Computer

Explaining “Cookies” (the non caloric ones that reside in your computer!)

You can’t talk about all those nasty ‘things’ that can ‘attack’ your computer while you are surfing the Internet, like viruses or spyware, without talking about ‘Cookies’. But what are they and are they really bad for my computer?

Ok, first let’s define the term, and then we’ll explain the good and the bad about it.

Cookie(s):

A small data (text and numbers) file (piece of information) created by a Web server (large computer that stores web sites) that is stored on your computer either temporarily for that session only (the time that you spend on a web site) or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site that you visit and go back to visit again, to identify users and keep track of their preferences. Amazon and Barnes and Noble online … Read More

The computer forensics market is expected to experience an upsurge on account of the increase in sophisticated digital crime and terrorist attacks and economic growth in developing countries. Computer forensics which refers to analysis and reporting of digital data for a legal purpose is the most prominent market within the overall digital forensic market. Computer forensics have become much dynamic in the field of cyber-crime, to perform a structured investigation, in order to detect hidden facts for accurate investigation results. A variety of techniques are used by investigators to inspect and search hidden, encrypted or deleted files or folders.

Computer forensics have gained wide-popularity in developed regions such as North America and Europe owing to technological advancements and increased cyber-crime rates. While, rise in corporate fraud has increased the demand for computer forensics. The UK and other European countries such as Italy and Germany, have observed an increasing trend for … Read More

In the Linux operating system(which is free), the super user(root) has raw access to disks and partitions on the disks in the machine. The general idea is to write random data generated by the Linux operating system, to the hard disk.

The situation often arises where an individual needs to throw away an old computer, but does not want the data on the disk of the old computer to be accessible if someone retrieves it via dumpster diving. There might still be data stored in the motherboard or some of the peripherals, but that is beyond the scope of this article. Ideally, the disk platters should be physically destroyed, but due to hardware or cost constraints, this might not always be possible.

A free way to wipe the data on the disk involves using a bootable Linux disk to write random data to the disk multiple times. Here is the … Read More

The worldwide market for technical-level computer training is nearly $30 billion strong, and this figure includes not only IT department training but large numbers of general staff members who take extensive computer classes as well.

The reason for computer training being such “big business” is no secret: almost any employer in any industry will tell you that the most important skills they are looking for in today’s economy are technology skills. And computer skills, in one way or another, touch upon almost all aspects of modern technology.

The Benefits of Cutting-edge Computer Training

Most people today are at least “computer literate,” and most high schools/colleges offer at least a few basic computer classes. The fact is, however, that the kinds of technical skills often needed in a business situation simply weren’t part of the curriculum in most people’s college majors.

This means additional training will be needed for those … Read More

I’ve always loved video games, ever since I first played them on a friend’s computer in the afternoon after elementary school. There’s something almost magical about the fact that we can move images around and interact with virtual worlds, a living fantasy presented for us to interact with however we please. I’ve also always wanted to make games myself but, until recently, didn’t have the technical knowledge to do so. Now, I’m a second year software engineering student, so if I weren’t able to code a game without too many dramas there’d be something drastically wrong. But what about the common person: the person for whom the term ‘memory leak’ conjures up images of their grandfather, ‘pipeline’ is where the water flows, and ‘blitting’ is unheard of? Well, everyone can get in on the game creation process, and you don’t even need to learn ‘real’ programming to do so.

So … Read More

These days, many devices are “converging”. There is nothing new about it. Everyone will tell you that in a few years time, you will be able to buy a mobile phone that is also an FM radio, digital camera, PDA, MP3 player, universal remote control, USB drive, clock, have untold wireless connectivity protocols, and computer (with web browser, email & other general computer abilities).

Many experts would hesitate to include the “computer” in the above list. They mention many technical difficulties, such as: screen resolution, keyboard, pointing device (mouse), processor speed, heat dissipation & battery life.

I argue that Similar arguments can be made about laptop/notebook PCs. Take a look at many offices today, & you will see many laptops being used as a normal desktop computer. People will connect external mice, keyboards & monitors & then you hardly notice you are using a laptop.

Now, you are also seeing … Read More

Computer Forensics, or Digital Forensics to give it another name, is something that in today’s fast moving environment has become as much part of policing as walking the beat or patrolling or the mobile unit.

As technology progresses and it does so extremely quickly these days, so to do the ways in which technology is applied to crime and its uses by the criminal. Whereas in the past when crime was much more straightforward and involved a physical presence, Computer Crime requires, in some instances, nothing more than a computer, access to the internet, and the personal information of an unwitting individual.

As this type of computer criminal becomes more and more common so too does the need for experts in the field of Computer Forensics Analysis. However in the United Kingdom at the present time there is a shortage of trained professionals in this field which leaves the computer … Read More

Computers are very similar to people in that they have a finite lifespan and like us, there are a number of afflictions that can cause a computer’s digital existence to cease. Most of these problems stem from careless handling, neglect, unhealthy environments and old age, leaving the average computer system’s longevity no more than ten years.

However, careless handling, maintenance and badly trained users can shorten a computer’s lifespan just as a careless lifestyle can cut shorten ours. Here is a list of the ten most common causes of catastrophic computer failure.

10. User errors – From not powering down properly to skipping scan disks, a user can seriously damage a computer’s hardware, particularly drives and processors by not following correct guidance in using their machine.

9. Faulty manufacture – years ago there were only a handful of companies producing PCs now it seems there are an almost infinite number … Read More

People store valuable information onto their computers in all sorts of formats such as documents, pictures, sound, and video. What if someone were able to sneak onto your computer with or without you being there and steal that information? Well, hackers, phreakers, crackers, and even the most novice of computer criminals are able to log into your personal life and cause a world of painstaking trouble. This article will provide the general user with principles aimed at developing safe computer habits to prevent such criminals from even having the opportunity to illegally access information. Let’s start with the first principle, a golden rule for safety on the internet.

If it sounds too good to be true – IT IS! E-mail scams happen every day to millions of computer users. An e-mail that comes from an African Prince leaving his fortune in your trust is not likely to be the true … Read More

Does your computer lag or does it seem to have any unusual behavior, if it does chances are your computer is infected with a virus. To help you with solutions to computer viruses I have answered some questions people ask me about getting rid of viruses.

1.)Whats is a computer virus?

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files, this is why most viruses come from downloading movies, music, illegal programs and most of all from pornographic material.… Read More