How Trojan Horse Viruses Can Attack Your Computer

A trojan Horse virus is so called because of its reference to the Greek legend of Troy. The legend goes that a large wooden horse was left outside the gates of Troy as a peace offering from the Greeks, whom the trojans were at war with. Once inside, the horse burst open to reveal Greek soldiers who then destroyed the city.

trojan Horse viruses are similar because they appear to be a harmless program but once installed on your computer can wreak havoc with a number of viruses potentially hidden in its code. There is a slight difference between a Trojan Horse and an actual computer virus however. Unlike typical computer viruses, a Trojan Horse does not replicate itself.

One type of Trojan is known as Spyware. This type of program is designed to monitor your Internet surfing habits and use that information for things such as targeted marketing.

Another common problem that Trojan cause is the installation of a backdoor. This means that hackers have a hidden entrance to your computer in which they can send you spam, take control of your computer, or even destroy it. These types of Trojans can be very hard to detect and eradicate.

How Trojans are Distributed

You may be wondering how to protect yourself against Trojans. The first line of defense is knowing how they are distributed.

One of the most common ways is via a useful program such as a computer utility. Once you run the program with the hidden Trojan it can do what it wishes with your computer. Another common way to get a Trojan is through an email attachment. Many people receive executable files through email and don’t think twice about running it on their computer. Once the program is run, you have a Trojan. If you ever get an attachment with an .exe at the end make sure you run a virus scan before opening it.

It is even possible to embed an image with a Trojan. Once you view the picture the Trojan has invaded your computer. It is best to never open files, regardless of type, if you don’t know where they came from. Even well-meaning friends can accidentally email you an attachment which contains a Trojan.

Trojans often take advantage of your computer’s operating system and ports which connect it to the Internet. Some Trojans even allow others to take remote control over your computer and steal keystrokes which may just be your credit card number.

Fighting Trojans

Other than being wary of what you open and install, the best defense is an up to date anti-virus program. It is important that you ensure your anti-virus software is always current since new viruses come out each day. You can typically download free updates from the software provider. You should also ensure you have a firewall to protect you while online.

Interesting Facts Behind The Applemac Computers

Before Steve Jobs became one of the driving forces behind the personal computer revolution, he held the mundane job as a summer worker at an apple farm. The job left him with the belief that apples were the perfect fruit. Add to this the fact that he loved the simplicity and style of the Beatles’ Apple record label, coming to the decision of naming his new computer company “Apple Computers” was a natural.

Jobs and co-founder Steve Wozniak struggled over the name and finally decided that if no brainstorming session could come up with a better name, Apple it would be. You know the rest of that story and on April 1, 1976, Apple Computer, Inc. was born. The next item on the agenda was then to come up with a logo.

The pair’s first design incorporated an image of Sir Isaac Newton along with a tree and a simple banner that read “Apple Computer.” Steve Jobs wasn’t happy with the result, thinking it was too busy and didn’t send a strong enough message. With the challenges that a personal computer company faced in the early days of the computer revolution, a strong and simple brand was needed. The logo was simplified to show just an apple – similar to what the company still uses today. But it still didn’t satisfy Jobs and Wozniak. It wasn’t until the pair took a bite out of the apple that the logo stuck. The same simple logo is still being used today.

Apple Computer Inc. was incorporated in the state of California on January 3, 1977. Apple’s initial public offering (IPO) on the stock market happened on December 12, 1980. They went public at a rate of $22.50 per share. The stock has split three times since the IPO so on a split-adjusted basis the IPO share price was $2.75. Apple common shares are traded on The NASDAQ Global Select Market under the ticker symbol AAPL, and on the Frankfurt Stock Exchange under the symbol APCD. At the time of this writing, Apple Computer Inc.’s common stock was trading on the NASDAQ at $129.06.

In October of 2008, Apple researched its carbon footprint and provided their personal computer users with estimates of the total greenhouse gas emissions generated by every new product sold. Manufacturing and using the MacBook, which is currently the company’s most popular notebook, results in 460 kg of CO2e emissions over four years of consumer use. According to calculations from the Environmental Protection Agency, that’s roughly the same amount the average car emits in just a month of driving.

Asus Laptop Computer X401a Review

The Asus Laptop Computer X401A gives you more computing power than you might expect from a netbook style computer. With tons of storage space 350GB you never have to worry about running out of space to store your photographs, videos, documents and other important files.The ultra portable design of this laptop is quite remarkable. Yes, its true that tablets are all the rage these days, but you just cant get serious work done on them, like you can with a laptop. The Asus Laptop Computer X401A is only 4.3 pounds and is just 1 inch thin. With that slim build and light weight, you can have all the processing power you need no matter where you go.Asus Laptop Computer X401A ReviewLong battery life.review-o-tronic.com is a website witch gives all information about Asus Laptop Computer X401A Review

Lets face it; there will be times when you just dont have access to an electrical outlet. And its times like those when you depend on having a laptop with long battery life. The Asus Laptop Computer X401As battery will give you hours of power to take care of your web browsing, document creation or email correspondence. Its hard to believe such a small laptop comes with such a long lasting battery.The fact that the Asus Laptop Computer X401A features the 64 bit architecture speaks volumes about the high quality of this model. As you know, 64 bit computers are faster and more robust than their 32 bit counterparts. There arent many laptops of this size that are built on the latest/greatest 64 bit architecture that this model offers.

Its important to know that the Asus Laptop Computer X401A comes with Windows 8 installed. Now, it is very cool to know that this laptop has the latest version of the Windows OS. However, some people have not yet had a chance to get used to the changes that they will experience when using this brand new OS. Most people wont have a problem with the latest version, but some people may find adjusting to be a bit of a pain.Compared to some of the higher end laptops available today, the exterior of the Asus Laptop Computer X401A feels a bit lightweight and cheap. Of course, the lightweight part we can understand. However, this laptop just feels like its not all that rugged. And since there are no anti-shock features built into this laptop, users should be very careful to avoid dropping this laptop.

Asus Laptop Computer X401A ReviewWith all of the raw computer power you get, in such a compact and lightweight laptop, it is easy to understand why so many people consider the Asus Laptop Computer X401A to be one of the best compact laptop computers around.If youre looking for a laptop that gives you plenty of power, the latest Windows OS and does it all without bogging you down with a huge computer, youd be hard pressed to find a better deal than the Asus Laptop Computer X401A.review-o-tronic.com is a website witch gives all information about Asus Laptop Computer X401A Review,Asus Laptop Computer X401A Review

Tips To Help You Pass Your Computer Forensics Certification Tests

Anyone who is interested in computers and who wants to work as a forensics investigator for a private company or even for law enforcement will find that a career as a computer forensics specialist is a great choice. Once you’ve gone through the schooling to get your degree though, you still have quite a bit to do if you want to be at the top of your field. After you have a degree and some experience, it’s a good idea to make sure that you receive some type of computer forensics certification.

Having a certificate from a reputable organization is going to make it much easier for you to find more lucrative and exciting employment later. It will also show your current employer just how much you care about keeping on top of your job, and that alone can lead to advancement. Passing these tests and receiving your computer forensics certificate can be difficult, though. With all of the different types of certification available, from CCE (Certified Computer Examiner), EnCE (EnCase Certified Examiner), and ACE (AccessData Certified Examiner), it pays to know what the tests involve so you can properly prepare.

You can do some simple things that will help you to prepare for your test. One of the first things that you should do, if you are going to be taking the test with colleagues, is form a study group. If you don’t know anyone who is going to be taking the test along with you, then you can head online and try to form an online study group. It’s not ideal, but it can work. Make sure that you focus on studying, though, as it can be easy to get sidetracked. Another option is to find someone online or offline who already has the certificate to get some pointers on the test.

Many of the different exams have multiple-choice questions, so it’s a good idea to practice with questions like this. They will also have practical portions, and you may have to write reports as well. Practice and study in all of these different areas, and it will be much easier when you take the test.

Relax during your computer forensics certificate test. One of the biggest reasons that people fail is because they are nervous and they begin to second guess themselves. With proper education and study before the test, you shouldn’t have any problem receiving your computer forensics certification.

Computer Hardware Components And Accessories

Computers are made of different components or parts, collectively known as PC hardware. Some of the main hardware PC units include CPU, mouse, display screen monitor, hard disk, keyboard, CD drive, etc. You can buy a computer from a branded company or purchase an assembled model through a professional computer software person. Many a times, when some parts of a computer get corrupted, you can also buy separate components from any online or offline computer dealers.

Likewise computer hardware parts also do include novel items such as scanners, sound cards, internet modems and even digital cameras. But, every computer has individual properties like RAM memory, CPU model details, etc which may vary from other computers.

Let us study about some of the most important computer hardware parts:

* CPU- This part is the brain of the computer. It is known as Central Processing Unit and works as a processor. The most popular processors are manufactured by Intel popular as the Pentium Chip model. Intel processors are widely used all over the world by most of the computer manufacturing companies.

* Mouse- This hardware is essential for desktop models as navigational object, to click on varied options, selecting different objects and accessing necessary information on the computer screen. There are two main buttons in the mouse, to be used to access info. Nowadays, you can find interesting types of mouse in the market such as laser mouse or ball mouse. But, they all serve the same purpose to help access computerised info from the CPU.

* Hard Disk- This is a device that helps in storing data. The all-round performance of any computer actually depends on the speed of its hard disk. Higher rotational speed of the hard disk enables fast and high speed performance by that particular computer.

* RAM- It is also known as Random Access Memory, which aids in storing of temporary information in the CPU. When you switch off the computer, such temporary info files are erased. The optimum performance of the computer also depends on the size of its RAM.

* Keyboard- This is one of the most important part in computer hardware. Keyboard helps users to enter specific commands by punching of alphabets, numbers or signs. There are other function keys like Control, Alter, delete, F keys, Page up, Page down, etc in the keyboard. There are a total of 101 keys in any standard keyboard, and designed in such a way so as to make typing faster and easier.

Other additional computer hardware includes scanner, joystick, external drive, printer and servers. Buying individual computer hardware parts can be a tedious task as there are variety of selection models, styles and designs to choose from. It is best to gather some basic first hand info about the specific computer hardware part that you intend to buy.

You can choose to buy from online computer hardware retail shops and other hardware dealers. Online directories can help you sort a list of potential manufacturers or retailers who are genuine and trustworthy.