Showing posts with label COMPUTER. Show all posts
Showing posts with label COMPUTER. Show all posts

Saturday, September 12, 2009

Real Meaning of Computer Terms

Real Meaning of Computer Terms

PCMCIA
People Can't Memorize Computer Industry Acronyms

ISDN
It Still Does Nothing

APPLE
Arrogance Produces Profit-Losing Entity

SCSI
System Can't See It

DOS
Defective Operating System

IBM
I Blame Microsoft

DEC
Do Expect Cuts

CD-ROM
Consumer Device, Rendered Obsolete in Months

OS/2
Obsolete Soon, Too.

WWW
World Wide Wait

MACINTOSH
Most Applications Crash; If Not, The Operating System Hangs

PENTIUM
Produces Erroneous Numbers Through Incorrect Understanding of Mathematics

COBOL
Completely Obsolete Business Oriented Language

AMIGA
A Merely Insignificant Game Addiction

LISP
Lots of Infuriating & Silly Parenthesis

MIPS
Meaningless Indication of Processor Speed

WINDOWS
Will Install Needless Data On Whole System

GIRO
Garbage In Rubbish Out

MICROSOFT
Most Intelligent Customers Realize Our Software Only (for) Fools (&) Teenagers.

Monday, August 31, 2009

How to Build an Antivirus Firewall

eftIf you have ever had a serious malware or virus infection on your Windows computer, you know the problems it can cause. Compromised security, damage to your programs and files, unpredictable browser behavior, etc.

Probably one of your disappointments was that the antivirus or anti-malware software you were using did not protect your computer from the infection.

In this series of short articles we will show you how to build an antivirus firewall which is designed to protect your computer from trojan virus, malware, adware, and spyware infections. The level of protection for your computer will be far higher than anything you have used before. Once you complete all of the steps we show you in the articles, your computer will be fully immunized and protected from viruses and malware with a firewall that runs five levels deep. It will be almost impossible for a trojan, virus or malware infection to take hold on your computer.

It doesn't take much time to build the firewall, and the nice thing is, it doesn't have to be expensive. You don't have to be a computer genius, either. The easy-to-use software we will tell you about will do it all for you.

Building the firewall consists of five steps:

1. Using an effective antivirus program. When we say "effective" we mean a program that has tested from 98% to 99% effective at finding and eliminating known virus threats. Objective testing for antivirus software is done by websites like AV Comparatives

2. Combining the antivirus program with a good anti-malware program, like the ones that are recommended by Spyware Warrior Many of the anti-malware programs now come with an antivirus engine or database, which makes them extremely effective when combined with a primary antivirus program, and the best thing is, they are completely compatible. This means that when you combine the right programs you get virtually double the protection of a single software program.

3. Using an effective firewall, configured correctly. The Windows firewall is perfectly adequate, provided the settings are correct. (Don't allow exceptions) A third-party firewall can also be used.

4. Building a bullet proof web browser. The one we recommend is Firefox, with ad-ons like AdBlock Plus, Web Of Trust (WOT), and perhaps a script blocker.

5. Last, but certainly not least, is the development of an effective hosts file in the Windows System 32 folder and the addition of a good restricted sites list and blocked activeX controls list to protect internet explorer. Once again, you won't have to do much here, the software will do it all for you. The entire process is easy..

The place to begin is with the correct combination of antivirus and anti-malware software. It is important to combine the software carefully, as a bad combination can do more harm than good and possibly damage your system.

Tuesday, August 18, 2009

COMPUTER TWICKS & TRICKS

One of the most common questions about system processes is what is svchost.exe and why are there so many processes running? First appearing in Windows XP, svchost.exe hosts multiple services within one process. This allows the operating system to save memory by reducing process overhead by cutting down on the number of processes that need to be running.

Every system service such as Windows Update, Event Log, Terminal Services, Audio Service, etc. runs within svchost.exe. Depending on the access the services need, they are grouped together and are run in a number of processes which explains why you see so many in Task Manager running under different accounts such as System, Local Service and Network Service.



Identifying what services are running is different depending on the version of Windows you have.

Windows XP

In Windows XP at a command prompt run:

tasklist /svc

The tasklist utility will show you what processes are running under each svchost.exe process.



Windows Vista and Windows 7

Task manager in Windows Vista and Windows 7 has been enhanced so you can easily see what services are running inside a host process such as svchost.exe.

Click on the Start Button, type in taskmgr and hit Enter. When task manager loads, click on the Processes tab and click Show processes from all users to see all of the svchost.exe processes. Then, right click on a svchost.exe process and select Go to Service(s). You will be taken to the Services tab with all services running in that process highlighted.



All Versions of Windows

Microsoft Sysinternals has a great free utility called Process Explorer that is like a task manager on steroids. It works on all versions of Windows and allows you to easily see services running inside of svchost.exe. Download Process Explorer here. Once you have it running right click on any process and select Properties. Then click on the Services tab and you will see all processes running inside the host process.