Tuesday, August 20, 2013

Cloud Computing

What is Cloud Computing?




Cloud Computing(CC) is now evolving like never before, with companies of all shapes and sizes adapting to this new technology.  Industry experts believe that this trend will only continue to grow and develop even further in the upcoming years.  While cloud computing is undoubtedly beneficial for mid-size to large companies, it is not without its downsides, especially for smaller businesses.


Definition says that Cloud Computing(CC) is a colloquial expression used to describe a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication network.  In science, CC is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time.
To say it in noun, CC is a Computing services provided over the Internet or cloud, whereby shared resources, software and information are provided to computers and other devices are on demand.


Main Advantages of Cloud Computing:

1. Cost Efficiency
2. Availability
3. Backup and Recovery
4. Environment friendly
5. Scalability and Performance
6. Increased Storage Capacity


Main Dis Advantages would be:

1. Security
2. Technical Difficulties
3. Increased Vulnerability


I'll explain the advantages and Cons later in the next post.
Keep updated.

CONTACT ME ON FACEBOOK


Sunday, August 11, 2013

TOP TEN COMPUTER VIRUSES OF ALL TIME

Top 10 Virus Of All Time

10. Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam.

9. Red Raider

Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.

The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red.

8. Bad Benjamin

Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin.

7. Numbing Nimda

Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool.

6. Tennis Anyone?

The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova.

Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.

5. (Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

4. Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr.

3. Malevolent Melissa

The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.

So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa.

2. Klez the Conquerer

The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez.

1. Love Hurts

LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.


CONTACT

Saturday, August 10, 2013

மயிரே போச்சு...

என்னுடைய முதல் வலைப்பதிவு இது..தமிழில்..

'மயிரே போச்சு' என்று யாராவது சொன்னால் அவர்களை பார்த்து சிரியுங்கள்..

ஏன் சிரிக்க வேண்டும்???

இந்து முறைப்படி, மொட்டை அடிப்பது ஏன் என்று உங்களுக்கு தெரியுமா??

'கடவுளே! என் அழகையே உனக்கு அர்பணிக்கிறேன்.. எனது கோரிக்கையை நிறைவேற்று..' என்று அர்த்தம்..

ஒருவருக்கு அழகை தருவதில் நமது முடி முக்கியத்துவம் வாய்ந்தது.. அதை ஒருவன் உதாசீனம் படுத்தினால், அவனுக்கு அவனுடைய அழகின் மேல் அவனுக்கே அக்கறை இல்லை..


(ஏதோ சொல்ல எத்தனித்திருக்கிறேன்.. சரியாக வந்ததா என்று தெரியவில்லை.. உங்கள் நேரத்தை வீனடித்திருந்தால் மன்னியுங்கள்)

CONTACT

Thursday, August 8, 2013

HOW TO INSTALL IN WINDOWS' OPERATING SYSTEM???

That sounds weird, isn't it?

Yep.. Most of the geeks and nerds don't care to know how to install a Windows' OS.
Most of the guys and gals are studying in B.E., B.Sc., M.C.A., in Computer field should be aware of this. Because, when some stranger or a neighbor asks you to install an OS, what will you do?? Stare at him??

Let's have a clear point and clear solution about that.

THESE ARE THE STEPS INVOLVED TO INSTALL A WINDOWS' OS:

1. Have a 4 GB Pen Drive.
2. Have the Windows OS in a .ISO format which you wanna install.
3. You must have PowerISO to convert your USB into a bootable Pen Drive.

Let's start the process.

Open PowerISO and goto Tools>Create Bootable USB Drive

It will prompt you to use as a administrator. Click Yes.

It will ask you to choose the source image file (.iso file). Choose it.

Choose the destination USB drive, that you wanna change to bootable.

Choose the Write method. Most probably the default option will be USB - HDD. If No, select that option.

Then hit 'Enter'.

It will start to create your USB into Bootable disk.

After it gets finished, unplug your device.


NOW IT'S TIME TO CHANGE THE DEFAULT BOOTABLE OPTION IN YOUR SYSTEM:

When you switch on your system, in the bottom of the screen, you can see "PRESS F2 TO GET THE BOOTABLE OPTIONS". Press it. It some computers, it may be F12.

Now, go to the BOOT tab, and change the First preference to USB. You can change it by pressing F5 to move up and F6 to move the option down. And Exit. And restart your system by plugging your bootable pen drive.

It's almost done.

Now we will be directed to OS Installation settings.

Accept the terms and conditions, and choose the drive (C/E/G or whatever drive you've in your PC) and install it.

It will restart at some point. Unplug your pen drive at that time, and plug after it gets on.

It will complete the installation process.

It will restart again now. Now unplug you USB permanently.

It's done.

Welcome to the neighborhood.

Sorry for not showing any screenshots. But i bet it will work fine. If you want any help,