Wednesday, 25 September 2013

What is Computer Virus

A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.
By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email's File Attachments for details.)
When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.
A virus program contains instructions to initiate some sort of "event" that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:
  • An annoying message appearing on the computer screen.
  • Reduced memory or disk space.
  • Modification of data.
  • Files overwritten or damaged.
  • Hard drive erased.

Types of Viruses

There are many types of computer viruses:
  • File virus : Most viruses fall into this category. A virus attaches itself to a file, usually a program file.

  • Boot sector virus : These viruses infect floppy and hard drives. The virus program will load first, before the operating system.

  • Macro Virus : This is a new type of virus that use an application's own macro programming feature to distribute themselves. Unlike other viruses, macro viruses do not infect programs; they infect documents.

  • Virus Hoax : Although there are thousands of viruses discovered each year, there are still some that only exist in the imaginations of the public and the press - known as virus hoaxes. These viruses hoaxes DO NOT EXIST, despite rumor of their creation and distribution.
Viruses/malware are commonly broken down into Classic Viruses, Trojans, Worms, adware, and spyware.

"Classic viruses" is a term coined in 1983. Classic viruses are malicious programs that rewrite existing computer code on your computer. Classic viruses are not so much unwanted additions to your system as they are mutations of existing code.

Trojans, or Trojan Horses, are additions to your system. These malicious programs masquerade as legitimate files in your email, deceiving you into willfully adding them to your hard drive. Trojans rely on you to intentionally open your computer to them. Once on your machine, Trojans then function as independent programs that operate secretly. Commonly, Trojans steal passwords or perform "denial of service" (overload your system) attacks. Examples of trojans include Backdoor and Nuker.

Worms, or Internet Worms, are also unwanted additions to your system. Worms are different from Trojans, though, because they copy themselves without your direct assistance... they robotically worm their way into your email, and begin broadcasting copies of themselves without permission. Because they do not require user intervention to reproduce, worms reproduce at an alarming rate. Examples of worms include Scalper, SoBig, and Swen.

Adware and Spyware are cousins to trojans, worms, and viruses. These programs "lurk" on your machine. Adware and spyware are designed to observe your Internet habits and then pummel you with advertising, or to report back to their owners via secret messages. Sometimes, these products will even use your hard drive to store and broadcast pornography and advertising back to the Internet. Nasty!

Whew, these semantics and definitions of viruses/malware can be very obscure to the non-technical user. However, it isn't crucial to distinguish between these products technically. What is important is how you consciously defend against these malware infections.

Tuesday, 24 September 2013

What is Taskbar

A bar located at the bottom of the screen that was first introduced with Microsoft Windows 95 and found in all versions of Windows after that. The Taskbar allows the user to locate and launch programs through the Start button, see any program that is currently open, display the time or date, items running in the background through the Systray, and with subsequent versions of the Windows operating system, the Quick Launch

                                                              Windows 98 Task bar
                        
                                          
                                                                Windows 7 Task bar

In the above two pictures, are examples of differences between Windows Taskbars. First, the Windows 98 Taskbar is an example of what the Taskbar looks like in many of the earlier versions of Microsoft Windows. As can be seen by this picture, this Taskbar has the Start button, the Quick launch area, the currently running programs, and the Systray and system time.
The second image, is the latest evolution of the Windows Taskbar, first introduced with Windows Vista. In this version of the Taskbar, the Start button is now an Orb with the Windows flag, displays icons like the Quick Launch with the currently running programs, running programs are only shown by icon, running programs icons in the Systray are now hidden, and the date is below the time.
Tip: Users more familiar with Apple Macintosh computers can think of the Taskbar as the Dock.