Thursday, May 6, 2010

Trojan Horse

Basically how you get this virus is through software downloads. For example it can come attached to some pictures you want to download or a game, another one is file sharing like music. You can also get it from unsecure websites where you download something or email attachments. So don’t download stuff from an unknown source and don’t open email attachments from an unknown source. It is best to stick with well known trusted sites.


If you get one of these viruses it will allow a hacker (person) access to your computer. The hacker can perform operations from your computer, within the limits of your user privileges. Identity theft can happen, stealing credit card numbers and passwords. They can crash your computer or use your computer storage space making your computer slow.

The best way to remove a Trojan Horse is by an antivirus software. Antivirus software is designed to detect and delete Trojan Horse viruses. It is also supposed to help prevent them from being installed. AVG offers a free antivirus download from the internet if you do not have an antivirus installed. Because it is hard to tell what kind of damage could have taken place, it is best to erase all the data from the hard disk and reinstall the operating system and associated software.

Sunday, May 2, 2010

Barack Obama and Network Neutrality

Barack Obama fully supports network neutrality.


Barack Obama feels that “Because most Americans only have a choice of only one or two broadband carriers, carriers are tempted to impose a toll charge on content and services, discriminating against websites that are unwilling to pay for equal treatment. This could create a two-tier Internet in which websites with the best relationships with network providers can get the fastest access to consumers, while all competing websites remain in a slower lane.”

By creating a two-tier internet it threatens the innovation of the open internet and architecture of the internet. This also allows all of the bigger companies to control the internet and its contents. By having network neutrality it will ensure that new competitors, large or small, non-profit speakers or anyone for that matter, have the same opportunities as the larger companies that innovate on the internet to reach large audiences or specifically targeted audiences.

I also support network neutrality because I feel that everyone should have the same opportunities with in the internet and that it should not be controlled by the larger companies who inovate it.  This will allow everyone the same rights and access on the internet.

Read more: http://techcrunch.com/2007/11/26/qa-with-senator-barack-obama-on-key-technology-issues/#ixzz0pcbPX2ne

Wednesday, April 21, 2010

Google is developing an OS to complete with windows…..

What’s it called: Chrome OS


When will it be released: Chrome OS for notebooks should be out within a year.

The majority of people have google as their home page, so from the business stand point this could be a great concept because you could own the search as well as the operating system, you will basically own the majority of the computing experience. I am sure that google is thinking that this will boost their profits, especially when all of their profits come from advertising. So by google making their own operating system they can improve the search experience therefore increasing their advertising market because more people would be seaching.

In my opinion it is very noble for google to try and compete with Microsoft, however the reality of it is, is that 90% of computers have a Microsoft OS. It will be a long and tough road to try and compete with those kinds of numbers because even when Windows was stumbling with Vista, no one was able to compete with them then or even now.

Thursday, April 15, 2010

Linux

Linux is an operating system. (Microsoft Windows and Mac are also operating systems)


Linux is open source, which is basically shareware. It is free to the public, free of viruses and faster than other operating systems are. Linux is extremely reliable and does not require a lot of computing power. Linux is also very popular with notebooks because it requires fewer resources than Windows. It is also used in a number of smart phones as well as PC/notebooks. There are many applications for Windows and Mac that are also available for Linux.

I don’t think that Linux would be an operating system for me. I think it is more for the gamer or a person who does a lot of graphics; maybe auto cad and stuff like that. . I like Windows and everything it comes with, like the updates and tech support. However the big fault with Windows is that it does use a lot of your resources/memory. That is probably the strongest point that the Linux OS has is that it doesn’t take much to power it. Regardless, I just don’t feel Linux would be an operating system for me for everyday use.  Linux accounts for only 1-2% of the operating systems out there.  That leaves a high probability of having compatibility issues for the every days use.

Sunday, April 11, 2010

CYBER ATTACKS

FYI-An estimated 15% of computers will be controlled externally by the end of 2009.


Joseph Menn and Barret Lyon work together to help bring cyber attacks down. Barret Lyon has helped Las Vegas with their online gambling websites when they were being extorted; held hostage in exchange for money. How the hackers were doing this was by gaining access to thousands of computers through cyber holes in the system using software. Once they gained access to the computers, the hackers would flood the website with requests using their hacked computers and shut the website down until their demands were met. Las Vegas online gambling is just one example of many types of websites and businesses that are extorted.

Joseph Menn has helped to reduce Denial of Service attacks (DoS) and track down the hackers. Some ways that they are able to do this is by a Microsoft program called SNM protocol which is used to look into the brain of a computer and see who is communicating with the computer. At this point they were able to gain access to some of the information on the hackers and pretend to be a friend and collect information from them. Another way that they gained access to the hackers’ information was through logging systems designed to send an alert when someone was logging into a system using their nickname. Often, a nickname would be connected to another information resource or source of registration that contained their real information (name, address, phone number, etc.).

Joseph Menn and Barret Lyon are claiming that a Geo Political Struggle is what is behind many of today’s cyber attacks; having the ability to shut down other political services/systems, steal commercial and military secrets, and even shut down the electrical grid. Pretty soon war will not be with guns and bombs but, it will be a cyber war.

Sunday, April 4, 2010

NAS (Network Attached Stored)

NAS is a computer data storage connected to a computer network. However you do not need multiple computers to get good use of a NAS. NAS is a great multimedia storage device that can have multiple hard drives. For the i-tunes junkie you can stream music, photos, and video to network media players (xbox 360 is an example) without the computer. You can also access files from anywhere via internet connection. Most NAS have USB ports so you can connect USB hard drives, flash drives, printers, etc. When you have multiple drives your data is automatically duplicated to provide file protection and back up.


NAS installation requirements are Windows 2000 and up. NAS is easy to install using an installation CD, power cord, and Ethernet cable. The standard storage space is 1TB, but I have seen them up to 8TB.

http://www.pcworld.com/reviews/collection/1651/top_10_network_attached_storage_devices.html

http://reviews.cnet.com/best-network-attached-storage/

Thursday, March 25, 2010

Week 8

System BIOS


Information

CPU Intel Celeron (R) M

CPU Speed 1860MHz

Product Aspire 3680

Manufacturer Acer



Main

System Memory 634KB

Extended Memory 1526MB

Video Memory 64MB



Terms to use…….

DMA (direct memory access) transfers data from between the hard drive and memory with out involving the CPU. It’s the same sense of a freeway that directly connects Reno to Carson, bypassing Washoe Valley.

Low level formatting is the outlining of the positions of the tracks and sectors on the hard disk. This is basically the physical format that defines where the data is stored on the disk. When it leaves the factory the disk platters (sectors and tracks) are empty.

SATA (Serial Advanced Technology Advancement) uses a serial data path instead of the parallel path. Basically the difference between SATA and ATA is the chord used, it’s like using an regular HD chord for your TV (ATA) or you can use the new HDMI chord (SATA) which gives you much better resolution. SATA is faster on how it interfaces.

ATA (Advanced Technology Advancement) is an interface(communication) used for controlling computer drives. Uses a parallel path.

IDE is a standard interface between the motherboard data paths and the disk storage devices, basically it is a connector.