Category: Computer

Computer Virus

Sometime the term computer virus is used to describe a logic bomb in which a piece of unauthorized code acts as a parasite that attaches it self to a host program during a copy operation. Like their biological counterparts computer viruses reproduced and spread; copy commands embedded in the virus code to make, it reproduce and transmit commands may be inserted to spread the virus from one computer to the other on its network. Unfortunately, viruses are common in today’s, computer system and the potential problems they may cause must be addressed. In 1992, the potential problems became even worse. Professional computer viruses fighters were outraged by the publication of the book that contain the source code heeded to create potentially destructive viruses, plus coupons for floppy disk containing executable virus program.

To be able to analyze and remove viruses from the computer system you need to ascertain its type some of the types have been discussed below:

Macro Viruses

Developing Viruses

Boot Sector Viruses

Macro Viruses:

Macro virus is the first virus to infect the data files, rather than executable. Macro viruses infects the files in the form of macro or OLE objects and are easier to write than “traditional” files viruses which are mostly written in assembly code. Today many applications have macro languages, so the problem is a growing one. Macro viruses spread by people sending infected files to each other, entirely innocently, either on floppy disk, or via the internet LAN, or via an external e-mail system.

Many applications provide the functionality to create macros. A macro is a series of commands to perform some application specific task. Macros are designed to make, life easier like automating some everyday tasks, for instance, doing calculations. Macros can be saved as a series of keystrokes; or they can be written in some macros languages.

Developing Viruses:

Some viruses are badly written and “lose” their own macros. The original virus may consist of the set (Auto Open, File Save, and File Save As), if the replicates via Auto Open, the complete macro set will be preserved. However, if the user invokes File (Save As), the virus will fail to copy the File Save macro. The resulting virus set (Auto Open, File. Save As) is known as developed Macro and original virus is developing.

Boot Sector Viruses:

Once of the most common kind of viruses are boot sector viruses, for example. Form and Stoned. These viruses infected the floppy disks in either of the following parts:

Master Boot Record (MBR)

Partition Sector of the DOS Boot Record (DBR)

DOS Boot sector of hard disks

The following examples shows how a boot sector virus spreads: you have got a floppy disk with data on it, perhaps some page maker file. This is part of a project that you are doing jointly with a classmate. What your classmate does not know is that his computer is infected with a boot sector virus and therefore, so is the disk that has been sent to you. You put the disk in drive A: and start using these files. So far, the virus has not done anything. But when you finish for the day, you switch off the computer and go home. The next day, you come and switch on. The floppy disk is still in drive A. so the computer is trying to boot up from there. It loads the first sector into memory and executes it, or if it cannot find DOS on the disk, tells you: “Not a system disk, please press any key to continue”. Everyone has seen this message numerous times.

Hazards Of Computer Security

Computer security hazards are a constant and never ending concern for information security managers, especially due to the increasingly deceptive modes of theft and hacking that are being created and developed. When it comes to security for computers, their programs and the information that you are protecting, there is never a moment where you want to find your organization or the management systems it uses are vulnerable or at risk. For this reason, it is crucial that you are always up to date on industry practices and norms, so that you can implement these new and revised techniques with each computer security hazard as they arise and to prevent future instances.

Any training you take to learn to manage computer security hazards and threats for a company and organization should provide you with a comprehensive education on the different types of threats possible, as well as how they function, how to prevent and detect them and how to fix the damage they can cause. You will also need to be informed off the way in which networks operate in order to create the most secure for your company, or if one is already in use, to know how it operates and how to reduce the security hazards that you might face.

Perhaps the most important and useful training you can receive is how to relay risk reduction and management skills to other individuals within the company. The biggest hazard to an organization’s network is the individuals that will be using it daily, and all of these people will need to be made aware of measures that need to be taken and educated in your network’s ability to deal with specific threats. This form of education and management is a vital role in reducing the hazards that can potentially plague the computer security of your firm, which is why it requires full time management. If you are able to combine your technical skills with great people and communication skills, this might be the best role for yourself in the field and present more opportunities for you career wise.

If you are considering a career in computer security management, training on the hazards to these networks is an important and integral part of that education. Because it is a field that is high in demand, the career possibilities and opportunities are great. Invest the time and energy in educating yourself about all aspects of this path in order to give yourself the best advantage when it comes time to look for employment. Employers are always looking for individuals with a wide breadth of understanding and knowledge surrounding the networks that they create to best serve their clients in order to grow and remain successful.

Automotive Fault Diagnosis Computer

Automotive came out and in use in a variety of reasons inevitably to failure, so the car power, economy, handling stability, using the changes in security. Some unexpected car trouble, some are evolving. When the car fails, experience and scientific knowledge can be used quickly and accurately diagnose the cause of the malfunction, to identify the damaged components and parts, and troubleshooting as soon as possible, the use and maintenance of the car benefit. We often use diagnostic techniques have launch x431, lexia3, mb star.

Car, this modern means of transport, from the manufacturing factory of the day, no matter how they talk, there is a certain life. No matter how used, sooner or later are to be bad, so do not use the failure is relative, and a variety of fault occurrence is inevitable. Therefore, the reasons for failure analysis and diagnosis, help to make judgments, so that car in good condition in the case of technology running.

Global automotive industry speed the development of rapid hair, endless variety of high technology, automotive safety, performance, comfort and so on rising. launch x431 is an indispensable technology. Automotive electronic control system with the continuous development of automotive fault diagnosis more complex and difficult, for the rapid, simple, direct knowledge of such failure and determine the type of substance and because of information, resulting in the car decoder, but with decoder technology, and now the car has been slow, said decoder fault diagnosis of the car computer, and the special computer.

Car fault diagnosis fault diagnosis through the car seat computer connected to the car, through the fault diagnosis of computer operating systems and car models to match the built-in software, read the car data, then the control fault code and based on experience, can easily know all cars the work of the system to accurately determine the fault location and specific fault conditions, failure to quickly rule out a powerful car technical support.

When the car’s electronic control system failure, a system the control unit ECU, PCM or ABS modules for self-diagnosis system components module detects fault, the fault information is stored in digital code modules in-house expertise in the area, this fault code we often called fault code. Car fault diagnosis by using computers and other equipment can be read, analyze and judge the car to a specific fault.

Car computer that can read car fault diagnosis fault code, clear trouble code, data flow, component test, maintenance light zero, read the computer version, the basic set and match to adjust, some automotive fault diagnosis computer can also provide value-added services such as car fault diagnosis expedition, vehicle maintenance information, trouble code table, customer records management, business functions.

Fault Diagnosis of Automobile links computers and cars there are two main methods, namely, wired and wireless. Do not overlook the use of lexia3. Through the diagnostic connector and cable link cable to connect the computer and automotive diagnostic diagnostic Block, and the wireless link that eliminates the need for intermediate line, in the diagnosis of seat location connected to a wireless transmitter devices, diagnostic computer terminal connected receiver, usually for the Bluetooth wireless equipment.

Diagnosis of early cars are basically using the open source computer operating system LIUX, manufacturers develop their own operating system and software, low frequency processing unit, in terms of looks and handling performance, it failed to reach everyone understood computer level. With the computer technology and the Windows operating system, development, and now computers are basically car fault diagnosis using Windows operating system, can truly be called a computer.

Computer for car fault diagnosis fault diagnosis in automobile seat and the car ECU and other mainframe computer communications, automotive fault diagnosis then the computer must follow the relevant standards and protocols, such as OBD.

Fault Diagnosis of Automobile manufacturers of computer based vehicle configuration and the test is divided into dedicated, expert-level troubleshooting computers and original car. Special Purpose Vehicle Diagnosis Computer models only operate for the set, original only automotive manufacturer to operate their own vehicles, and the market is most used in automotive fault diagnosis expert computer, computer expert automotive fault diagnosis fault diagnosis are generally professional development and production of computer companies, as measured by more than models, software upgrades faster, affordable and well received by several maintenance personnel favorite.

Market, in addition to original computer car fault diagnosis, the main vehicle computer fault diagnosis of meta-sign for the domestic brands, car, Dr. Kinder, car repair Wang, Jin Pentium, United iT, Ai Fuka, Motorola, so many foreign Bosch’s such as Germany, the United States SPX and red boxes, Sweden AUTODGAGNOS so. Better technologies mb star.

As the use of computer technology, automotive fault diagnosis and more advanced computer technology, automotive repair methods and philosophy radical political reform is taking place. If in the future for troubleshooting computer anytime, anywhere Internet access, a key upgrade, all kinds of vehicle maintenance equipment and functions into one unified platform, maintenance and integration of resources.

Computer File Storage – Safety Considerations

Whether you are running a website or a company which uses dozens of different computers, the method of file storage can be of vital importance to the future of your business. By now most people realize that backups of your important files and systems do not only need to be created on a daily basis, but they also must be stored in a secure location. Let’s take a look at some of the ways in which people store their computer files (we’ve ranked them in order from least secure to most secure).

Hard Drive

Every computer contains a hard drive that stores information magnetically. Typically the hard drive is unique to one type of computer; this is the type of file storage most commonly used by individuals, as it is quick and convenient. The downside of relying on a hard drive only file storage system is that if that one computer is compromised either through hacking or through an accidental power surge, or an Act of God, you risk losing all of your stored data. Therefore, this is by far the least safe way to save your files.

Outside storage

Individual users may complement their hard drive saved information by storing their files on separate media such as floppies or CDs. This provides an extra level of security, but the disadvantage again comes in the vulnerability of the media; these small units are easy to steal or lose, and also easy to damage.

File servers

File servers save data that comes from a lot of different, networked computers. They make it easy to access relevant information, but this is also their downfall; they are prone to hacking. In addition, their central location (usually in the same building as the computers from which the data is being sent), mean that an act of nature can wipe out all of the stored information.

Off site

By far, the best option for file storage as far as safety is concerned is off site. Off site storage facilities are fairly inexpensive, easy to upkeep, and keep your files stored in a place far enough away that should a calamity occur, your files are not all in the same vicinity. In addition, off site storage facilities for computer files are manned by very tight security, and usually have the best in technological support.

Crime Fighting Computer Systems And Databases

As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police – there are 16,000 law enforcement agencies in the Unites States alone – is never very far behind.

Quotes from the official Web pages of some of these databases:

National Center for the Analysis of Violent Crime (NCAVC)

Its mission is to combine investigative and operational support functions, research, and training in order to provide assistance, without charge, to federal, state, local, and foreign law enforcement agencies investigating unusual or repetitive violent crimes. The NCAVC also provides support through expertise and consultation in non-violent matters such as national security, corruption, and white-collar crime investigations.

It comprises the Behavioral Analysis Unit (BAU), Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), and Violent Criminal Apprehension Program (VICAP).

VICAP is a nationwide data information center designed to collect, collate, and analyze crimes of violence – specifically murder. It collates and analyzes the significant characteristics of all murders, and other violent offenses.

Homicide Investigation Tracking System (HITS)

A program within the Washington state’s Attorney General’s Office that tracks and investigates homicides and rapes.

Violent Crime Linkage System (ViCLAS)

Canada-wide computer system that assists specially trained investigators to identify serial crimes and criminals by focusing on the linkages that exist among crimes by the same offender. This system was developed by the RCMP (Royal Canadian Mounted Police) in the early 1990s.

UTAP, stands for The Utah Criminal Tracking and Analysis Project

Gathers experts from forensic science, crime scene analysis, psychiatry and other fields to screen unsolved cases for local law enforcement agencies.

International Criminal Police Organization (ICPO) – Interpol’s DNA Gateway

Provides for the transfer of profile data between two or more countries and for the comparison of profiles that conform to Interpol standards in a centralized database. Investigators can access the database via their Interpol National Central Bureau (NCB) using Interpol’s secure global police communications system, I-24/7.

Interpol’s I-24/7

Global communication system to connect its member countries and provide them with user-friendly access to police information. Using this system, Interpol National Central Bureaus (NCBs) can search and cross-check data in a matter of seconds, with direct and immediate access to databases containing critical information (ASF Nominal database of international criminals, electronic notices, stolen motor vehicles, stolen/lost/counterfeit travel and ID documents, stolen works of art, payment cards, fingerprints and photographs, a terrorism watch list, a DNA database, disaster victim identification, international weapons tracking and trafficking in human beings-related information, etc).

Interpol Fingerprints

Provides information on the development and implementation of fingerprinting systems for the general public and international law enforcement entities.

Europol (European Union’s criminal intelligence agency) Computer System (TECS)

Member States can directly input data into the information system in compliance with their national procedures, and Europol can directly input data supplied by non EU Member States and third bodies. Also provides analyses and indexing services.