Monday, 8 July 2013

Types Of Computer Viruses

{This copyright is copy paste from :http://www.computervirusremovalguide.com/the-common-types-of-computer-virus.php}



Presuming you are already familiar with what a computer virus is, how it spreads, and what it does, it is time for you to learn that there are a few different types of computer virus. Let’s see what these types are and how each of these computer viruses behaves.
Boot viruses
Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk. The boot record program loads the operating system in the memory at startup. These viruses replace the boot record and move it to a different part of the hard disk, or simply overwrite it. As you can imagine, once you start your operating system, it loads into memory, along with the virus. Once the virus is in the memory, it is free to do whatever it was programmed to do. To avoid loading the boot record viruses into memory, you must boot your operating system from another source (another hard drive or a bootable CD/DVD).
Program viruses
These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). Once executed, these programs load into memory, along with the virus contained within them. Once in the memory, the scenario repeats – the virus is free to act and infect other files or simply deliver its payload. These viruses are friendlier than boot viruses and can be removed a lot easier.
Multipartite viruses
These computer viruses are hybrids, derived from boot viruses and program viruses. They infect executable files, just like the program viruses but, once the executable is executed, it infects the master boot records. The scenario is similar to the boot virus’s one: once you boot your operating system, the virus is loaded into the memory, from where it is free to infect other programs and replicate itself, ultimately delivering the payload.
Stealth viruses
These viruses are specialized in avoiding detection and will use a number of techniques to do so. Most of them simply redirect the hard disk head, forcing it to read another memory sector instead of their own. Some of them also alter the reading of the file size shown when listing the directory. These types of computer virus are very hard to find by humans, but antivirus software is specially designed to track them down and erase them.
Polymorphic viruses
The polymorphic viruses will always change their source code from one infection to another. Each infection is different, and this makes detection very hard. However, detection is still possible, depending on the antivirus.
Macro viruses
This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus. The virus infects the Normal.dot template, which is a general file used by all the documents. So, whenever you open an uninfected document, by referring to the Normal.dot file, it gets infected as well. This infection can only spread if infected documents are opened on another machine.
Active X viruses
Most people do not know how to configure ActiveX and Java controls, unconsciously leaving a security hole. Applets are then allowed to run freely on the machine, delivering all ActiveX viruses. By simply turning off some ActiveX and Java controls in the browser, a user can efficiently protect their PC from this type of computer virus.

What Is RAM ???

{This is copy paste from :http://www.webopedia.com/TERM/R/RAM.html }


RAM (pronounced ramm) is an acronym for random access memory, a type ofcomputer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such asprinters.

Types of RAM

There are two different types of RAM:
The two types of RAM differ in the technology they use to hold data, with DRAM being the more common type. In terms of speed, SRAM is faster. DRAM needs to be refreshed thousands of times per second while SRAM does not need to be refreshed, which is what makes it faster than DRAM.
DRAM supports access times of about 60 nanoseconds, SRAM can give access times as low as 10 nanoseconds. Despite SRAM being faster, it's not as commonly used as DRAM because it's so much more expensive. Both types of RAM are volatile, meaning that they lose their contents when the power is turned off.

How to prevent computer viruses ?



You must run quality security software on your computers to protect your work and private data from viruses, spyware, and other security threats. When it comes to security, there is no substitute for quality. See below our recommended quality solutions. If any of the following is difficult for you, get an IT Expert to do it for you. You must do the following or risk all of your work/data being compromised (think of it as locking your front door):
  1. Get good anti virus software e.g. one of the below.
    Recommended anti virus software:AVG - Our most recommended Antiv Virus software.
    Norton Anti virus
    McAffee Anti Virus
    - Sophos Anti Virus

    Be sure to regularly update your 'virus definitions' e.g. once per week
  2. Install a quality Firewall
    There are many firewalls available, some good, some bad. Our recommendation is the FREE ZoneAlarm. They provide a paid version with extra tools (of course), but we think the free firewall-only option is fine. Its getting harder on their site to see the free one (so look carefully!). At time of writing, go here, scroll down and click the free option. If the above link doesn't work, start looking from the Zone Alarm front page.
  3. Install an anti-spyware application
    There are many available, some good, some bad. Our recommendation is the FREE: Spybot - Search & Destroy. Download here, and find Spybot info here.
  4. Email Attachments: BEWARE OF ATTACHMENTS. Do not open email attachments you are not expecting. Viruses come with some very nasty messages to trick you into opening the attachement e.g. "Your email account has been cancelled, see attachment for details". Even worse, the virus looks like it comes from an email address you recognise e.g. from admin@yourDomain.com (where 'your domain' is the domain name that you use). Virus attachments can have the following 'file extension': .exe, .pif. If you receive a .zip attachment and open it - make sure it doesn't contain a file with one of those extensions. Do not open attachments you haven't requested, even if they appear to be from people you know.

{# COPY PASTE FROM :http://www.wordsandpeople.co.uk/security/tips-to-prevent-computer-viruses.htm}

What Is Computer Virus ??

Add caption

A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.
By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. 
When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.
A virus program contains instructions to initiate some sort of "event" that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:

Monday, 1 July 2013

Assalamualaikum wbt to all my classmate, AS120 4A2.Today we have been told to create a blog for uses of  subject CSC 134. Below this i include some information about myself,hope we all get to know each other better afterwards. :)


Name:Rashidah bt Abd Manaf
Age:20 years old
Date of birth: 27-01-1993
Place of birth:Taman Melawati,Selangor
Sibling: 4 ( i'm the youngest one,3 boys 1 girl)
Place of study: UiTM kuala pilah.(dip science)