Microsoft Office

Tutorials and guide of all courses of Microsoft office suite Including Word, Excel, Powerpoint, Access etc.

Microsoft Word 2007 (Quick Guide)

Microsoft Word 2007 is a word processing software package developed by Microsoft Corporation a family of office suites and productivity software for Windows. You can use it to type letters, reports, and other documents. It gives you the ability to use your computer for desktop publ...

New Master Shortcuts of Windows XP/7/8

Windows 7 adds loads of great shortcuts for switching between apps, moving windows around your screen, moving them to another monitor altogether, and much more. Here's a quick-reference master list of the best new Windows 7 shortcuts.

Alt Code/ Alt Key Codes Table

Welcome to Alt Shortcuts, The Alt Code resource! If you are already familiar with using alt codes, simply select the alt code category you need...

Making USB Bootable Using Command Prompt Easy steps

Making USB(Pendrive) Bootable Easy and Best Technique. See all steps 1-10 steps.

Wednesday, 20 August 2014

Top Ten Most-Destructive Computer Viruses


Created by underground crime syndicates and government agencies, these powerful viruses have done serious damage to computer networks worldwide 


Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem. Now, the hackers have gone professional, and their ambitions have grown; rather than amateurs working out of their parents' basement, malware creators are often part of an underworld criminal gang, or working directly for a foreign government or intelligence agency. As the stakes have grown, so too has the potential damage and destruction brought on by malware 

 1) Stuxnet (2009-2010) The arrival of Stuxnet was like a cartoon villain come to life: it was the first computer virus designed specifically to cause damage in the real, as opposed to virtual, world. While previous malware programs may have caused secondary physical problems, Stuxnet was unique in that it targeted software that controls industrial systems. Specifically, Stuxnet was designed to damage machinery at Iran’s uranium enrichment facility in Natanz. Based on the available information, including data from the International Atomic Energy Agency, experts believe Stuxnet caused a large number of Iran’s centrifuges—essentially giant washing machines used to enrich uranium—to spin out of control and self-destruct. Though Stuxnet was discovered in 2010, it is believed to have first infected computers in Iran in 2009. 

 2) Conficker Virus (2009) In 2009, a new computer worm crawled its way into millions of Windows-based PCs around the world, creating a massive botnet army of remotely controlled computers capable of stealing financial data and other information. Its complexity made it difficult to stop, and the virus prompted the creation of a coalition of experts dedicated to stopping its spread. At its height, the Conficker worm infected millions of computers, leading anti-virus researchers to call it the “super bug,” or “super worm.” But the real mystery of Conficker, which still infects a large number of computers, is that no one knows what it was meant to do: the botnet army was never used for any specific purpose, to the best of anyone’s knowledge. Conficker’s real purpose still confounds security experts. 

 3) agent.btz (2008) This piece of malware’s claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command. Agent.btz spreads through infected thumb drives, installing malware that steals data. When agent.btz was found on Pentagon computers in 2008, officials suspected the work of foreign spies. Former Deputy Secretary of Defense William Lynne later wrote that agent.btz created “a digital beachhead, from which data could be transferred to servers under foreign control.” Though some anti-virus experts have disputed the contention that the virus was the creation of a foreign intelligence agency, its effect was to make cyber war a formal part of U.S. military strategy. 

 4) Zeus (2007) There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today’s cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents. In the age of Internet banking and online shopping, a compromised identity is much more than just a name and social security number: it’s your address, date of birth, mother’s maiden name, and even your secret security questions (your first pet, your favorite teacher, or your best friend from grade school). 

 5) PoisonIvy (2005) PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user’s computer. Malware like PoisonIvy is known as a “remote access trojan,” because it provides full control to the perpetrator through a backdoor. Once the virus is installed, the perpetrator can activate the controls of the targeted computer to record or manipulate its content or even use the computer’s speaker and webcam to record audio and video. Once thought of as a tool for amateur hackers, PoisonIvy has been used in sophisticated attacks against dozens of Western firms, including those involved in defense and chemical industries, according to a white paper written by Symantec, the computer security firm. The attacks were traced back to China. 

 6) MyDoom (2004) MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems. The virus spread through email as what appeared to be a bounced message. When the unsuspecting victim opened the email, the malicious code downloaded itself and then pilfered the new victim’s Outlook address book. From there, it spread to the victim’s friends, family and colleagues. MyDoom spread faster than any worm seen prior. 

 7) Fizzer (2003) By 2003, many worms were spreading over e-mail, but Fizzer was an entirely new creature. If earlier worms, like Code Red (see below), were about mischief, Fizzer was all about money. While some initially dismissed the seriousness of the worm because it wasn’t as fast moving as Code Red, Fizzer was more insidious. “What makes Fizzer stand out is that it's the first instance of a worm created for financial gain,” says Roel Schouwenberg, a senior researcher at Kaspersky, an anti-virus company. “Computers infected with Fizzer started sending out pharmacy spam.” In other words, Fizzer didn’t just take over your address book to spread for the sake of spreading, it used your address book to send out the now familiar porn and pills spam. Fizzer was followed by better-known spam-inducing worms, like SoBig, which became threatening enough that Microsoft even offered a $250,000 bounty for information leading to the arrest of its creator. 

 8) Slammer (2003) In January 2003, the fast-spreading Slammer proved that an Internet worm could disrupt private and public services, a harbinger for future mayhem. Slammer works by releasing a deluge of network packets, units of data transmitted over the Internet, bringing the Internet on many servers to a near screeching halt. Through a classic denial of service attack, Slammer had a quite real effect on key services. Among its list of victims: Bank of America’s ATMs, a 911 emergency response system in Washington State, and perhaps most disturbingly, a nuclear plant in Ohio. 

 9) Code Red (2001) Compared to modern malware, Code Red seems like an almost kinder, gentler version of a threat. But when it swept across computers worldwide in 2001, it caught security experts off guard by exploiting a flaw in Microsoft Internet Information Server. That allowed the worm to deface and take down some websites. Perhaps most memorably, Code Red successfully brought down the whitehouse.gov website and forced other government agencies to temporarily take down their own public websites as well. Though later worms have since overshadowed Code Red, it’s still remembered by anti-virus experts as a turning point for malware because of its rapid spread. 

 10) Love Letter/I LOVE YOU (2000) Back in 2000, millions of people made the mistake of opening an innocent looking email attachment labeled simply, “I Love You.” Instead of revealing the heartfelt confession of a secret admirer, as perhaps readers had hoped, the file unleashed a malicious program that overwrote the users’ image files. Then like an old-fashioned chain letter gone nuclear, the virus e-mailed itself to the first 50 contacts in the user’s Windows address book. While by today’s standards, Love Letter is almost quaint, it did cause wide-scale problems for computer users. It only took hours for Love Letter to become a global pandemic, in part because it played on a fundamental human emotion: the desire to be loved. In that sense, Love Letter could be considered the first socially engineered computer virus.

Source: smithsonian

Thursday, 14 August 2014

The Internet Protocol (IP)

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

IP, as the primary protocol in the Internet layer of the Internet protocol suite, has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information.

Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974; the other being the connection-oriented Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP.

The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the Internet. Its successor is Internet Protocol Version 6 (IPv6).

Function
The Internet Protocol is responsible for addressing hosts and for routing datagrams (packets) from a source host to a destination host across one or more IP networks. For this purpose, the Internet Protocol defines the format of packets and provides an addressing system that has two functions: identifying hosts; and providing a logical location service.

You can Find your Public IP address : Click Here

Friday, 8 August 2014

Top 10 Antivirus Software in 2014 for Your PC

TOP 10 ANTIVIRUS SOFTWARE IN 2014 FOR PC



1. Bitdefender Antivirus Plus

The first one we must refer to is Bitdefender Antivirus Plus which is developed and published by Bitdefender producer. With breakthrough features, this utility can scan the system quickly and remove Virus, Trojan, Worm, Rootkit, Spyware, etc. to protect your online transactions and personal information.

You can use this utility to protect computer components, USB, portable hard drive, etc.

View detailed information and download the latest version of Bitdefender Antivirus


2. Kaspersky Anti-Virus

The second software we cannot forget to talk about is Kaspersky Anti-Virus. This utility can remove Virus and malicious codes which are new on the market. It also automatically prevents unwanted access of professional hackers and more.

View detailed information and download the latest version of Kaspersky AntiVirus



3. Norton AntiVirus

Norton Antivirus once dominated all rankings of best antivirus software before. It is famous for simple and safe features. With the increasingly advanced technology, this software can prevent all attacks of Viruses, Spyware and other threats which affect the speed and efficiency of your computer.



4. F-Secure Anti-Virus

F-Secure Anti-Virus is the software for protecting your computer by detecting and removing Viruses or Spyware without affecting the speed of your computer system. This utility runs mostly based on the cloud computing technology and can prevent newest malicious codes on the market.




5. AVG Anti-Virus

AVG Anti-Virus includes the most excellent tools to protect your computer safely. Like other antivirus software, this utility can remove Viruses, Spyware, Rootkits, Trojan, etc., protect your personal information when surfing the Web, identify dangers on Websites you are accessomg and more.




6. BullGuard Antivirus

BullGuard Antivirus can detect over 65% of Virus types compared to other antivirus software. This utility runs based on the detection technology on the top of page and uses the cloud computing signature. BullGuard Antivirus can scan and detect viruses before they are listed in the virus database. It detects virus based on the profile, registration, process and network activities on your computer.



7. G Data AntiVirus

G Data AntiVirus is the tool for protecting your computer comprehensively. You can use this utility to remove threats to your computer system. This program can remove Virus periodically or whenever you want. You can also use this utility to scan your computer when it is idle in order to protect your computer more effectively.




8. Panda AntiVirus Pro

Panda AntiVirus Pro runs based on TruPrevent technology. It can control the whole data exchange process on the computer or when you surf the Web, when your computer is connected to external storage devices like USB, portable hard drive or mobile phones, and even when you send and receive Email. Hence, threats will be detected instantly before they attack your computer.




9. Avast! Pro Antivirus

Avast! Pro Antivirus focuses mostly on protecting personal computer and computers in enterprises of all sizes. This utility can detect and remove the newest dangers on the market through the Avast CommunityIQ technology. Hence, your computer will be protected absolutely when you surf the Web, access the social network or play Games online.


10. McAfee AntiVirus Plus

McAfee AntiVirus Plus is the comprehensive application for protecting your computer and external devices like USB, portable hard drive, Flash memory card, etc. from Virus, Trojan, Worm, Spyware, Rootkit, dangers from Internet, etc. This utility runs based on the solid firewall which helps protect your computer and remove untrusted connections.






Sunday, 3 August 2014

Kernel (Operating System)


The kernel is a computer program that manages input/output requests from software and translates them into data processing instructions for the central processing unit and other electronic components of a computer. The kernel is a fundamental part of a modern computer's operating system.


When a computer program (in this case called a process) makes requests of the kernel, the request is called a system call. Various kernel designs differ in how they manage system calls (time-sharing) and resources. For example, a monolithic kernel executes all the operating system instructions in the same address space to improve the performance of the system. A microkernel runs most of the operating system's background process in user space, to make the operating system more modular and, therefore, easier to maintain.

For computer programmers, the kernel's interface is a low-level abstraction layer.

Friday, 1 August 2014

Operating System (OS)

 An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers.

Operating SystemExamples of popular modern operating systems include Microsoft Windows, Android, BSD, iOS, Linux, OS X, QNX, Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX.

Common features

  • Process management
  • Interrupts
  • Memory management
  • File system
  • Device drivers
  • Networking (TCP/IP, UDP)
  • Security (Process/Memory protection)
  • I/O