Thursday 30 April 2009

All About Data Recovery

At some point in time, everyone who owns a computer will experience
the trials and tribulations of hard drive failure. The reasons behind
it vary, and could include everything from a human error to damages
resulting from flood or water. Viruses can play a role as well, along
with many other factors. For many years, the need to recover data that
has been lost or destroyed has made data recovery such a very valuable
asset.

Almost all hard drives can be recovered. Normally, if the drive is
making a ticking or a scratching noise, you can use certain software
programs to recover the data. Sometimes, due to age or bad parts, the
aperture arm in the hard drive can fail, or the platters can become
damaged and lose the data that they hold. If you can't recover the
information with software, you'll need to send the hard drive off and
have it either rebuilt or have technicians recover your data.

Data recovery is always an option, from hard drives that are 2 GB in
size to the largest of over 300 GB or more of data. No matter what
size hard drive you have, the data can generally be recovered. Keep in
mind that if you've had a computer crash, you'll need to send the hard
drive off to have the data recovered by technicians.

One of the key benefits of data recovery is the fact that information
can also be retrieved from the recycle bin as well. Partition
recovery, and even information that has been lost somewhere on the
disk can be retrieved as well. Even though it may seem like your data
is gone forever - the technicians that specialize in data recovery can
retrieve it.

From Windows to Mac, everything can be recovered. There are different
filing structures and formats, including NTFS and FAT32. These are
common Windows filing structures, and hold all of the information for
your hard.

Those of you who have multiple hard drives in your computer, can rest
assured that RAID configurations can also be recovered. If a single
hard drive on the RAID configuration fails, the RAID setup will absorb
the blow and there won't be a loss of data. On the other hand, if the
entire RAID configuration crashes, it will crash big time. Whenever
this happens, you'll need to send it off and have technicians restore
both the RAID hardware and software.

Anytime your hard drive happens to crash or malfunction, data recovery
is there to help you get back your files. Whether they are personally
files or very important files that are need for business - you can put
your trust in data recovery and know that you'll get everything the
back the way it was.

All About Computer Viruses

Just what exactly is a virus? What kind is in your computer? How did
it get there? How is it spreading and wreaking such havoc? And why is
it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves,
or replicate, inside your computer without asking your explicit
written permission to do so. Forget getting your permission down on
paper. Viruses don't bother to seek your permission at all! Very
invasive.

In comparison, there are pieces of code that might replicate inside
your computer, say something your IT guy thinks you need. But the code
spreads, perhaps throughout your office network, with your consent (or
at least your IT guy's consent). These types of replicating code are
called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a
research arm of anti-virus software-maker McAfee Inc.

In this article, though, we're not talking about the good guys, or the
agents. We'll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were
comprised of a similar breed. They entered your computer perhaps
through an email attachment or a floppy disk (remember those?). Then
they attached themselves to one of your files, say your Microsoft Word
program.

When you opened your Microsoft Word program, the virus replicated and
attached itself to other files. These could be other random files on
your hard drive, the files furthest away from your Microsoft Word
program, or other files, depending on how the virus writer wanted the
virus to behave.

This virus code could contain hundreds or thousands of instructions.
When it replicates it inserts those instructions, into the files it
infects, said Carey Nachenberg, Chief Architect at Symantec Research
Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just
described is called a classic virus. Classic viruses still exist but
they're not quite as prevalent as they used to be. (Perhaps we could
put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through
vulnerabilities in web browsers, files shared over the internet,
emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft's Internet Explorer
takes most of the heat for spreading viruses because it's used by more
people for web surfing than any other browser.

Nevertheless, "Any web browser potentially has vulnerabilities,"
Nachenberg said.

For instance, let's say you go to a website in IE you have every
reason to think is safe, Nachenberg said.

But unfortunately it isn't. It has virus code hidden in its background
that IE isn't protecting you from. While you're looking at the site,
the virus is downloaded onto your computer, he said. That's one way of
catching a nasty virus.

During the past two years, another prevalent way to catch a virus has
been through downloads computer users share with one another, mostly
on music sharing sites, Kuo said. On Limewire or Kazaa, for instance,
teenagers or other music enthusiasts might think they're downloading
that latest Justin Timberlake song, when in reality they're
downloading a virus straight into their computer. It's easy for a
virus writer to put a download with a virus on one of these sites
because everyone's sharing with everyone else anyway.

Here's one you might not have thought of. If you use Outlook or
Outlook Express to send and receive email, do you have a preview pane
below your list of emails that shows the contents of the email you
have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are
inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to
potentially get a virus, Kuo added. For instance, have you ever opened
or viewed an email that states it's "loading"? Well, once everything
is "loaded," a virus in the email might just load onto your computer.

So if I were you, I'd click on View on the toolbar in your Outlook or
Outlook Express and close the preview pane. (You have to click on View
and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are
viruses that come into your computer via networks, Kuo said. They
travel from machine to machine and, unlike, the classic viruses, they
attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we've talked about how the viruses get into a computer. How do
they cause so much damage once they're there?

Let's say you've caught a classic virus, one that replicates and
attacks various files on your computer. Let's go back to the example
of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg
said. It also might cause damage to your computer as it looks for new
targets to infect.

This process of infecting targets and looking for new ones could
eventually use up your computer's ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or
date and time, called a trigger. For instance, a virus could be
programmed to lay dormant until January 28. When that date rolls
around, though, it may be programmed to do something as innocuous but
annoying as splash popups on your screen, or something as severe as
reformat your computer's hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your
computer to be acting slow or in weird ways. And that leads us to a
new segment – the reason virus writers would want to waste their time
creating viruses in the first place.

The majority of viruses are still written by teenagers looking for
some notoriety, Nachenberg said. But a growing segment of the
virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the "backdoor" concept.

The sole purpose of some viruses is to create a vulnerability in your
computer. Once it creates this hole of sorts, or backdoor, it signals
home to mama or dada virus writer (kind of like in E.T.). Once the
virus writer receives the signal, they can use and abuse your computer
to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually
their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say,
from a newsgroup. As in the Trojan War they are named after, they are
usually disguised as innocuous pieces of code. But Trojans aren't
considered viruses because they don't replicate.

Now back to the real viruses. Let's say we have Joe Shmo virus writer.
He sends out a virus that ends up infecting a thousand machines. But
he doesn't want the feds on his case. So he instructs the viruses on
the various machines to send their signals, not of course to his
computer, but to a place that can't be traced. Hotmail email happens
to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they
use them for?

One use is to send spam. Once that backdoor is open, they bounce spam
off of those computers and send it to other machines, Nachenberg said.

That's right. Some spam you have in your email right now may have been
originally sent to other innocent computers before it came to yours so
that it could remain in disguise. If the authorities could track down
the original senders of spam, they could crack down on spam itself.
Spam senders don't want that.

Ever heard of phishing emails? Those are the ones that purport to be
from your internet service provider or bank. They typically request
some information from you, like your credit card number. The problem
is, they're NOT from your internet service provider or your bank.
They're from evil people after your credit card number! Well, these
emails are often sent the same way spam is sent, by sending them via
innocent computers.

Of course makers of anti-virus software use a variety of methods to
combat the onslaught of viruses. Norton, for instance, uses signature
scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA
fingerprints, he said. Norton examines programming code to find what
viruses are made of. It adds those bad instructions it finds to its
large database of other bad code. Then it uses this vast database to
seek out and match the code in it with similar code in your computer.
When it finds such virus code, it lets you know!

Monday 20 April 2009

Learn More About Spyware Removal

'Spyware' is a form of advertising software that is covertly installed on a person's personal computer without their knowledge or consent. Some advertising software today is put in with the permission of the computer owner as a form of payment for the use of a website or program, and these forms of marketing software are usually termed 'adware'. 

The difference between spyware and adware is knowledge and consent of the user. Because spyware is added without consent, and often can lead to a number of damaging effects to a computer, spyware removal is a popular subject for computer users today. 

The first step in spyware removal is of course determining that you indeed have spyware installed on your computer. Chances are, you do. In a study conducted by America Online and the National Cyber Security Alliance in 2004, it was estimated that 80% of computer users across the world have some form of spyware installed on their computer, and 90% of these users are not aware of it. 

Some common signs that your computer maybe dirty with spyware are 'pop up' advertisements that occur frequently and sometimes even when you are not on the web. These ads can be extremely irritating to be sure, but spyware can have even more disturbing effects to your computer. For instance, it can considerably slow your computer down, add hard to remove toolbars to your browser, change your home page without your knowledge, and cause put away or break down, resulting in lost data. 

The good news is there are a number of spyware removal programs available that will scan your computer to detect spyware elements. If it is determined that your computer is infected with spyware, some of these programs are able to remove the infection. 

Many spyware removal programs are available free of charge, though they must be updated regularly. Some programs will allow you to scan your computer for free, but will then ask for payment in order to clean the identified spyware. Personally, I'm a little disbelieving of these programs, and stick to the ones that are entirely free of cost. Some good examples include SpyBot, and AdAware. 

These spyware removal programs are usually able to get most spyware off your computer. To increase your chances, it is best to run two or even three different programs. You may encounter occasional spyware programs that are especially hateful and will require more complicated measures to remove. Instructions on how to remove these more deceitful spyware programs are often available in technical meeting across the internet, and most stores that offer computer repair are also able to clean spyware as well as viruses.

What is Black Hat?

A black hat (also called a cracker or Darkside hacker) is a malicious or criminal hacker. This term is seldom used outside of the security industry and by some modern programmers. The general public uses the term hacker to refer to the same thing. In computer jargon the meaning of "hacker" can be much broader. The name comes from the opposite of White Hat hackers. 

Usually a Black Hat is a person who uses their knowledge of vulnerabilities and exploits for private gain, rather than revealing them either to the general public or the manufacturer for correction. Many Black Hats promote individual freedom and accessibility over privacy and security[citation needed]. Black Hats may seek to expand holes in systems; any attempts made to patch software are generally done to prevent others from also compromising a system they have already obtained secure control over. A Black Hat hacker may have access to 0-day exploits (private software that exploits security vulnerabilities; 0-day exploits have not been distributed to the public). In the most extreme cases, Black Hats may work to cause damage maliciously, and/or make threats to do so as blackmail. 

Black-hat hacking is the act of compromising the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software - which may or may not be legal depending on the laws of the given country - is actually software cracking). The term cracker was coined by Richard Stallman to provide an alternative to using the existing word hacker for this meaning. Use of the term "cracker" is mostly limited (as is "black hat") to some areas of the computer and security field and even there is considered controversial. A definition of a group that calls themselves hackers refers to "a group that consists of skilled computer enthusiasts". The other, and more common usage, refers to those who attempt to gain unauthorized access to computer systems. Many members of the first group attempt to convince people that intruders should be called crackers rather than hackers, but the common usage remains ingrained. 

Techniques for breaking into systems can involve advanced programming skills and social engineering, but more commonly will simply be the use of semi-automatic software, developed by others - often without understanding how the software itself works. Crackers who rely on the latter technique are often referred to as script kiddies. Common software weaknesses exploited include buffer overflow, integer overflow, memory corruption, format string attacks, race conditions, cross-site scripting, cross-site request forgery, code injection and SQL injection bugs. 

The reference to colored hats comes from Hollywood's use of hats in old black-and-white Western movies to help an audience differentiate between the good guys (white hats) and the bad guys (black hats). The 'hat' terms do not fall under common use. Even inside the computing field they are very controversial. 

A grey hat commonly refers to a hacker who releases information about any exploits or security holes they find openly to the public. They do so without concern for how the information is used in the end (whether for patching or exploiting).

Warning Signs You Might Be Infected With Spyware And/Or Adware

Here are warning signs you should be aware of, if any of them pertain to you then your PC is most likely infected:

If you start you Internet browser and the homepage that pops up is not the one that has been set by you. You then change it back to what you want and then it goes back to something you didn't set again. This is one of the more common features and ways to tell that you have been taken over by some sort of spyware and that you should rid your system of it immediately.

If you get pop-ups that have been personalized with your name on them or you begin to receive pop up ads while you are not even connected to the Internet or don't have a browser open. This is one of the more annoying ways that your system will let you know that you have something other than normal operating in your system.

You start receiving very expensive phone bills that have you placing many calls to 900 numbers that you never heard and ones that have hefty per-minute rates. Spyware takes over your phone line due to the connection that you have in conjunction with that phone service, whether dial-up or broadband.

You enter a searchable item into your required Internet toolbar or address bar and then all of sudden an unapproved searching system handles your search. More infamous items are infected with stuff such as Mysearch Bar and other spyware type search engines that only take you to their approved sites.

Another sure fire way to know that you have spyware operating on your system is that you have view your favorites list and you have favorite sites in their that you did not put in yourself and have found that other sites you put there are no longer found. You delete these items but they always show up again in your favorites.

Your system begins to run slower than normal. If you are a updated Windows OS user you pull up your task manager system information screen and see that your system is running at 100%, then you are infected with spyware because your system always needs a little free space in order to process information, which is why your system slows down when you have spyware on it.

At a time when you are not doing anything online, the send or receive lights on your dial-up or broadband modem blink just as wildly and lively as when you are online downloading a file or surfing the Internet. Also, your network icon on your screen will be flashing rapidly showing you that you are working on receiving and sending information from your system at a very rapid rate. This is the job of spyware here to send and receive information to your system without telling you.

A search toolbar or other browser toolbar appears even though you didn't request it or install it. Your attempts to remove it fail, or it comes back after removal. Parts of spyware registry files hide themselves in your system under aliases and unless you find all of them and remove them, then they will never leave your system, causing them to show up over and over again.

And the final sign is: Everything appears to be running normal but the most deceptive and devious spyware leaves no tracking information for you to find it anyway. This is the sure way to get you to check your system on a routine and regular basis so that you are sure you have no signs of an infection.

FACT: Chances are your machine is hosting spyware. There are currently over 78,000 Spyware and Adware programs on the Internet that can affect your PC. 

Thursday 16 April 2009

What is computer cookie?

A cookie is a tiny text file that a web site can put on your computer as you browse the pages on that web site. One thing people don't understand is that a web site can only read and write its own cookies, it cannot access another web site's cookies. Cookies are used for storing various items of information, such as a name, or a selection choice you made. This information will be read back from the when you load other pages on the site, or, on return visits to the site.

What reason does a web site need to use cookies? Web browsers are stateless, stateless means that as you through various pages on a web site, each of those pages is a separate and distinct action. For example, the web server does not know it's the same person that was on the home page that made the request for the order page. This is very different from desktop applications like Microsoft Excel that you run on your computer. The web server sees all page requests as individual requests for pages, not as a continuous visit from you. As you move through a web site and select things and make choices, what keeps you from having to reenter or reselect that information as you load each page? Usually the answer is a cookie. A cookie can be used by the web server to keep track of you as a user so that as you navigate from page A to page B, the web server knows it's you and the developer of the web site can reference those items stored in your cookie to maintain a stateful experience for your session or visit to the web site.

Occasionally, you may want or need to delete your cookies.

You can delete your cookies a few ways. Most web browsers (Microsoft Internet Explorer, Netscape, FireFox, Opera, etc.) have different ways to do this, so consult the help for your browser on how to delete the cache files and cookies. There are also several software packages to clean your PC and these packages also delete cookies.

Using cookies improves your user experience when browsing the Internet. Is there a security risk or danger to cookies? A web site can use cookies for saving information that you enter into forms on web pages and that's where security concerns arise. Usually this never causes any problem, however, before letting someone use your computer, or taking your computer somewhere to be repaired or serviced, always delete your browser's cache AND cookies!

Wednesday 15 April 2009

10 Smart Ways to Protect Your Computer against Viruses

(1)If you are using Windows XP, always turn on the firewall. 

(2)Always run all necessary latest updates & service packs (all windows! including all your programs & software!---keep them updated) 

(3)Run your anti-virus program everyday (some do it every week) There are many virus programs that you can get for free scanning. 

(4)Run your anti-spyware/adaware once a week (I run Spybot Search & Destroy & Lavasoft Adware Personal --- they are shareware, meaning it's free!). What I do is that, I run the Lavasoft Adware first, then run the Spybot Search and Destroy (I also run it with "immunize" tool). These two tools are always on top of my desktop for easy access. 

(5)Turn on the pop-up blocker – this feature is available on Windows XP (you can see this under tools>Internet Options >Privacy>click Block Pop Ups. In addition to this, I also download another pop up blocker, the Google Toolbar. I find their pop up blocker the most effective in blocking pop ups. 

(6)Never open mails that are suspicious to you or not known to you. If they are in your bulk mail, send it back to your provider as "spam"! I never enable my bulk mail. I automatically delete emails from my bulk mail. 

(7)When using messenger (IM) services, be very careful with files being sent through instant messenger. Rather choose to have it emailed it to you. Most of email services now has virus check and clears it if the file has virus or not. 

(8)Be very careful when downloading files or any programs from the internet, pay attention on the instructions while downloading it. Downloading may sometimes cause error on the system registry or the entire computer system (one example, my nephew got his computer badly infected with viruses because of heavy downloading of games and music! – I guess!) 

(9)Be careful with files that come from a floppy disk or any other external storage when you open it in your CD ROM of floppy drive. You should know its source, or better yet, when you insert it, have it scanned with your anti-virus program before you open the files. 

(10)Run defragmentation, disk clean up, registry scanner at least once a week. You can find defragmentation by simply pointing your mouse on drive C: (which is usually the hard disk main logical drive)> right click the mouse>click on properties>click on tools>click on defragment now! 



15 Steps to Speed Up Your Computer

1. Defrag your computer at least once every two weeks (I do it once a week). Go to start>accessories>system tools>disk defragmenter. You can click on "analyze" first before you choose defrag, it will tell you if you need to defrag. Just defrag it even if it reports you don't need to. 

2. Do Disk Clean Up at least once every two weeks (again, I do this once a week). Go to start>accessories>system tools>disk clean up. It will analyze your disk and will generate reports. I suggest you delete files from the recycle bin and the files located in the temporary files folder. Note: I avoid compressing files. It's your call. 

3. Clean up your program files, delete and uninstall unwanted programs on your computer. Go to control panel>add remove programs. Make sure you restart your computer after uninstalling or removing the program so that complete deletion will take place. 

4. Delete all files (temporary files and cookies from the computer). Here's how: open a browser. On top of the browser click on tools>internet options>delete files and then delete cookies. Make your history set to (0). Others wants it on at least 10. I always set mine to (0). 

5. You have to be very careful in installing or downloading programs. Make sure you need it, if not please just avoid it. Uninstalling them is really hard. Many vendors has all the power to have their program stay in your computer! 

6. Always turn on your firewall. I suggest you have only one firewall and one anti virus. You get less safer if you have two anti virus running (I know people who likes to have two anti virus programs running on their computer, I don't know why.) 

7. Run anti-spyware programs. I trust spybot, search and destroy and the Adware from Lavasoft. I run SD every week, I do immunize them before I do the the entire program to run. I run adware every week too after I run spybot search and destroy. 

8. Run complete scan using your antivirus software at least everyday (some do it once a week). Mine is scheduled at 3:00am everyday. 

9. Avoid multi-tasking too much! Meaning to say, avoid opening too many programs all at the same time running at the task bar. 

10. I also suggest you get a dual hard drive (which I know is now common in the market), one for the operating system only and the other for all the programs, database and files. This way, the computer boots on one hard drive. 

11. Also check the performance of your computer when connected on the internet. Go to control panel >network and internet connections >network connections >right click the mouse on the connection available (e.g. local area connection "connected", "firewalled")>click on "STATUS". Make sure on the status tab, you will see the speed (mine is always 100 mbps). The packets sent and the packets received must not have a very high difference. If it is sending too much packets (as in ten times) than it receive (then try to do number 7!). 

12. Always make sure you install the latest updates on your computer. 

13. Always make sure all devices (drivers, etc) are properly functioning. Go to control panel >performance and maintenance >system >hardware >click on DEVICE MANAGER. You will see all the devices and adapters available on your computer. Make sure you don't see a yellow question mark (?) or this means there is an error on that device or adapter. If so, you need to update it or install the right drivers. Updated firmware might also be needed. 

14. Browsing the internet? well, I have my google toolbar installed on my computer and is my default search engine. Their pop up blocker is really great! 

15. A memory of at least 512 RAM might be a good idea installed on your computer 

10 Things You Should Do When Your Computer Freeze or Hang-Up

1. Click on “ctrl-alt-delete” keys. The windows task manager will then open, click on all programs that you don’t need and end the task. You will see that all programs on your taskbar will close one by one. If this will resolve the issue! – then save! (tip# 1: if you’re working on an MS Office application, it will automatically save your file incase the programs suddenly shut down --- tip# 2: always save your file at least every 2 minutes by just simply clicking on the “diskette icon”--- its just one click!) 

2. If it did not resolve the issue, are there some users logged on that computer? If so, go to switch user (for XP) and log off that user, go back to your log on screen and log on again. 

The reason the computer hang up is because if there are many open programs and applications, these retains in the memory, if it is too much for the memory to handle, it freezes! Another reason too the computer hang up is because if you are connected to the internet via dial up, and you are running too many applications and opening many websites. So I suggest, if you are multimedia user or a heavy internet user, then you are better off with a higher memory, at least 512Mb of memory. 

There are simple ways to avoid computer to freeze or hang up: 

3. Clean your history at least once a week >tools>internet options>clear history. I normally set my history to “0”, meaning, when I restart my computer, it doesn’t save history pages that I have visited 

4. Delete all internet temporary files >tools>internet options>delete files (do the “offline” content too!) 

5. Delete cookies (some do not do this, but I do delete cookies at least once a week!) >tools>internet options>delete cookies 

6. Remove unnecessary programs that you no longer use, they are just occupying space and memory! >control panel>add/remove programs 

7. Do defragmentation at least once a week >point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (which is usually the main system logical drive) >properties>tools>defragment now 

8. You can also check the logical drive’s volume for errors >point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (I repeat, is usually the main system logical drive) >properties>tools>check now 

9. It is better to have only one user being logged on. Even if there are many users, make sure the user logs off after using the computer, rather than keeping it logged on and you do the switching of users. Switching users is good as long as you don’t keep all users logged on—I think that is more logical 

10. Always shut down properly the computer (do NOT use the power button when turning it off!)