Know about different viruses(adware,trojans,spywares etc)

Virus Science: Adware Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can't be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Trojan horses (short Trojans) Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differenciates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that 'drops' viruses, i.e. embeds viruses on the computer system. Spyware Spyware are so called spy programs that intercept or take partial control of a computer's operation without the user's informed consent. Spyware is designed to expolit infected computers for commerical gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is able to detect this kind of software with the category "ADSPY" or "adware-spyware". Backdoors A backdoor can gain access to a computer by going around the computer access security mechanisms. A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system. Boot viruses The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more… Bot-Net A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc., partly without the affected PC user's knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses. Dialer A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge. EICAR test file The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus. Exploit An exploit (security gap) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access. Grayware Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically. Hoaxes The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the "danger". Honeypot A honeypot is a service (program or server), which is installed in a network. It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user - because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off. Keystroke logging Keystroke logging is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Like this, confidential and personal data, such as passwords or PINs, can be spied and sent to other computers via the Internet. Macro viruses Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application. Polymorph viruses Polymorph viruses are the real masters of disguise. They change their own programming codes - and are therefore very hard to detect. Program viruses A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule. Script viruses and worms Such viruses are extremely easy to program and they can spread - if the required technology is on hand - within a few hours via email round the globe. Script viruses and worms use a script language such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread by activation of operating system functions. This frequently happens via email or through the exchange of files (documents). A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures. Zombie A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service- (DoS) attacks at command or send spam and phishing emails. (source:avira)

GUADI:Google Audio Indexing from google labs

"to organize the world's information and make it universally accessible and useful"- its a google's mission.So by near future you will be searching for videos not only by their TITLES but also the words spoken by them in the video.... GUADI :Google Audio Indexing tries to make it easier for people to find and consume spoken content from videos on the Web. What is Google Audio Indexing?

Google Audio Indexing is a new technology from Google that allows users to better search and watch videos from various YouTube channels. It uses speech technology to find spoken words inside videos and lets the user jump to the right portion of the video where these words are spoken.

Searching inside a video

With Google Audio Indexing, you can also restrict your search to the content of a given video. By default, the "Search inside this video" uses the same query term as the video search. To search for a different term, just type your query in the text form under the video player and press the "Search within this video" button. The mention results are displayed underneath. The yellow markers on the timeline are updated accordingly and you can access the information just like before, using mouse over.

My Four softwares for Security and better Performs of Windows XP

My Security Software: Before introducing about security related softwares and any other softwares. I want to give one suggestion to you is, do not use cracks or other for the security related software like Anti-virus, Spyware scanners and more... because it damages that software or ideal on some location when scan your system. It results to harm your system and hacks your personal information like username & passwords, Credit card information, Bank accounts & their information and more...... The other way for your security is use freeware security-related software mean which are freely available. Anti-virus: My favorite and free anti-virus software is Avast Home Edition. It is free for use and download from . Present the Avast Home Edition 4.8 version is available. Features: Shields: Mail Shield, IM Shield (messenger), Outlook, POP and SMTP, Web shield, Stand Shield (Real-time scan), P2P Shield, Network Shield. Services: Quick-scan, Full computer scan, manual scan (Folder, File, Type), Real-Time scan (it runs backside to scan when plug pen-drives, CD, and more) and more... Spyware and Malware Scanner: Spybot - Search & Destroy is a Spyware and Malware scanner and it is also available free for use and download from . Currently the Spybot - Search & Destroy 1.6 is available. Features: It checks and fix the Spywares and Malwares, Immunize(recover) and Protects from Web Browsers like Internet Explorer, Mozilla Firefox and other from their Cookies, images, Popups, domains, IPs, PlugIns, hosts and more It recovers the system which are damaged for last scan and much more.... System boost-up Software: I am written many articles about how to keep the system with better performs by different tricks, tips and software once again I am introduce Ccleaner, AusLogics Disk Defrag software for the system better performs. It improves upto 75% of the system performs. Ccleaner (freeware): Before introducing about the software I want to give some reasons why the systems slowdowns. After that you can understand how the software is works. Mostly of the systems slowdown by low free space on the Windows (OS) installed local drive drives. There are many ways to lowdown the free space of the OS disk drives. The first and main thing is regular installation of the bulk softwares, games, tools and much more. It results to occupies the free space of the disk and it results to lowdown the free space of the OS disk. It is troubleshooting by uninstalling multiple media-players, image editors, video editors and more...For example you can use VLC player, windows media player, Winamp and more software for playing the songs and videos. It is better to keep your favorite media player and uninstall all other players. The second thing is when installing the number of software it results to increase the number of Startup items which are seen in right side of the taskbar. By this you can wait upto after loading of Startup items like Yahoo Messenger, auto-update tools and much more. The third thing is when we installed the software there are extract to any other location in the OS drive and after that it will install in to the system and after clear the extracted files it means temporary files. Some times some software not clears the extracted files for the backup or other. It results to lowdown the free space of the OS disk drive. The fourth thing is when you install software it registration the entries in the system which your are seen in the Registry Editor. This registration also loads on startup. when uninstall the software some are not removes this entries. It is also results to slowdowns the system. In above four reasons is clear and troubleshooting by the Ccleaner Software. It is a freeware software it is free of use and download from the currently the 2.0 version is available. It has a three options to clear the above four options. ● The First option is Cleaner. It is see on the left-side of the Ccleaner application. It can clear the Temporary File, Temporary Internet File (which are downloaded by the browser), Cookies, Histories and much more... (Related to third thing) ● The second option is Registry. It is also see in the left-side of the Ccleaner application. It can clears and removes the unnecessary registries entries in the system.(Related to fourth thing) ● The third option is tools. It is also see int the left-side of the Ccleaner application. It again contain two options are Uninstall and Startup. The uninstall option is the uninstall utility tool option it is used to uninstall the installed applications in the system (Related to the First thing). ● And the last option is Startup. It is see on the tools option. It is used to disable the Startup application which are see in the Right-side of the taskbar. We can use this option carefully don't disable the security related applications like anti-virus, Spyware remove tools and more and also the system related application and tools like Audio & video drivers like a speaker icon seen the left-side of the taskbar it is used to control the Audio hardware section. Take very careful about this option. AusLogics Disk Defrag: It is defragment utility tool. It is also free of use and download from the site . When you can install and uninstall the software it results to creates the gap between the files in disk. After that when you install the software it install in that gaps more then its size it means the gap size is 1MB the installed file size is more then 1MB and it results to fragment the files of installed and already install applications. It is clear and troubleshooting by using AusLogics Disk Defrag. Just open the application. Chouse the drive which you want to defragment and click next button on the bottom of the application it will starts the defragment and complete in few seconds. And enjoy it.

Free Linux CD absolutely free of cost from some companies

You can get free Linux CDs absolutely free of cost. Yes it is really free. Normally the Linux distributors, distribute there Linux OS freely in online download. But it takes lot of time to download for slow Internet users. But there have a free Linux CD distributors and courier there free CD to your address. Choose and Get your free Linux CD’s from following: Ubuntu: It is one of the most popular Linux OS. It is based on Debian Linux. We can get this CD from the following this link . Unbrokable Linux: It is created by the Oracle Company. Get it by the following link . OpenSolaries: It is created by the company. It is also one of the popular OS used for Data Center. And it also gives Desktop Editions. We can get it by the follow by this link There is no matter which Linux is best. If you want more visit their home websites and see their features or visit the site http://en/ or search on web or more... Get ready to taste the Free Software’s which are bleeding from the Open source software’s, Free Software Founders (FSF) and more.

Access the data of a password protected User in windows XP IN case the PC fails to BOOT

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won't be able to access them from outside, so here is a method for getting around this. DO THE FOLLOWING:
  1. Boot the machine from Windows XP bootable CD.
  2. At the setup screen, select R to repair using Recovery Console.
  3. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).
  4. Type 'HELP' (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available.
  5. Change the current directory to the user's directory where you want to backup.
  6. Type 'CD "C:\Documents and Settings\X"' (without single quotes) and press enter. Where X is the username.
  7. Now the current directory will change to "C:\Documents and Settings\X".
  8. Now change the directory to Desktop by entering 'CD Desktop' (without single quotes) and press enter to go to the desktop folder.
  9. Type 'DIR' (Without single quotes) and press enter, you will be listed all the available files in Desktop.
  10. Type 'COPY a.doc D:\BACKUP' (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files.
  11. As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc.
  12. Note that you cannot use wildcards for COPY. I.e, you cannot copy all the files in a folder at once. You must copy one file by one.
  13. (Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.)

Windows Cloud OS Release with in a month

Microsoft CEO Steve Ballmer announces that within a month, MS will release a new operating system he described as "Windows Cloud"—for webapp developers working on "cloud computing" apps like Zoho Suite and, um, Gmail (except not those). Computerworld reports: The operating system, which will likely have a different name, is intended for developers writing cloud-computing applications, said Ballmer, who spoke to an auditorium of IT managers at a Microsoft-sponsored conference in London. The Windows Cloud OS is a separate project from the upcoming Windows 7 of fun)

Google is the no.1 search engine in the internet world.but what does this mean similar to google but G is transformed to f(which is letter before g).Try it in your browser. i think u get the same google right!thats true u will be redirected to google. Google's list of domains is very large:(dont forget to post it to ur friends)

Google Sites and Services

Google Regions and Google Countries, Google in other Languages