Translate

Showing posts with label WINDOWS. Show all posts
Showing posts with label WINDOWS. Show all posts

Wednesday, January 29, 2014

Difference between Viruses, Trojans, Worms and Malware.

I. What is Malware?
The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your information.

II. Viruses --> Wreak Havoc On Your Files
The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.

III. Spyware --> Steals Your Information
Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it thoroughly.

IV. Trojan Horses --> Install a Backdoor
Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.

V. Worms --> Infect Through the Network
Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
viruses.
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down. 

Wednesday, January 15, 2014

MICROSOFT EXCEL SHORTCUT KEYS

1. F2 Edit the selected cell
2. F3 After a name has been created F3 will paste names
3. F5 Go to a specific cell. For example, C6
4. F7 Spell check selected text or document
5. F11 Create chart from selected data
6. Ctrl + Shift + ; Enter the current time
7. Ctrl + ; Enter the current date
8. Alt + Shift + F1 Insert new worksheet
9. Shift + F3 Open the Excel formula window
10. Shift + F5 Bring up search box
11. Ctrl + A Select all contents of the worksheet
12. Ctrl + B Bold highlighted section
13. Ctrl + I Italic highlighted section
14. Ctrl + K Insert link
15. Ctrl + U Underline highlighted section
16. Ctrl + 1 Change the format of selected cells
17. Ctrl + 5 Strike through highlighted section
18. Ctrl + P Bring up the print dialogue box to begin printing
19. Ctrl + Z Undo last action
20. Ctrl + F3 Open Excel Name Manager
21. Ctrl + F9 Minimize current window
22. Ctrl + F10 Maximize currently selected window
23. Ctrl + F6 Switch between open work books or windows
24. Ctrl + Page up Move between Excel work sheets in the same Excel document
25. Ctrl + page down Move between Excel worksheets in the same Excel document
26. Ctrl + Tab Move between two or more open Excel document
27. Alt + = Create a formula to sum all of the above cells
28. Ctrl + ’ Insert the value of the above cell into cell currently selected
29. Ctrl + Shift + ! Format number in comma format
30. Ctrl + Shift + $ Format number in currency format
31. Ctrl + Shift + # Format number in date format
32. Ctrl + Shift + % Format number in percentage format
33. Ctrl + Shift + ^ Format number in scientific format
34. Ctrl + Shift + @ Format number in time format
35. Ctrl + Arrow key Move to the next selection on text
36. Ctrl + Space Select entire column
37. Shift + Space Select entire row
38. Ctrl + - Delete the selected column or row
39. Ctrl + shift + = Insert a new column or row
40. Ctrl + Home Move to cell A1
41. Ctrl + ~ Switch between showing Excel formulas or their values in cells 

Monday, December 30, 2013

Make Your Windows Genuine Using Notepad!!!!

1. Copy and Paste the following code in the Notepad.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \WPAEvents] "OOBETimer"=hex:ff,d5,71,d6,8b
,6a,8d,6f,d5,33, 93,f d
"LastWPAEventLogged"=hex:d5,07
,05,00,06,00,07, 00,0 f,00,38,00,24,0
0,fd,02
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi
crosoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete
data - do not use)"
"InstallDate"=dword:427cdd 95
"ProductId"="69831-640-1780577
-45389"
"DigitalProductId"=hex:a4,00,0
0,00,03,00,00,00 ,36, 39,38,33,31,2d,
36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,
33,38,39,00,5a,00,00 ,00,41,32,32,2d
,30,30,30,\
30,31,00,00,00,00,00,00,00,00,
0d,04,89,b2,15,1b,c4 ,ee,62,4f,e6,64
,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,
01,00,00,00,00,00,00 ,00,00,00,00,00
,00,00,00,\
00,00,00,00,00,00,00,00,00,00,
00,31,34,35,30,34,00 ,00,00,00,00,00
,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,
87,01,00,00,00,00,00 ,00,00,00,00,00
,00,00,00,\
00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00 ,94,a2,b3,ac
"LicenseInfo"=hex:9e,bf,09,d0,
3a,76,a5,27,bb,f 2,da ,88,58,ce,58,e9
,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,
d0,9d,67,a5,3d,6e,42 ,0d,60,c0,1a,70
,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3, 17

2. Save the file with the .reg
extension.

3. If you run the file means it will ask
you the confirmation to add the value
to your Registry.

4. Press Yes.

5. Reboot your System.

6. Start Downloading from Microsoft Site.

Thursday, December 19, 2013

Difference between Core I3, Core I5, Core I7 Processors?

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ¬ (efficient use of processor resources)
* 3-4 MB Cache
* 32 nm Silicon (less heat and energy)
Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ¬ (efficient use of processor resources)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and energy)
Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ¬ (efficient use of processor resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

ग़ज़ल

rizw4nkh4n *ख़ुलूस-ए-दिल = purity of heart *एहतराम = आदर, सम्मान *मिज़ाजपुरसी = हाल-चाल पूछना *बाम = घर में सबसे ऊपर का कोठा और छत *इक़राम =...