Announcement:

This is a Testing Annocement. I don't have Much to Say. This is a Place for a Short Product Annocement

Thursday, August 15, 2013

Types of viruses and how to prevent them?

A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
Types of viruses and how to prevent them_FunWidTricks.Com

Types of viruses that user should know!

Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot Record (MBR) is stored. The Master Boot Record (MBR) stores the disk's primary partition table and to store bootstrapping instructions which are executed after the computer's BIOS passes execution to machine code. If a computer is infected with Boot Sector Virus, when the computer is turned on, the virus launches immediately and is loaded into memory, enabling it to control the computer.

File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part of Operating System or data files.

Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program.

Macro viruses: Macro viruses are written by using the Macro programming languages like VBA, which is a feature of MS office package. A macro is a way to automate and simplify a task that you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computers.
Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-virus application by encrypting parts of the virus itself. This is known as mutation.

Armored Viruses: Armored Viruses are type of viruses that are designed and written to make itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself from antivirus programs, making it more difficult to disinfect.

Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic nature which helps them to hide from heuristic detection.

Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered anti-antivirus. Some Retroviruses attack the anti-virus application and stop it from running or some other destroys the virus definition database.

Multiple Characteristic viruses: Multiple Characteristic viruses has different characteristics of viruses and have different capabilities.


How to prevent them!

1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.

2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updatable. New viruses are produced daily, so it's important to have software that can detect the latest threat.

Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.

3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).

4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.

If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.

5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs

6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.

7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.

8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.

9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by un knowledgeable users. For a list of known hoaxes check out the following site:
http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp

Improve PC Performance using Free RAM Optimizer Tools

Most of the PC users feel uncomfortable to run most of the software due to small amount of RAM(Random Access Memory) their machine have. RAM is the part of your hardware where all the data goes before it gets to your CPU. SO the more RAM you have, the more your computer can store and transfer data to the CPU faster.

Here I am going to post some of the best free RAM optimizer which will significantly improve PC performance by removing garbage processing power.



Improve PC Performance using Free RAM Optimizer Tools
1. Wise Memory Optimizer

It is a simple and free system utility that automatically frees up the physical memory consumed by some useless applications and thus enhances your overall Windows performance. You can also leave it running in the background so that it can tune up RAM performance whenever it finds any chances.
Improve PC Performance using Free RAM Optimizer Tools_FunWidTricks.Com

Link: Wise Memory Optimizer (Size: 809KB)

2. Mz RAM Booster

It is yet another free Windows utility that helps in improving your computer’s performance by recovering unused RAM memory. The best thing about this tool is that it uses less resources while running and so it is an ideal tool for optimizing the RAM.

Improve PC Performance using Free RAM Optimizer Tools_FunWidTricks.Com

Link: Mz RAM Booster (Size: 1.3MB)


3. Free RAM Optimizer XP

If you’re still using Windows XP operating system, then this particular utility is for you. This program continuously scans and frees up memory in case if it falls below a certain point (set by you).

Improve PC Performance using Free RAM Optimizer Tools_FunWidTricks.Com

Link: RAMOptimizerXP (Size: 333KB)

4. RAM Rush

It stays in the taskbar and pops up when hovered over. You can make it to run automatically when the RAM memory is lower than 8% of its overall capacity.

Improve PC Performance using Free RAM Optimizer Tools_FunWidTricks.Com

Link: RAMRush (Size: 534KB)

5. Anvi RAM Booster

It is actually an add-on which you can copy and use from your USB drive like the portable apps. But, in order to make this tool work, you’ll also have to install its parent app ‘Cloud System Booster’ which is a powerful all-in-one Windows maintenance utility (free).

Improve PC Performance using Free RAM Optimizer Tools_FunWidTricks.Com

Link: CloudSystemBooster (Size: 5.5MB)

Thursday, August 8, 2013

Top 5 Countries With the Fastest Internet

You might be exciting to know which countries provide blasting internet speed for their subscribers. Here I am going to post top 5 countries who provide maximum bandwidth for their users.


Top 5 Countries With the Fastest Internet
Top 5 Countries With the Fastest Internet_FunWidTricks.Com

1. Hong kong (Speed: 63.6 Mbps)

Hong kong has the worlds fastest internet speed. It has blazing fast internet, an average peak speed of 63.6 Mbps megabits per seconds. At this speed you can download HD movie in about 2 minutes.

2 . Japan (Speed: 50 Mbps)

The home of Nintendo and Sony had the second fastest internet speed, thanks to the high-speed fibre optics that run through many parts of the island nation. Japan’s average peak broadband speed reached an impressive 50 Mbps, which was more than 170% faster than the global average


3. Romania (Speed: 47.9 Mbps )

When last checked in on Romania, it was ranked No. 5 and was the only country to see its average fall from the previous quarter. The country is now back on track, and has elevated itself with an average peak speed of 47.9 Mbps. That’s 160% faster than the global average. Romania’s average was 9% higher than the previous quarter

4. South Korea (Speed: 44.8)

Serious PC gamers who want to dominate in StarCraftneed fast, low latency internet connections. They’ll find that in South Korea, home to consumerelectronics giants Samsung and LG. The country’s average peak hit 44.8 Mbps, about 143% faster than the global average.

5. Latvia (Speed: 44.2 Mbps)

Smaller countries are easier to blanket with high-speed internet, which is one of the reasons why Latvia consistently ranks high on this list. The average peak broadband speed was 44.2 Mbps, about 140% faster than the global average.

Monday, August 5, 2013

Different Technologies And Their Founders

Most of us are using internet services but mostly unaware about their founders. So here is the list of founders for top 22 web services that you should know.

Different Technologies & Their Founders
Different Technologies And Their Founders_FunWidTricks.Com

1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten


12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams

Most Interesting Linux Facts That Each Geek Should Know

    Linux is one of the world’s most powerful and popular operating system. Linux operating system was developed by Linus Benedict Torvalds at the age of 21. At present there are more than 300 flavors of Linux are available and one can choose between any of them depending on the kind of applications they want.

    Linux is a freeware and generally speaking its free from Virus and other malware infections. In this post I will share few Linux facts which may or may not be know for many of us.



    Most Interesting Linux Facts That Each Geek Should Know
    Most Interesting Linux Facts That Each Geek Should Know_FunWidTricks.Com

    1. Only 2% of the current Linux kernel written by Linus Torvalds.

    2. The Linux kernel version is written in the programming language C.

    3. The first commercial distribution GNU / Linux was Yggdrasil was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999.

    4. A guy named William Della Croce Jr. registered the name Linux and demanded royalties for use of the mark. Later, he agreed to assign the trademark to the true owner, who is Torvalds.

    5. Countries such as Russia, Brazil and Venezuela have put their focus on Linux as a basis for interoperable management , cost efficient and technologically independent.

    6. U.S. Department of Defense, U.S. Navy Submarine Fleet, Federal Aviation Administration uses Linux in government offices. Indian state of Tamil Nadu uses Linux for education purpose.

    7. 90% of the world’s most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system.

    8. The name of the penguin, Tux , is not entirely clear. On the one hand, it is said that the origin of the name comes from the fact that penguins appear to be wearing a tuxedo, which in English is said max tuxedo tux and is abbreviated. In contrast, another source comes from the letters of the logo of Tux are Unix Torvalds.


    9. Torvalds wanted to call the kernel Freax (a combination of “free”, “freak”, and the letter X to indicate that it is a Unix-like), but his friend Ari Lemmke, who administered the FTP server where the kernel was hosted for download, the download directory called kernel of Linux Torvalds.

    10. Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.

    11. Linux is present in highly critical applications such as Japan’s bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.

    12. Linux programmers are often associated with living “isolated” in the world, however, over 75% of the code developed for the Linux kernel came from private sector developers. In fact, large technology companies like Intel, Google, IBM, AMD, Sun Microsystems, Dell, Asus, HP, Analog Devices, Oracle, Novell or Red Hat help developing applications, contributing to the core or pre-installing any GNU / Linux their machines. In fact, during the 2003 Super Bowl (which paralyzes the United States and remains glued to the TV for many Americans), IBM delivered a beautiful ad talking about Linux and open source options.

    13. The GNU project in 1991, had no drivers and kernel, that’s what led to Linus Torvalds to address the Linux kernel development. If GNU had had, perhaps, Torvalds had not been put to work on that.

    14. The Linux kernel is now the most widely ported operating system, running on a great variety of operating systems.

    15. World known companies such as Google, Cisco, Facebook, Twitter, Linked in etc use Linux as their main operating system.

    Spread Linux OS advantages with your friends

    Speed Up Pen Drive for Faster Transfer Rate

    Many of the PC users facing the slow data transfer issue while transferring the data into flash/pen drives. So here I am going to post simple tweak to increase data transfer rate up to maximum that your flash device supports.



    Speed Up Pen Drive for Faster Transfer Rate
    Speed Up Pen Drive for Faster Transfer Rate_FunWidTricks.Com

    Copyright @ 2013 testing. Designed by Templateism | Love for The Globe Press