protected. Example is Nimda virus.
6. Logic Bomb: This is the type of coded software that will not operate until certain conditions are met. They are codes that are embedded in the operating system software on the computer. It can be there for a very long time without doing any harm until that particular instruction coded is carried out by the system operator or a specific period of time in the year. At that time the script is activated alongside the normal operation of the computer to execute the purpose for which it was written.
7. Companion Virus: This virus is written in close affinity with existing files in such a way that each time that file is executed it gets activated alongside. They are like the direct action or resident virus. They can wait until that coded action is carried out by the existing files. As they are activated and replicate themselves, they can corrupt and even replace existing file. Example : Asimov virus.
8. Overwrite Viruses: This type of virus deletes or corrupts the files that it infects in such a way that they are rendered partially or totally useless. They can completely lose their original content.The only remedy in removing the virus is to delete files affected completely. Example: Trivial.88.D
9. Fat Virus: The target of this virus is one of the most important part of the computer machine, the section responsible for information dessemination such as the files location directory, amount of space available on the hard disk, unused space etc. The virus can modify the direction or the instruction on this directory in such a way that computer operator will run the virus programme unknowingly while the original files and programs would have been moved or deleted
10. Worms: These are software program that has the ability to replicate themselves like virus with great damaging effects on the computer. It uses computer network to spread when there is security lapses e.g. ExploreZip worm.
11. Trojan Horses: Unlike computer viruses, Trojan horses do not replicate themselves but they are very dangerous and injurious. They have the ability of disguising as useful important software from the surface but can destroy the security and defence system of the computer machine thereby creating loopholes for the malicious intent of the designer to be carried out. Trojans are known for creating access for the invasion of Rootkit virus which disguise as operating system files.
12. Polymorphic Virus: This is a very deceptive type of virus. Apart from the fact that it possesses the ability to replicate itself very fast, in that same process it changes its digital signature. It guards itself with an encryption algorithm that changes its codes under prescribed conditions. So it becomes very difficult to detect it by a less sophisticated anti-virus software. Example is 1260 virus.
13. Multipartite Virus: This type of virus exploits every possible means to spread or replicate itself. In other words it can operate and spread in multiple ways using the operating system and files. The strength the virus exacts also depends on the type of programs and files install on a computer machine.
14. Browser Hijacker: This type of virus can infect a browser by modifying and redirecting an operator completely to sites not intended for malicious gains. Such viruses can later infect other parts of the operating system and files through attachments and other materials downloaded. Example: Coolwebsearch etc.
15. Web Scripting Virus: Websites uses various codes to enable it display certain features such as the ability to play an online video, music, applications etc. A virus can exploit this means to infect and gain control over the entire system.

The list of the Common types of Computer viruse goes on as it is a continuous discovery. Once an existing virus is detected and dealt with, malicious virus designers will always go back to the drawing board to device means of modifying existing ones and creating new ones. The best means to forestal becoming a victim is to be on the guard by installing appropriate anti-virus software.

Feel free to ask for more information, question and comment through the various means provided abelow. Subcribe to our Rss feeds to receive instant updates from this blog.

Friday 10 August 2012

Symptoms of Computer Viruses

August 10,2012
As a computer user there is the need to be familiar with the operations and functionality of computer machines generally. This will help early detection of anything strange as the computer is used. Computers are of different makes and configuration hence the speed and the programming varies. However, when there is abnormal behaviour of a PC it calls for examining the cause and the possible remedies. Below are symptoms of computer viruses and their effects on PC:

1. Abnormal Short Down: When a computer system often shut down abnormally apart from a power outage, there is the tendency that there is a virus infection.
2. Abnormal Booting: The system may not boot normally either it takes a longer time, or the user may have to reboot it over and over again.
3. A complete blackout: A virus infection may be responsible for this especially when it happens frequently.
4. Files slow to Open or Deleted Automatically: When files get deleted automatically and very difficult to open. When an application become corrupt when uploaded.
5. Hardware Malfunctions: When some of the hardware operates without a command, like the CD Rom opening and closing by itself.
6. Program Launches automatically: Programs or files opening by itself without the user operation or command.This could be a symptom of Computer Virus infection
7. Computer Freezes: When the PC completely freezes. This sometimes may take a very long time to boot or even to switch off.
8. Abnormal noises: When a system makes abnormal noises often, the presence of a computer virus should be probed.
9. Error messages: When error messages show often in the cause of using a computer machine.
10. Difficult to open or close a browser window: A browser window may become very difficult to open or close. In some cases an unauthorised browser switches on and behaves erratically by opening pages that are not originally installed or commanded.
11. Email sent automatically: An infected system can through a browser send unauthorized emails to addresses stored in an email account and even to strange addresses. Such email attachments could be infected with virus. Spam messages could also be received from strange addresses.
12. Task Manager Indicate Exhausted Memory: This message comes up even when there is nothing of such. It is an indication of computer virus.

Please be informed that some of these symptoms of computer viruses indicated above can also be as result of hardware fault. So a proper diagnosis should be carried out. It is pertinent to mention that the surest means of avoiding these symptoms is to install trusted anti-virus software and do a backup for your files and programs.

If you find this post useful, share it with others through the means provided below. Bookmark it and express your observation or contribution.

Computer Viruses: Causes and Solution

August 10,2012
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.

It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.

The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.

Sources of Computer Virus

Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:

1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.

Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.

They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:

1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.

If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.