Video Rating: 4 / 5
17th International Conference on Computer and Information Technology (ICCIT) 2014 held on December 22-23, 2014 at Daffodil International University Permanent Campus at Ashulia, Savar, Dhaka.
Mr. Zunaid Ahmed Palak, MP Honorable State Minister, Ministry of Post, Telecommunications and Information Technology, Government of the People’s Republic of Bangladesh inaugurated the conference as the Chief Guest.
Video Rating: 5 / 5
The computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just does not seem to open.
Maybe you have a virus.
Just what exactly is a virus? What type is your computer? How is it there? How is it spread havoc and ruin that? And why is it bothering with your computer anyway?
Viruses are pieces of code that make copies of themselves, or replicate, in the computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses do not bother to ask your permission at all! Very invasive.
By comparison, there are bits of code that can replicate in the computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your permission (or at least your IT guy permission). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of antivirus software maker McAfee Inc.
In this article, though, we’re not the good guys or the cops. We will talk about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses consist of a similar breed. They performed on your computer perhaps through an email attachment or a floppy disk (remember those?). When they committed themselves to your files, say your Microsoft Word program.
If your Microsoft Word program is opened, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files that are furthest from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
The virus code contains hundreds or thousands of instructions. If it is a replica insert these instructions in the files it infects, said Carey Nach Berg, Chief Architect at Symantec Research Labs, an arm of anti-virus software maker Symantec. Corp
With so many different types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist, but they are not as prevalent as they are used. (Maybe we can make classic viruses on the shelf with Hemingway and Dickens.)
These days, in modern times, viruses are known to spread through vulnerabilities in web browsers, files shared over the Internet, e-mails themselves, and computer networks.
Far as browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it is used by more people for web surfing than any other browser.
Still, “Any web browser potentially has vulnerabilities,” said Berg Nach.
For example, let’s say you go to a website in IE you have every reason to think is safe, Nach Berg said.
But unfortunately it is not. It has virus code hidden in the background that IE does not protect you against. While you’re looking at the site, the virus is downloaded onto your computer, he said. This is a way of catching a nasty virus.
During the past two years, another common way of catching a virus is through downloads computer users share with each other, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music lovers may think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus directly into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites as one to share it with everyone.
Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, you have a preview pane below your list of e-mails the contents of the e-mail you have selected shows? If so, you put yourself in danger.
Some viruses, though a small percentage in Nach Mountain, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is check your e-mail to a potential virus, Kuo added. For example, have you ever opened or viewed an e-mail stating that the “loading”? Well, if everything is “loaded”, a virus in the e-mail can only be loaded to your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview window. (You must click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses in your computer via networks, Kuo said. They travel from machine to machine and, unlike the classic viruses, although the machine itself rather than individual files attack.
Worms sit in your memory, or RAM, Nach Berg said.
OK, so we talked about how the viruses get into a computer. How they cause so much damage once they’re there?
Let’s say you have a classic virus, one that replicates and attacks various files on your computer caught. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it would eventually crash the program, Nach Berg said. It would also harm your computer as it looks for new targets to infect.
This process of infecting targets and looking for new could end up using your computer’s ability to function, he said.
Often the destruction caused by a virus associated with a particular event or date and time, called a trigger. For example, a virus can be programmed to make dormant until January 28. When that date rolls around, though, it can be programmed to do something so harmless, but annoying as splash popups on your screen, or something as severe as reformat hard drive on your computer, Nach Berg said.
There are other possible causes, but for a virus on your computer to malfunction or slow to act in bizarre ways. And that leads us to a new segment – the reason virus writers would want their time creating viruses in the first place waste.
The majority of viruses are still written by teenagers looking for some notoriety, Nach Berg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we need the “backdoor” concept to explain.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of an ET). Once the virus writer receives the signal, they can use and abuse of your computer to their own taste.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code that you could download to your computer, say, a new group. As in the Trojan war it is named, they are usually disguised as harmless bits of code. But Trojans are not viruses because they are deemed not replicated.
Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends a virus that ends up infecting thousands of machines. But he does not want the FBI on his case. So he instructs the viruses on the various machines to send their signals, obviously not on his computer, but a place that can not be traced. Hotmail email happens as an example of such a place, Kuo said.
OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam from those computers and send it to other machines, Nach Berg said.
That’s right. Some spam you receive in your e-mail now may originally have been sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities in tracing the original senders of spam, they were hard on spam itself. Spammers do not want that.
Ever heard of phishing emails? Those are the ones who claim to be from your Internet service provider or bank. They typically request some information from you such as your credit card number. The problem is not your internet service provider or your bank. They are evil people after your credit card number! Well, these emails are often sent the same way spam is sent by sending them via innocent computers.
Of course makers of anti-virus software using a variety of methods of attack to combat viruses. Norton, for instance, uses signature scanning, Nach Berg said.
Signature scanning is similar to the process of looking for DNA fingerprinting, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it considers its large database of other bad code. Then use this extensive database to find and match the code with similar code in your computer. When it finds such virus code, let me know you!
© 2004 by Kara Glover
Feel free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know what was found: firstname.lastname@example.org
Need help withfixing a slow computer ask a question at wwdn.org
The world has changed a lot in the last decade and people have improved their living standards as well. The basic reason for this improvement in the last decade is the introduction of new technology. There have been a number of revolutions in new technology over the last decade, and progress is continually being made. Computing has changed as well. Now, users are not always aware of the myriad services they enjoy on a daily basis. They receive services, but they no clear concept of how these services work. They have only a basic idea of the services, but the platform of that service is hidden. Cloud computing is a type of computing in which a user cannot pinpoint the exact physical location of the service provider. They have the ability to access some services and they can utilize them as well, but there would be no chance for them to follow their data through the whole cycle.
Cloud computing utilizes a combination that includes numbers of services to the users. All users can access network storage, software and many other resources, but the exact location of the server and processing is a complete cloud for all these users. They could never guess the exact location of these resources. They get services from the network, but this network is actually a combination of different service providers. The concept of virtualization is also regarded as the same, and it can be considered the next alternative of this style of computing. This alternative concept means that there would be something in particular that is not actually there in a physical way. There is something hidden, which we call virtual.
This is quite relevant to the new style of computing in which users are unable to find the platforms of the services they use. They could be using some advanced networking features like NAS storage, and they would still be unaware about the exact location. This is the new style of technology, and the Internet has played a great role in the improvisation of this new computing style. Users are able to access the servers that provide them services. They are utilizing the services of all those servers, but they are unable to know that if the server is located in their own country or not. People all over the world use computers and they do get in touch over the Internet as well.
New technology like cloud computing, virtualization and NAS storage promotes social development.
In this video, I will show you how to root your HTC One M8 in a newbie-friendly step-by-step fashion on a MAC Computer.
This tutorial covers:
1- Unlocking the bootloader of your HTC One
2 – Installing a Custom Recovery
3 – Rooting your HTC One
Like & subscribe for update video daily : http://bit.ly/TechNews123
See more video Review Tips & Trick for iPhone devices: http://bit.ly/iPhoneallinone
See more video Review Tips & Trick for Samsung devices : http://bit.ly/Samsungallinone
See more video Review Tips & Trick for HTC devices : Lhttp://bit.ly/htcallinone
Thanks for watching 🙂
Tag Mobile :
mobile,handy,handy test,handy vergleich,outdoor handy,dual sim
handy,samsung handy,handy verkaufen,handy ohne vertrag,handy kaufen,handy mit vertrag,prepaid handy,handy angebote,handy preisvergleich,handy bundle,handy top 10,handy kaufen ohne vertrag,handy suche,handy günstig kaufen,handy billig kaufen,handy neuheiten,handy billig,touch handy,billig handy,handy angebote ohne vertrag,handy billiger,handy shop,handy discount,handy online kaufen,gebrauchte handy,billiges handy,tatsch handy,handy ohne vertrag günstig kaufen,handy vertragsfrei,handy bundles,billige handy,günstig handy,günstige handy,handy online shop,handy mit zugabe,handy preise,handy online t mobile,t mobile phones,t mobile phones for sale
PC malfunctioning? Is it running sluggishly? Is computer infected by viruses? Computer repair services UK is the ultimate solution for all your PC issues. This service provider offers remote PC support to the computer users for troubleshooting all types of PC issues. Online computer repairs are now very popular in today’s high tech world. This mode of computer repair is considered as one of the best options as the users do not have to drag the computer to a repair shop and then wait for days to get it back.
The company offers wide and diverse range of computer repair services for troubleshooting any type of PC issues. Some of the notable services from the service provider are as follows:
Here you get operating system support for all operating system including Macintosh, Linux, and Windows OS. For both laptops and desktops services are offered. In addition to OS support, the company also helps to optimize the Registry settings and fine tune your computer so that it can perform at its best. Services include Apple Mac Support, Windows XP support, Vista Solutions, Linux Set up, and Windows7 Support, etc.
If you come across any internet and network related problem, then too computer repair services UK is the choice for you. The technicians fix the issues related to the set up of Internet, Wi-fi, or any problems. The company also offers end to end solution for all PC peripherals such as scanner, printer, sound boxes, web camera as well as Apple Products (iPod), MP3 Players, Scanners, Digital Cameras, Printers, PDA/Smartphones, etc.
If you want to protect your computer from various malicious objects then too you will get support from this PC repair company. With its PC security support you will be able to shield your computer from any kind of malicious threats. It offers the best of techniques and tools to scan and protect your system. Whether you are using Windows OS or MAC OS or Linux you will get comprehensive support from them.
Technicians are highly experienced and they take special care at the time of analyzing and resolving computer issues. Services are offered round the clock and so you can avail it anytime. Apart from above mentioned services, the company also offers reliable data recovery and backup services Virus Removal Support, PC Health Checkup and PC Speedup Support, etc.
Tech support from computer repair services UK are also very much pocket friendly. There is no need to spend a lot of money to repair your PC problem. According to your requirements you can pick any of the tech support plans and enjoy safe and hassle-free computing.
Related Computer Tech News Articles
Subscribe to MOTHERBOARD for the best science and technology documentaries here: http://bit.ly/Subscribe-to-MOTHERBOARD
In spring of 2013, Texas-based start up TrackingPoint Solutions released the first ever precision-guided firearm, which is essentially a long-range, laser-guided robo rifle. Call it the gun of tomorrow: The technology is so advanced we’ve heard it can have beginners killing at extreme distances with single-shot accuracy in mere minutes.
The PGF’s closed-loop system is based off jetfighter lock and launch technology, something TrackingPoint CEO Jason Schauble says not only marks the next great paradigm shift in the evolution of firearms—it helps users make ethical kill shots too. But critics of the PGF platform, no doubt part and parcel of a rising tide of intelligent killer apps, say the gun, or rather its proprietary scope, marks the dawn of “skill-free killing”.
In LONG SHOT Motherboard visits West Texas, the frontline of smart weapons. We get a backcountry crash course through the PGF, hear about TrackingPoint’s plans to apply its system to a veritable suite of advanced weaponry, all built on custom software that promises to have novice shots like us to killing at 1,000 yards—and in the near future, potentially 3,000 yards—with single-shot accuracy, and try to untangle an increasingly knotty firearms debate in light of the so-called gamification of killing and, sadly, yet another mass shooting.
Has killing become too easy?
Read more on MOTHERBOARD here: http://motherboard.vice.com/blog/long-shot-inside-the-scope-of-smart-weapons
BBC News countdown, Regional opening titles and International opening titles and BBC News at 1,6,10.
Video Rating: 4 / 5
Is your computer taking too much time to boot up? Or do you need to wait long time to get response from an application? Slow computer is a very common problem which all the computer users experience. There are many reasons for which computers slow down over time. Lack of proper maintenance is one of them. There might be virus issues as well. Sometimes due to operating system issues also reduce the speed of the computer. To fix slow PC problem, you can consult a computer repair services company.
It is commonly seen that registry errors, useless junk files mostly stop the computers to perform at its best. Although it is not so easy for an average computer user to speed up a slow computer yet there are some simple things which could be done to troubleshoot slow PC Problem.
The first thing you should do is to uninstall the unnecessary programs. It is commonly seen that computer users install many programs but they hardly work with those software. So, ultimately these programs take up valuable memory and slow down the computer. Go through the program list and check the programs which dont use at all. Uninstall them one by one from your computer.
To make your computer perform at its best it is very important to have updated programs. First make sure that the Windows operating system on your computer is up-to-date. Although it is always recommend to turn on the automatic updates, but if not then turn it on and install the latest updates and patches.
According to MICROSOFT, If your PC is slower than normal at performing routine tasks, you may have spyware. Spyware is a small program which is used by the hackers to steal information about your internet activity. If the PC performance decreases significantly, it might be possible that there is spyware on your computer. You should remove Spyware and other Malware for better performance and protection. Install anti-spyware and anti-malware programs.
Virus infection is another common reason for which PC performance decreases. Viruses are small programs which are being installed without your knowledge and eat up resources on the computer and gradually slow down the PC. It is a must to install an antivirus software program on your computer. If it is already installed, probably its not updated for long. For the best protection, the virus definition of the antivirus software needs to be updated. Turn the automatic update option on so that it could install the updates on its own. If you are using trial version of the antivirus, go for the full version for complete protection. Run complete scan and kill all the viruses and you will notice a significant improvement on PC performance.
These are some simple things which you could easily do to speed up your computer. You can also get computer tech support from an expert.
There are many PC repair companies that offer PC speed up support to the computer users. Browse internet and get in touch with any of these companies for enjoying hassle-free computing.
For more latest tech news and product reviews
SUBSCRIBE to http://www.youtube.com/user/TechyGUYS
future for mobile phones
future mobile applications
future mobile computing
future mobile phone
future mobile phone technology
future mobile phones
future mobile technology
future of mobile
future of mobile applications
future of mobile computing
future of mobile phone
future of mobile phones
future of mobile technology
future of t mobile
future of the mobile phone
future technology mobile phones
latest mobile phone prices in pakistan
latest mobile phone samsung
latest mobile phone sony ericsson
latest mobile phone technology
latest mobile phone with price
latest mobile phones
latest mobile phones 2011
latest mobile phones and prices
latest mobile phones coming soon
latest mobile phones from samsung
latest mobile phones htc
latest mobile phones in india
latest mobile phones in market
latest mobile phones in pakistan
latest mobile phones in samsung
latest mobile phones in sony ericsson
latest mobile phones in the market
latest mobile phones india
latest mobile phones micromax
latest mobile phones models
latest mobile phones of micromax
latest mobile phones of samsung
latest mobile phones of sony ericsson
latest mobile phones on the market
latest mobile phones price
latest mobile phones price in india
latest mobile phones price list
latest mobile phones prices
latest mobile phones prices in india
latest mobile phones samsung
latest mobile phones sony ericsson
latest mobile phones technology
latest mobile phones touch screen
latest mobile phones with price
latest mobile phones with price list
latest mobile phones with prices
latest samsung galaxy mobile
latest samsung mobile
latest samsung mobile in india
latest samsung mobile india
latest samsung mobile models
latest samsung mobile phone
latest samsung mobile phone in india
latest samsung mobile phones
latest samsung mobile phones in india
latest samsung mobile phones prices
latest samsung mobile phones with price
latest samsung mobile phones with prices
latest samsung mobile price
latest samsung mobile price in india
latest samsung mobile price list
latest samsung mobile prices
latest samsung mobile prices in india
latest samsung mobile with price
latest samsung mobile with price list
latest smart mobile phones
latest technology in mobile
latest technology in mobile phone
latest technology in mobile phones
latest technology mobile
latest technology mobile phone
latest technology mobile phones
latest technology of mobile phones
latest touch mobile phones
latest touch screen mobile phones
latest wallpaper for mobile
latest wallpapers for mobile
latest wallpapers of mobile
latest windows mobile
micromax latest mobile
micromax latest mobile phone
micromax latest mobile phones
micromax mobile india
micromax mobile latest
micromax mobile models
micromax mobile price
micromax mobile prices
micromax new latest mobile
mobile technology and business
mobile technology applications
mobile technology company
mobile technology development
mobile technology devices
mobile technology education
mobile technology for business
mobile technology future
mobile technology future
mobile technology healthcare
mobile technology in business
mobile technology in education
mobile technology in healthcare
mobile technology in india
mobile technology information
mobile technology news
mobile technology pdf
mobile technology ppt
mobile technology security
mobile technology services
mobile technology software
mobile technology trends
mobile telecommunication technology
new technology for mobile phones
new technology in mobile
new technology in mobile phones
new technology mobile
new technology mobile phone
new technology mobile phones
new technology of mobile
new technology of mobile phones
sony ericson latest mobile
sony ericsson latest mobile
sony ericsson latest mobile in india
sony ericsson latest mobile phone
sony ericsson latest mobile phones
sony ericsson mobile
sony ericsson new latest mobile
sony latest mobile phones
sony latest mobile phones in india
sony mobile phones
sony mobile price
spb mobile shell
spice latest mobile
spice mobile india
spice mobile price
windows mobile 6
windows mobile 6.1
windows mobile 6.5
windows mobile 7
windows mobile applications
windows mobile apps
windows mobile games
windows mobile marketplace
windows mobile phone
windows mobile phones
windows mobile software
windows mobile update
wireless and mobile technology
wireless mobile technology
Video Rating: 5 / 5
Talking tech on London Live with news of the Kano computer kit for kids, Vivino wine app and the Google’s StreetView camel
Video Rating: 0 / 5
24 Oras is GMA Network’s flagship newscast, anchored by Mike Enriquez and Mel Tiangco. It airs on GMA-7 Mondays to Fridays at 6:30 PM (PHL Time) and on weekends at 5:30 PM. For more videos from 24 Oras, visit http://www.gmanetwork.com/24oras.
Video Rating: 5 / 5