Hidup Ini Pelangi :)
Tuesday, 22 November 2011
my mr.teddy :)
ble ckp psl teddy, i will be smilling all away around. never felt dis way before. hahahaha. hope we gonna stay together forever hunny. n dear, dis is for you :)
You're my Honeybunch, Sugarplum Pumpy-umpy-umpkin, You're my Sweetie Pie You're my Cuppycake, Gumdrop Snoogums-Boogums, You're the Apple of my Eye And I love you so and I want you to know That I'll always be right here And I love to sing sweet songs to you Because you are so dear
Wednesday, 12 October 2011
COMPUTER ETHICS AND SECURITY
today i would like to share some information about computer ethics and security.
somehow of misuse of technology lead us to computer security risk.
some malware, spoofing, packet sniffing, click jacking and denial of service attacks are always ruin up our system computer.
do you aware of this risk that we are going to face when we are using internet?
do you always check or run up antivirus scan for your computer?
today i would like to share some information about malware. malware consists of many types such as:
: computer viruses
- potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without user's permissions
- potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without user's permissions
: worm
- a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
- a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
: trojan horse
- a program that hides within or looks like legitimate program. it does not replicate itself to other computers.
- a program that hides within or looks like legitimate program. it does not replicate itself to other computers.
: rootkit
- a program that hides in a computer and allows someone from a remote location to take full control of the computer.
- a program that hides in a computer and allows someone from a remote location to take full control of the computer.
: backdoors
- a program or set of instruction in a program that allow users to bypass security controls when accessing a program, computer,or network.
- a program or set of instruction in a program that allow users to bypass security controls when accessing a program, computer,or network.
: adware
- a program that displays an online advertisement in a bannner or pop-up window on web pages, e-mail messages, or other internet services.
- a program that displays an online advertisement in a bannner or pop-up window on web pages, e-mail messages, or other internet services.
: spyware
- a program placed on a computer without user's knowledge that secretely collects information about the user.
- a program placed on a computer without user's knowledge that secretely collects information about the user.
: botnets/ zombie army
- a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
- a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
all of this types are ruin down our system. do you know what are the symptoms of malware attacks? these are the symptoms:
- operating system runs much slower than usual.
- available memory is less than expected.
- files becomes corrupted.
- screen displays unusual message or image.
- music or unusual sound plays randomly.
- existing programs and files disappear.
- programs or files do not work properly.
- unknown programs or files mysteriously appear.
- system properties change.
- operating system does not start up.
- operating system shuts down unexpectedly.
do you having some of this symptom?
if you having it, you have to use antivirus program to remove all the malware above.
example of antivirus program are:
so, from now on, you must aware when your operating system shows some of the above symptom. try to use the above antivirus program to delete the malware.
Wednesday, 5 October 2011
science computer make me awesome!!! weee :)
Hye to all, and goodmorning! having the fresh and chill day, i decided to wrote something about science computer. it's some kind of cool subject where we can obtain more n more latest information about our beloved devices and gadjet. we had been used and used our handphone everyday, but do we know how it had been functioning and operating? science computer are there for you to gain information about the technology.
Since when i was a little kid, i love to play the computer, love to check it out how does it functioning, and my parents had to call and pay the technician for many time because of disaster that i had done to my poor computer ^.^
When i entered kmpk, i decided to chose science computer as one of my course. It had been 15 weeks, and i was enjoy it. All of the lecturer was cool and always there to help us. Encik Shakirin and Miss Aunah had been teached me a lot of new things and it was pretty cool because i had been discover a lot of how to use the technology.
In this pspm, i hope i can get an A for science computer. Amin..... =)
Wednesday, 28 September 2011
LOVES ♥
Subscribe to:
Posts (Atom)