Jackpot Stock Tip - Sure Shot Money

Jackpot tip, as the name suggests has the potential to make you a Millionaire as it is not the number of tips one trades; but it is the accuracy of a single tip which has the potential to make you a Millionaire. This tip is a value for money for all i.e whether one can see the trading terminal or not or is dealing through a broker on phone at BSE, NSE or in Future and Options segment. Thus you are on a guaranteed path of making money every day with single daily accurate tip.

rocket call

Recover Lost Money Plan

A number of traders have lost their money in the market due to wrong trading advice or wrong decisions and emotions. We keep on getting a number of requests for helping these traders recover their lost money. Thus, this was the genesis of Recover Lost Money Plan. We are proud to say that till date we have helped 1290 people recover their lost money. Get Back your lost money with our Precision Tips backed by timely info and accurate technical analysis and foresight.

Recover Market Losses, Recover money lost with your stock broker
Name,Place *
Mobile *
E-mail *
Message *

* RequiredDaily Make Money
Contact us to Get Immediate Call Back or Email From us to get an Answer for Your Queries. If any delay; Please Feel Free to Speak to 'ANALYST' at 09678069366 or 09988877963 (Roaming) or Call Customer Care at 09678070896.

Friday, February 8, 2008

COMPUTER VIRUS PHENOMENA

0 comments

1. The 20th-century is undoubtedly one of the turning points in the life of mankind. As a science fiction novelist once said, "mankind has rushed forward, like a whipped horse"; having defined themselves as a technocratic civilization, our grandfathers, our fathers and we ourselves had been giving all our abilities and our strength to the development of machines - from medical instruments to space ships to agricultural machinery to atomic power plants to transport to communication - this list is endless, because one can hardly name a single area of humankind's activity, not affected in any way by the development of machinery. What was a reason of such global and intensive progress? Military opposition, or evolutionary "brain growing" of humans, or humans' pathological laziness.

2. Mankind has been seized and charmed by machinery; a few people would agree to give up a modern automobile in favor of horse cart. Many people have already forgotten what an conventional mail is, with its paper envelopes and mail couriers - email took its place, delivering mail with unbelievable speed (up to several minutes irrespective of distances) and being very reliable. One cannot imagine modern society without computers, which are capable to increase the effectiveness of labor many times and deliver any imaginable information .Cellular phones are not unusual to us, let’s imagine that just ten years ago. The 20th century is one of the most controversial centuries. This is the age of paradoxes, the main one of which is man's attitude towards nature. Having ceased to being nature's friend, having conquered it and proved that he might easily destroy it, man suddenly realized, that he will die together with nature, and suddenly all the parts in the "mankind vs. nature" drama became mixed up. Having become a technocrat, man still believes in God (or in something similar). The most important technical phenomena of the 20th century are: man's journey into space, making use of atomic energy, revolutionary development of communication and information technology, and of course staggering development of micro- and macro-computers. And as far as computers are concerned, there always appears one more phenomenon of the end of the century - the phenomenon of computer viruses.

3. First of all, computer viruses present a serious and distinctive problem, which no one has expected. Science fiction writers began writing about viruses after the first actual virus had hit its first computer.

4. Second of all computer virus is the first attempt to create artificial life. A successful attempt, but wouldn’t call it useful - as for now the computer microorganisms are more like pests rather than anything else, creating all kinds of problems. But still this is life, because viruses have all the properties of a live organism. They can propagate, adapt themselves to environment, move etc (within computers only of course), just like conventional viruses can do the same within cells.

5. And third of all the subject of computer viruses stands aside from most computer related problems). Virtually all the problems which man solves using computers are a purposeful continuation of man's struggle with nature.

6. However fighting computer viruses is fighting one human intelligence with another (being in a sense just another form of the forces of nature, but there are more than one opinions on that). This fight is a fight of wits, because virologists face the tasks set by another people just like them. They invent new virus - we have to take care of it. Then they invent a new virus, which is very hard to crack - but we still have to take care of it. And even as we speak there definitely is a guy sitting in front of a computer and obsessed with producing another monster, which will have to be analyzed for a whole week and debug anti-virus algorithm for another week. Just like the evolution of live organisms, we see now that the appearance of computer viruses is one of the most interesting moments of the 20th century's technical progress.

Computer Virus

0 comments

The various types of viruses are: -

a) Program viruses. Infect computer programs and become active when the infected program is run.

b) Boot sector viruses. Infect diskettes and hard disks and become active when an infected disk is used to start the computer.

c) Macro viruses. Infect documents (files) through the macro programming capabilities of some newer programs. Macro viruses become active when an infected document is opened, and the program opening the document has its macro capabilities turned on (enabled).

Online Casino Transparency

0 comments

1. I want to become a professional online casinos wizkid and thus was looking for an online platform which can provide me with a stupendous bonus so that I can explore all the games with an open mind and my search homed on to joyland casino which was offering the highest bonus in the indstry i.e. close to $808.

2. Another concern addressed by casino joyland was the transparency in its system for random number generation and usage of encrypted technology for passage of private information and thus one can play at the site with an open mind.

Computer Virus 3/3

0 comments

1. Computer Viruses are classes of programs intentionally written to cause some form of damage to computer systems of networks. However, all programs that are used to cause damage are not computer viruses. Other damaging types of programs are Trojan Horses, network worms, and logic bombs. These programs, along with computer viruses, are more properly referred to as malicious software. They are not all computer viruses because each replicate and do damage in different ways.

2. A Trojan horse is a program that seems to be useful, but contains a command procedure that is triggered by a hidden code. When the computer user inadvertently enters that code, the program performs some unwanted function. A simple example of a Trojan horse program can be seen in a program that is named CALCULATOR. When the computer user opens the program named CALCULATOR, the hidden code is triggered, and the Trojan horse then does something harmful to the disk, like deleting files etc.

3. Another type of malicious software is the network worm. Network worms are programs that spread through network connections, using usernames as passwords and commands to copy themselves into the system. Network worms are extremely dangerous because they can behave as computer viruses, implant Trojan horse programs, and perform any number of disruptive or destructive actio3s. Network worms replicate in many ways. They can replicate through a network mail facility and mail copies of themselves to other systems, or they can run copies of themselves on another system. An example of an actual network worm is the Internet Worm.

4. Logic bombs, otherwise known as time bombs, are another type of malicious Software that does some type of damage. Out of all malicious software, logic bombs are more annoying than harmful, and do the least amount of harm. Logic bombs are pieces of codes that are in programs or the operating systems of computers. They wait for particular events, such as certain words to detonate, causing (some form of) damage. An example of a logic bomb is the Fu Manchu virus. Whenever the words Reagan, Thatcher, of Botha are typed in, childish, obscene comments are made, or rather projected on the screen. Whenever a computer user tries to run a program, the Jerusalem-B virus just does minor annoying things to computer screens.

Computer Virus- Part 2/3

0 comments

1. TSR . (Terminate and stay resident ) A virus may or may not become resident in memory. If it does go TSR, then its chances of infecting files are greatly increased. Otherwise it can only do its stuff when an infected program is run. If the virus is in memory it can infect files any time it chooses. Partition table and boot sector infecting viruses are always TSRs.

2. Stealth . Some TSR viruses use a sophisticated technique called Stealth cloaking. What this means is the virus will fool the system so that everything appears to be normal. When a user does a directory listing the virus will intercept the disk read, and alter the data so that the file sizes appear to be unchanged, when in actuality they have increased in size. Boot sector infectors may use stealth so that when the user attempts to view the boot record, instead of showing the actual boot record, a copy of the old boot record is returned instead. Because of stealth techniques it may be impossible to detect a virus once it has become resident in memory. The only sure way to check for a stealth virus is to boot from a clean, write- protected floppy, then scan the hard drive. It is a good idea to prepare such a floppy disk ahead of time, and adding anti-virus software. Most anti-virus software allow the user to create an emergency boot disk, as does windows itself.

3. Activation criteria and effect. The other area that gives a virus its personality is the activation criteria, or what makes it go off. Some activate by the date, others activate when a certain program is run, and others will activate when they can't find any more files that haven't been infected yet. When a virus activates it will take a certain action. This is known as the activation effect.The effect may be as simple and harmless as is playing a message or as malicious as trashing the victim's hard drive.

Computer Virus - Part 1/3

0 comments

1. A computer virus is a program that can make copies of itself. Most computer viruses do nothing more than this and are more of an annoyance than a danger. Some computer viruses may also harm data and programs stored on a computer.

2. A Virus is a small, executable program (Macros can be considered as executable) with the ability to replicate itself by adding its code to that of a host program and/or the system area of a hard or floppy disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions and at which time it is often too late. However, once the user knows what signs to look for, it can be very obvious when viral activity occurs. Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other: -

a) Size . A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.

b) Method of infection. A virus can infect the host program in
different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods:-

i) Overwriting. When a virus infects using this method, it will simply write a copy of itself over the beginning of the host program. This is a very simple method and is used by more primitive viruses. An infected file has been destroyed and must be restored from a backup disk. Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.

ii) Appending . This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the beginning of the program. When the user runs the infected program it will jump to the end of the program where the virus is located, perform the functions of the virus, then return and continue to run the host program. To the user, the program is functioning normally. This method of infection causes infected programs to increase in size. Some appending viruses are unable to tell whether or not they have already infected a program and will continue to infect the program hundreds of times, causing it to grow considerably in size.

iii) Disk infectors . Other viruses will infect the boot record or partition table. This is an executable area of the disk that is automatically run every time you boot up from the disk. This means that as soon as the computer boots up, the virus is in memory.

DISCLAIMER SPONSORED POSTS

This policy is valid from 01July,2007. This blog is a personal blog written and edited by me. For questions about this blog, please contact me. This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation. This blog abides by word of mouth marketing standards. We believe in honesty of relationship, opinion and identity. The compensation received may influence the advertising content, topics or posts made in this blog. The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. Every effort is made to make the sponsored post identifiable but at times due to advertisers restrictions the same may not be feasible all the time.The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question. The owner(s) of this blog would like to disclose the following existing relationships. I have a interest in technical field which may influence the style of writing.