Friday, April 22, 2016

Multibooting

In todays life of the computer administrators, multibooting is highly necessary for every tasks related to the data processing. Multibooting helps user to create programs in dual environment. Its also called dual booting on a single hard disk drive or multiple hard drives. Basically users experiment on windows and linux related to their projects.

Thursday, April 21, 2016

Computer Security

Computer security, also known as cyber security or IT security, is the protection information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.The field is of growing importance due to the increasing reliance on computer systems in most societies.Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things – and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

some of the reasons for which IT security is mostly required which is as follows:

1. Malware

Its a small size computer program designed to perform specific changes to the stable  process of the computer like making changes to the registry, stopping process of some useful programs, taking too much memory to process. These are of several types depending upon their process like New Folder, Trojan, Win32 etc. Some malware are usually active while connecting to the internet and some doesnt need internet to perform various tasks. They usually are transferred from the usb drives, Cd-roms, pirated softwares that replicates easily for another attack.


Some of the antivirus or internet security programs can control the action of the malwares which are as follows:
  1. kaspersky security
  2. Avira Security
  3. Norton Security
  4. McAfee Security
  5. Panda Security
2. Internet Hoaxes

Most of the time people are mentally harassed by the pictures which are entirely photoshopped by adding some elements of the plants, animals etc. to make it more realistic and upload them in different websites. This makes people scared all the time and they tend  change their daily routine of food and lifestyles. This usually occurs in personal emails about false news about some advertisements, products, office letters because these tends to make people click on it and scam them for different options to hack their social and bank accounts. 
Some of the examples that prove that these internet hoaxes are scamming us day to day in our life as follows:

1. A fantasy creature in real:
Actually its nothing but a hoax because according to research done by the various scientists this is not a real image of some creature but just photoshopped image.

2. A fake email using the name of US Airways "reservation": 

Since the image is too large to view if u can read its fine. The emails are not from US Airways. Those who click the link will be taken to bogus websites that contain a BlackHole toolkit that is used by criminals to distribute an information stealing trojan.