Computer Viruses: Overview

computer-safetyComputers have incredible capabilities. They can accomplish great tasks, communicate clearly, make things move and think beyond human measure. Computers have become like humans in nearly every conceivable manner, so it’s no surprise that computers can also get sick.

The computer revolution first began picking up speed in the late 1980s. Since then, it has evolved to be a vital element in our society, our corporate and our personal lives. Computers have become part and parcel to virtually everything we do day in, and day out. But with all good comes a little bad. Some users have maliciously created computer viruses that have grave effects. The range of computer viruses existing in our modern networks has a huge prominence in our lives, because of all the ways we depend on computers. Despite our need for dependable computers, some people have nothing better to do but exercise their computer knowledge in a destructive way, creating computer viruses.

The first computer virus, called “The Brain”, was created in 1986. The Brain is a boot-sector virus, which occupies unused space on the disk to eliminate further use of memory space. After it was created, The Brain quickly spread worldwide in 1987. The Brain virus was considered first to use stealth techniques, making the virus difficult to detect.

On November 1, 1987 another virus appeared. The Lehigh virus was named after Lehigh University, the place where this particular virus was first discovered. One Friday the thirteenth, in December of that same year, the Jerusalem virus was discovered at Hebrew University. This virus has also gone by the names “AabStar”, “Friday the 13th” and the “Black Window”. This is one of the oldest and best-known computer viruses in the world.

Two more viruses surfaced in 1988: the Stone, which was the first bootstrap virus, and the Internet Worm. The Internet Worm caused mayhem in the corporate world as it crossed the United States overnight through a series of computer networks. Then in 1989, the Dark Avenger was introduced. This was a fast-infector that possessed the capability to infect new files despite the presence of anti-virus software. The Dark Avenger computer virus was designed to damage a system slowly. The virus would go unnoticed at first, and damaged files would not be backed up. Slowly it would consume more and more of your computer until it had created permanent damage.

Computer manufacturers and software engineers began the public war against computer viruses around 1990. Corporations began to respond to growing public concern and the number of anti-virus products began to rise. The threat of computer viruses was finally taken seriously. McAfee, IBM, Digital Dispatch and Iris all introduced their anti-virus products and software in 1990. Despite their efforts, computer viruses grew faster, stronger and sneakier. Symantec Norton anti-virus was introduced was introduced in 1991.

The introduction of Windows 95 brought both relief and discomfort to anti-virus companies when it was released in 1995. At that time, most common computer viruses were still boot viruses that worked on DOS, but couldn’t replicate on Windows 95. Then micro viruses were discovered in late 1995. These computer viruses performed in the MS-Word environment, rather than DOS. Again, the anti-virus industry faced challenges to fight against these new batches of viruses. With the introduction and growing popularity of the Internet in the late 1990s, viruses began to spread at a much faster rate.

Throughout 1998 there was no lessening of computer virus attacks MS Office, MS Windows, MS Office and network applications. New viruses continued to appear, and computers and advanced network-to-do applications continued to be affected. In 1999, another virus appeared, infecting computers using Microsoft Word. This computer virus may have been passed on via MS Outlook, or through Outlook Express e-mail programs.

The “Loveletter” virus, also known as “Love Bug” and the “I Love You” virus, is believed to have struck one in five PCs worldwide, making it the most widespread and the most costly computer virus the world had ever seen. The “I Love You Virus” created panic and discord around the globe. The virus was transferred by e-mail. When the receiver opened the attachment, the virus was automatically sent to everyone in the user’s address book. The “I Love You” computer virus spread at a dizzying rate of speed.

As long as we continue to use the Internet and share computer files, we are at risk of catching computer viruses. Even today, more and more viruses are still being discovered, leading to big problems for all users, and creating ongoing dilemmas for the creators of anti-virus programs.

Like people, getting sick is an unfortunate fact of life for computers. Using up-to-date anti-virus software is a sort of preventative medicine, helping to keep computers healthy and computer viruses at bay.

Laptop Tips To Get The Most Bang For Your Buck

mqdefaultUnderstanding is what helps anyone make a decision. When it comes to buying a laptop, this is still the case. If you understand what you should be looking for when you make such a purchase, you’ll easily navigate the options available to you, so check out all of the great tips below.

Consider the weight of each computer while you are shopping. Most laptops are less than 5 pounds, which is important if you will be using your computer while on the go. Although some laptops focus on mobility issues, these computers are often more expensive. Consider buying a computer with a smaller screen.

One of the first things to consider when buying a laptop is if you want a PC or an Apple product. PCs are often considered better gaming units, while Apple products are known for their photo editing abilities. Consider how you will use your laptop when making this important brand decision.

Upgrade your RAM storage whenever possible. Random access memory is being used by the operating system and any software running on your computer. Increasing the RAM will help your computer run more quickly. If you plan to save a lot of media to your computer, you will need to increase your data storage capability. If you’re going to buy a used laptop, make sure that you use it for a while first. You want to make sure that it boots up quickly. It should also not be making too much noise.

Check to see how hot it gets as well. You may want to consider buying it from a retail place with a guarantee of some kind. To get the best deal on a laptop, start looking at the release cycles ahead of time. You can save a lot of money by purchasing last years model. Even a computer that is only a few months old can help you save. You may not get all the newest hardware but an older laptop may suit your needs.

Consider accessories you will use when purchasing a laptop. You will likely want a carrying case. You may want a spare mouse. The price can add up. Get online estimates for each item you need and incorporate those expenses into your budget.

It doesn’t matter if you need a laptop for work, school or entertainment – these tips will help you get it with less hassle than those not in the know. You’ll avoid many hurdles now that you have read the tips above. Use them today to have a great laptop for tomorrow.

Don’t have the budget to buy a new laptop but your current computer is acting up? Have it professionally checked. You’ll never know, maybe all it needs is some reformatting or perhaps some virus removal.

Diagnostic Computer Software And Programs

mqdefaultMajority of people don’t understand until they get an error message one day that they have an issue with their operating system for their personal computer. Before the computer system reaches this stage, you might notice that the computer keyboard or other input devices work incorrectly and that the system has slowed considerably over a span of weeks and gibberish is written across the computer screen.

You might attempt to reboot several times to the operating system with exactly the same consequence. Then other input might consider using a recovery disk that contains diagnostic software on it that could identify the source of the difficulty.

Some computer operating systems need users to access diagnostics software by repetitively hitting the F8 key on the computer keyboard. This process will choose the operating system into a safe mode that will permit the operator to perform several diagnostics on the computer system. If the errors are found and fixed, the computer system should load normally on the next restart, although some programs might now operate generally while in safe mode.

Using this kind of diagnostic computer software will require a comprehension of error codes and settings by which the computer operates. The user manual is going to have whole listing of error codes and the list will even explain the things that they mean. While the computer is working in safe mode, the computer operator will be offered several choices on the computer screen that will help repair the malfunctions that are on the hard disk of the computer by the operating system.

Changes ought to be made sparingly to the computer while it is working in safe mode. Any numerical changes that happen to the hard disk will effect the way when the computer system is restarted, it will react. Every computer user should activate the system restore option below the system icon of the control panel when the computer is purchased by them.

The system restore selection will permit the diagnostic software to restore the system to an earlier time, and is especially helpful when the system stops working after new software or hardware was installed. The computer systems restore diagnostics software application is a significant system application that numerous users forget to start. The restore settings will make recovery of materials easier in case the system stops responding due to infection by computer viruses or software that is corrupted.

If the diagnostics software fails to repair the system, then the user is faced with re-installing the operating system from operating discs that are provided with each new computer system. A good rule of thumb to follow is to back up advice on a weekly, daily or monthly basis to make sure that no data is lost.

Feel a bit overwhelmed with computer repair problems? Well you can always get the services of professional companies like Clayton Computer Repair. They provide PC repair services and maintains computer systems and servers. For more information about them you can click here.



Computer Virus Removal 25

The final categorization of viruses is the mighty Trojan Horse.

computer-setup-raleighThe Trojan Horse is pseudo like software that appears harmless but once you install the software, look out! It causes more problems than you could ever think of!

Trojan Horse viruses try to emulate software that is legitimate from a well known company. For example, Windows software was being emulated on file sharing servers only to find out that after downloaded, it was not a Windows based program by spyware or worms in the files that quickly spread over your entire system.

Trojans are really annoying because they change system settings without you knowing it and include extra icons to your desktop that initialize and pop up at the most unwanted times while you are trying to use your computer. Many Trojans can cause serious data loss and be targeted to wipe out your “My Documents” folder in your Windows Operating System. Microsoft Word defaults all documents to this folder.

Trojans also create a way for hackers to get into your system which allows for your personal and confidential information to be compromised. Trojans don’t replicate or reproduce like other files.

Trojans can also appear as bundled or blended threat viruses and worms. One Trojan can open the door to your system. Another Trojan can go straight to the computer register and write malicious code to the register while another Trojan can release worms into your system. These threats can cause major damage and downtime to your system.

Trojans are really powerful and you should by all means pay attention to virus postings and warnings from Microsoft and other reputable computer companies. Some Trojans have been so powerful that in the past, they have gotten front page coverage, such as the Anthrax Trojan threat a few years back.

Certainly, a Trojan Horse threat is nothing to play with. These Trojans have been known to knock out government data systems and reconfigure critical, sensitive military data. You should use full protection in battling Trojan Horse viruses. For more information or serious virus removal, check out our site at