X10 TV SPONSOR ADS

Welcome to the world’s largest online marketplace for FREE digital information products Can Be Translate in Difference Languages to READ or Listen to.at x10tv.com library

Scroll Down to Read Full Posts With Related Sponsor Advise or Offers Too...You Can bookmark this Page for Sponors Future Advise or Offers Update Click View Slider in Full Page To bookmark or Tranlate Contents

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

  HOMEPAGE

 

 

DIRECTORY CATEGORIES

X10tv Main Category
Articles
eBooks
YouTube
Stories Book
Music
Movies & TV Series

Articles Part 1
Automotive
Business Articles
Business_Articles/
Cars
Children_Articles
Communications_Articles
Computers_Articles
Debt_Website
Education_Articles
Family_Articles
Fashion_Articles
Finance_Articles
Food_Articles
Health_Articles
HomeImprovement_Articles
Legal_Articles
Loans_Website
Reference Articles

Articles Collection Part 2

accounting
acne
adsense
advertising
aerobics
affiliate
alternative
articles
attraction
audio-streaming
auto-care
auto-parts
autoresponder
aviation
babies-toddler
baby
bankruptcy
bathroom
beauty
bedroom
blogging
body-building
book-marketing
book-review
branding
breast-cancer
broadband-internet
business
business-loan
business-plan
cancer
car-buying
car-insurance
car-loan
car-maintenance
career
cars
casino
cell-phone
chat
christmas
claims
coaching
coffee
college-university
computer-pc-tips
cooking
cooking-tips
copywriting
cosmetics
craft
creative-writing
credit
credit-cards
credit-repair
currency-trading
data-recovery
dating
debt-relief
diabetics
diet
digital-camera
diving
divorce
domain
driving-tips
ebay
ebook
ecommerce
email-marketing
emarketing
essay
ezine
fashion
finance
fishing
fitness
flu
furniture
gambling
gardening
golf
google
gps
hair
hair-loss
hdtv
health-insurance
heart-disease
hobbies
holiday
home-business
home-improvement
home-organization
interior-design
internet-tips
investment
jewelry
kitchen
ladies-accessories
lawyer
lcd-plasma
legal
life-insurance
lingerie
love
mailing-list
make-money
mortgage
mp3
music
network-marketing
online-shopping
paid-survey
pc-games
perfume
personal-injury
ppc
pregnancy
publishing
real-estate
recipe
recreation
relationship
resume
romance
rss
sales-letter
self-employment
seo
shoes
small-business
smoking
software
spam-blocking
sports
spyware
stress
trading
travel
vacation
video-conferencing
video-streaming
virus
voip
web-hosting
website-traffic
wedding
weight
wine
women
writng-tips

Articles Collection Part 3

+BONUS-ARTICLES
25 Home Business PLR Articles
25DatingRelationshipsPLRArticles0613
25InternetMarketingPLRArticles
Affiliate-Marketers
After School Activities
Articles-Marketing
Baby
Blogging
Car-Rental
Car-Stereo
Cell-Phone
Coin Collecting
Credit Card
Depression
Diamonds
Diet PLR Articles
Digital-Camera
eZine Marketing
Family Budget
Fishing
Gardening
Golf
Google Sense
Home Schooling
Home-Theater
Job Search
Making Money With Articles
monsterplr15000articles
New-York
Newport Beach
Opt-In-List
Paint Ball
Podcasting
San Diego
Scotch
Ski vacations
Collectibles Sports Car
Web Design
Web-Traffic


Articles Collection Part 4
Adsense
Advertising
Affiliate Marketing
Affiliate Marketing On The Internet
Affiliate Success
Affiliate-Marketers
After School Activities
Air Purifiers
alternative energy
American History
Art Auctions
Articles-Marketing
Articles250
artmarketing
AspenNightlife
Astronomy
Atkins Diet
ATV
autism_articles
Auto Navigation Systems
Auto Responders
Auto sound systems
Auto-Leasing
Autoresponders
Baby
Backyard Activities
Bargain Hunting
Bathroom Remodeling
BBQs
Beach Vacations
Beach-Vacations
Beauty
biography
Black History
Blog Marketing
Blogging
Blogs
Bluetooth Technology
Breast Feeding
business
Buying A Boat
Buying Paintings
Candle Making
Car-Rental
Car-Stereo
Carpet
Cats
CD duplication
Cell-Phone
Choosing the Right Golf Clubs
Christmas Shopping
Cigars
Closet Organizers
Coin Collecting
College Scholarship
COMPUTER GAMES & SYSTEMS
COMPUTERS, LAPTOPS, SMARTPHONES
Contact Lenses
Cooking
copywriting
Craigslist
creating an online business
Credit Card
Credit Cards
criminology
Cruise Ships
Dance
Data Recovery
Dating Women
Decorating for Christmas
Dental Assistant
Depression
Diamonds
Diesel VS Gasoline vehicles
Diesel-VS-Gasoline-vehicles
Dieting
Digital-Camera
Disneyland
Dogs
eBay
Education
elliptical trainers
Email Marketing
entrepreneur
Excavation Equipment
Excavation-Equipment
Exercise
eZine Marketing
Family Budget
Fashion
finance_and_insurance
Fishing
Fitness
foods and bevarages
Forex
Formula D Racing
Fruit Trees
Fruit-Trees
Gambling
Garage Remodeling
Gardening
general
Golden Retriever
Golden-Retriever
Golf
Google Sense
googleadsense
Government
Health_Insurance_articles
Healthy Eating
High Definition Video Cameras
High-Definition-Video-Cameras
Hiking and Camping
Hobby Articles
Holiday Games & Activities
home and constructions
home decorating
Home Schooling
Home Security
Home Theater Systems
Home-Theater
Hunting
hypoallergenic dogs
International Airports
investing
Ipod Video
Ipod-Video
Jewelry-Wholesale
JewelryWhsl
Job Search
junior golf
Kitchen
Kitchen Remodeling
Koi
La Jolla California
La-Jolla-California
Las Vegas
Law
Law_order_crime
Making Money With Articles
Marketing
Marketing Your Business On The Internet
Martial Arts
medicines_and_healthcare
Membership Sites
Mexico Vacations
Microbrews
Mini Blinds or Wood Shutters
Mini-Blinds-or-Wood-Shutters
mobility scooters
Monograms
Motor Homes
Motorcycles and Scooters
Mountain Biking
Myspace
New Air Travel Rules
New Years Eve Party Planning
New York
Newport Beach
Niche Marketing
Nursing Assistant
Office Chairs
Online Shopping
OptInList
Outsourcing Ebooks and Software Jobs
Paint Ball
Personal Loans
pet health care
Pets
pH Miracle Diet
Photography
Podcasting
politics
Pool Accessories
Porsche
Power Tools
Pre-Paid Legal
Private Jet Charters
Private Label Resell Rights
Private Yacht Charters
Rawfood
RC Hobbies
Re-Financing
Real Estate
Reference
remote control helicopters
Renting A House Or Apartment
Retirement Planning
San Diego
SanFransisco
Satellite Radio
Satellite-Radio
Scotch
Seattle
Self Improvement Articles
Self-Help
Show Business
ski vacations
Skiing Locations
Skincare
SkVacations
Sleepingbaby
Snowboarding
Snowmobiling
Social Networking
Sports
Sports Car
St. Thomas Vacations
Summer Vacations
Supercross Racing
Superfoods
Surround Sound
Swimming Pools
Swimming-Pools
Tattoos
tech_gadgets
Tennis
Thanksgiving Party Articles
Theater Arts
Time-Share Investments
TootAche-ToothCare
Toothache and Tooth Care
Top Golfing Accessories
Tracking Software
Travel Tips To European Countries
UniversalStudioTours
Vacuum Cleaners
Vacuum-Cleaners
Valentines Day
Vegetarian
Video Sites
video streaming
Vitamins
Vitamins and Supplements
WAHM
Wart Removal
Web Design
Web-Traffic
webtraffic
Wedding Favors
Wedding Games & Activities
Weight Lloss
Weight Loss
Wine And Spirits
Womens Issues
yoga
YouTube

# Country
1 Afghanistan
2 Albania
3 Algeria
4 Andorra
5 Angola
6 Antigua and Barbuda
7 Argentina
8 Armenia
9 Australia
10 Austria
11 Azerbaijan
12 Bahamas
13 Bahrain
14 Bangladesh
15 Barbados
16 Belarus
17 Belgium
18 Belize
19 Benin
20 Bhutan
21 Bolivia
22 Bosnia and Herzegovina
23 Botswana
24 Brazil
25 Brunei
26 Bulgaria
27 Burkina Faso
28 Burundi
29 Côte d'Ivoire
30 Cabo Verde
31 Cambodia
32 Cameroon
33 Canada
34 Central African Republic
35 Chad
36 Chile
37 China
38 Colombia
39 Comoros
40 Congo (Congo-Brazzaville)
41 Costa Rica
42 Croatia
43 Cuba
44 Cyprus
45 Czechia (Czech Republic)
46 Democratic Republic of the Congo
47 Denmark
48 Djibouti
49 Dominica
50 Dominican Republic
51 Ecuador
52 Egypt
53 El Salvador
54 Equatorial Guinea
55 Eritrea
56 Estonia
57 Eswatini (fmr. "Swaziland")
58 Ethiopia
59 Fiji
60 Finland
61 France
62 Gabon
63 Gambia
64 Georgia
65 Germany
66 Ghana
67 Greece
68 Grenada
69 Guatemala
70 Guinea
71 Guinea-Bissau
72 Guyana
73 Haiti
74 Holy See
75 Honduras
76 Hungary
77 Iceland
78 India
79 Indonesia
80 Iran
81 Iraq
82 Ireland
83 Israel
84 Italy
85 Jamaica
86 Japan
87 Jordan
88 Kazakhstan
89 Kenya
90 Kiribati
91 Kuwait
92 Kyrgyzstan
93 Laos
94 Latvia
95 Lebanon
96 Lesotho
97 Liberia
98 Libya
99 Liechtenstein
100 Lithuania
101 Luxembourg
102 Madagascar
103 Malawi
104 Malaysia
105 Maldives
106 Mali
107 Malta
108 Marshall Islands
109 Mauritania
110 Mauritius
111 Mexico
112 Micronesia
113 Moldova
114 Monaco
115 Mongolia
116 Montenegro
117 Morocco
118 Mozambique
119 Myanmar (formerly Burma)
120 Namibia
121 Nauru
122 Nepal
123 Netherlands
124 New Zealand
125 Nicaragua
126 Niger
127 Nigeria
128 North Korea
129 North Macedonia
130 Norway
131 Oman
132 Pakistan
133 Palau
134 Palestine State
135 Panama
136 Papua New Guinea
137 Paraguay
138 Peru
139 Philippines
140 Poland
141 Portugal
142 Qatar
143 Romania
144 Russia
145 Rwanda
146 Saint Kitts and Nevis
147 Saint Lucia
148 Saint Vincent and the Grenadines
149 Samoa
150 San Marino
151 Sao Tome and Principe
152 Saudi Arabia
153 Senegal
154 Serbia
155 Seychelles
156 Sierra Leone
157 Singapore
158 Slovakia
159 Slovenia
160 Solomon Islands
161 Somalia
162 South Africa
163 South Korea
164 South Sudan
165 Spain
166 Sri Lanka
167 Sudan
168 Suriname
169 Sweden
170 Switzerland
171 Syria
172 Tajikistan
173 Tanzania
174 Thailand
175 Timor-Leste
176 Togo
177 Tonga
178 Trinidad and Tobago
179 Tunisia
180 Turkey
181 Turkmenistan
182 Tuvalu
183 Uganda
184 Ukraine
185 United Arab Emirates
186 United Kingdom
187 United States of America
188 Uruguay
189 Uzbekistan
190 Vanuatu
191 Venezuela
192 Vietnam
193 Yemen
194 Zambia
195 Zimbabwe

  Informative Articles

Click Here to Translate Contents and Read it to YOU in The Languages YOU Want to Listens To...Just Copy and Paste Contents in Player or Upload or Right Click Your Mouse to Copy the PDF Links in Reader Folder to Translate in Difference Languages

Browse To Your Hearts Content At Our Full Range Of info-products on eBooks With over 10,000 info-products on eBooks, health, weight loss, fitness, diet supplements, business, home and garden, food and wine, parenting, internet, employment and jobs, education, student loans, self-help, home improvement, forex and marketing products to choose from, you are sure to find the information you Needed?

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
All About Computer Viruses
by: Kara Glover


Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004

All About Computer Viruses
by Kara Glover
kara333@earthlink.net

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover














About the author:
Kara Glover is a Computer Tutor and Troubleshooter.
You can find her articles and tutorials on topics such as
Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com



Circulated by Article Emporium

 



©2005 - All Rights Reserved
<

 

1 - 2 - 3 - 4 - 5 - 6



SPONSOR ADS

 
  Related Industry News


 

Recommended By JV Bloggers

Check Out our JV Bloggers Collection


  Recommended By JV Bloggers
 

JV Bloggers Category Lists Collection By Country in English

JV Bloggers Category Lists Collection By English Language



Click Here to Do x10tv.com Full Search Page at Microsoft BING



SPONSOR ADS

 

SPONSOR ADS

 
 



 

Total Views stat / Page Views stat

Advertise Here

web page counter Copyright 2024. All Rights Reserved.

Total Views stat / Page Views stat

Advertise Here

web page counter