Posts

Showing posts from April 12, 2009

Definitions Part II

Array Collection of variables of same name, same data type, same size BUT different subscript numbers/element numbers.eg. an array to store names of ten students of a class may be defined in acomputer language like : DIM names [10] . ARU Audio Respond Unit. Used as output device. gives out output in voice form. ASCII American Standard Code for Information Interchange. It is a character set used as a standard to store and retrieve, send and recieve data and information on different media. Assembler Converts programs written into assembly language into machine language. It does it line by line. Assembly language A low level language, bit easy as compared to machine language but quite difficult as compared to high level languages. Needs an assembler to translate it's code into machine code. Asynchronous transmission A type of transmission that sends data using flow control rather than a clock to synchronize data between the source and destination. AT Advance Technology. Class of IBM

How To Deal With Computer Virus?

Virus Effect your system in different ways. Most of the time slow internet browsing due to virus effect; infects virus attack on Network Services; (svchost.exe) you suffer Slow Internet Browsing or if you suffer slow Computer Speed. Some time virus attack on your system resources and utilize the full processor speed. In this condition you should restart your computer and then speed will be normal but after some time virus again make your system speed slow. In these conditions, if you don’t have any antivirus installed in your computer then do the following steps. What should you do? When you have Virus in Your Computer? When your computer infected with Virus? Follow the Following Steps 1. Call IT support If you have an IT support department at your disposal, notify them immediately and follow their instructions. 2. Disconnect your computer from the Internet Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be u

Free Hard Disk Data Recovery

Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition, Restoration also provides an option to wipe the found files beyond simple recovery. And as such it is not only a data-recovery tool but also a security cleanup application. You can use it after deletion of confidential documents, embarrassing files and so on. The program is very small and standalone, it does not require installation and can also run from a Floppy disk. Restoration works with FAT and NTFS as well as digital cameras cards. http://hccweb1.bai.ne.jp/~hcj58401/REST2514.EXE

Types of Computer Virus

Adware: *A form of spyware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns. Software that is given to the user with advertisements already embedded in the application Malware: *Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. Script Kiddie: *A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. A script kiddie is not looking to target specific information or a specific company but rather uses knowledge of a vulnerability to scan the entire Internet for a victim that possesses that vulnerability. Spyware: *Any software that covertly gathers user information through

Virus Resources

F-PROT: http://www.f-prot.com/virusinfo/ F-Secure: http://www.f-secure.com/v-descs/ McAfee : http://vil.nai.com/vil/default.asp Symantec Norton: http://www.symantec.com/avcenter/ Trend Micro: http://www.trendmicro.com/vinfo/ NIST GOV: http://csrc.nist.gov/virus/ Free software AVG Anti-Virus - http://free.grisoft.com Free F-Prot - http://www.f-prot.com Free for home users Free online Virus scan BitDefender - http://www.bitdefender.com/scan Computer Associates - http://www3.ca.com/securityadvisor/virusinfo/scan.aspx HouseCall - http://housecall.trendmicro.com McAffe - http://us.mcafee.com/root/mfs Panda ActiveScan - http://www.pandasoftware.es/activescan/activescan-com.asp RAV Antivirus - http://www.ravantivirus.com/scan Free online Trojan scan TrojanScan - http://www.windowsecurity.com/trojanscan/ Free online Security scan Symanted Security Check - http://security.symantec.com/sscv6 Test my Firewall - http://www.testmyfirewall.com/ More Security Resources Forum of Incident Response and

Information Systems Security Training

Virus damage estimated at $55 billion in 2003. “SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Companies lost roughly $20 billion to $30 billion in 2002 from the virus attacks, up from about $13 billion in 2001, according to various industry estimates.” This was the story across thousands of news agencies desk January 2004. Out of $55 billion, how much did it cost your company? How much did it cost someone you know? The purpose of this class is to inform the attendee about how malicious code works, how they spread, and how to protect yourself from infection. The most well know viruses will be covered in the first part of the presentations along with the most recent. The attendee will also learn several methods (while used in combination) that will minimize both risk of infection and potential damages caused b