This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, October 7, 2016

COMPUTER RADIATION

COMPUTER RADIATION

Do you use computers often? If yes, then the term computer radiation may not be new for you. What may be new for you are the effects that electromagnetic radiation from computers cause to your body. Whether you use a computer for work or leisure, prolonged exposure will lead to serious health risks. What can you do to keep yourself from being at risk?

Different Kinds of Computer Monitor Radiation

Radiation from computer monitor is the big umbrella that covers different kinds of electromagnetic frequencies. It means that when you face the computer you absorb both VLF (Very Low Frequency) electromagnetic radiation, ELF (Extremely Low Frequency) electromagnetic radiation, and soft x-rays if you use an old style Cathode Ray Tube monitor.

Effects of Computer Radiation

Nowadays, people work longer hours in front of the computer. This extended susceptibility to radiation could lead to biological effects such as eye strain, stress, insomnia and fatigue.
However, the center of concerns about computer radiation effects is directed towards pregnancy results. Several studies have explored the definitive effects of electromagnetic radiation to pregnant women such as cancer in reproductive system. The conclusive statement from the experts say that health risks from electromagnetic field exposure are still being studied and currently there are no specific data to suggest exact grave health defects.

Eliminate Computer Radiation

1) Consider the location of your computer. When you use a computer, EMF is radiated in all directions and the back of the computer gives off the second strongest radiation. Make sure that the back part is not exposed to many people. 
2) Consider your eyes.  Since the eyes are the most strained part when in computer use, make sure to have a distance as far as 80 cm away from the computer screen. 
3) Make sure to have the radiation filter plate. This can help block the electromagnetic radiation that radiates from your computer.
4) Put your computer in a well-ventilated area. Since computers are also recognized to give off carcinogenic substances, one way to moderate this is to put it in a significantly cooler area.
5) Take your vitamins. Make sure to have your healthy share of food rich in vitamins such as A and C. Healthy food can help your immune system to be stronger which protects you from the harmful effects of computer radiation.

Malware and Viruses




Tokeo la picha la Malware and Viruses

What is Malware?

Malware is short for malicious software.

Malware is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission.

Basically malware is software that you really don't want to have on your computer!

People can end up with malware installed on their computer system in a variety of ways:
  • Installing software that seems ok, but has malware hidden inside (know as a 'Trojan Horse').
  • Having their computer hacked, and the software installed by the hacker.
  • Visiting dodgy websites and clicking on infected links
  • The computer being infected by a computer virus

Stacks Image 4292
Some examples of malware:
  • Spyware (spys on you)
  • Adware (pops up adverts all the time)
  • Root kits (allows a hacker full access to your computer)
Ironically, one of the most infamous bits of spyware around is called Antivirus XP 2008/9.

This software is advertised as a genuine anti-virus product (for free too!), but if you install it, you've actually installed some malware. (Read more here)

The software will 'scan' your computer, then tell you that your computer is infected. You'll then be bullied with endless pop-ups into paying a fee to have your computer 'disinfected'.

In fact the only infection you really have is the fake anti-virus!

It is estimated that the creators of this malware have made millions of dollars from innocent, gullible computer users.

It's best to assume that if software is given away for free, there is probably something dodgy about it - Use Google to check any software out before downloading and installing

So, What is a Computer Virus?

A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without the users knowledge or permission.

Most computer viruses come with some kind of 'payload' - the malware that does something to your computer.

For example, the virus might install some spyware (software that watches what you do with your computer), it might search your computer for credit card information, or it might install software that gives someone remote control of your computer (turning it into a 'zombie').

How Can a Computer Be Protected from Viruses?

There are some simple things you can do to help prevent a virus infecting your computer:
  • Install anti-virus software and keep it up-to-date (this is the most important thing you can do!)
  • Install anti-malware software (stops software installing without your knowledge)
  • Never download and install software from the Internet unless you are certain it is from a source you can trust
  • Don’t open e-mail attachments unless you have scanned them (even a file that seems to be a picture can contain a virus)
  • Don’t click links in websites that seem suspicious (if a site is offering prizes / free stuff / etc. be suspicious!)
  • If someone gives you a memory stick or CD-ROM, run a virus scan on it before opening any files.
  • Don’t trust cracked versions of software from file-sharing sites (often these have viruses and other malware added to them - a Trojan horse)
Stacks Image 4322

Hacking and Hackers

What is Hacking?

The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to mean breaking in to a computer system.
Stacks Image 4248

Why Do Hackers Hack?

A hacker may break into a system just out of curiosity or for the challenge - can they get through the system’s defences? But, it is more likely that they are breaking in to access data, usually because the data has value.

For example, if a hacker enters your computer and steals financial information such as your credit card number, or the password to your bank account, they could use that information to make purchases.
If a lot of information about you is stolen, a hacker could use this to impersonate you on-line.

They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name.

This is known as identity theft.

Can a Computer be Protected from Hacking?

Just as in the real world, there is no guaranteed way to stop someone breaking into a building (you can make it very difficult, but every security system has its weaknesses), there is also no guaranteed way to stop someone breaking into a computer system.

However, you can make it difficult enough so that a hacker moves on and looks for an easier target.

You should:
  • Use strong passwords to protect your user login account
  • Never reveal your login password to anyone else
  • Place a firewall between your computer and any network
  • Disconnect from networks when you are not using them
  • Encrypt any sensitive information (just in case they get in)
Stacks Image 4275

Health Effects of ICT

If we use a computer for many hours (as people often do at work), there are some health issues that might affect us...

Eye-Strain

One health issue that can occur after using computers for a long time is eye-strain (tiredness of the eyes).

This is caused by looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move, and so get tired and painful. Eye-strain can also cause headaches.

This problem can be solved:
  • Look away from the monitor at regular intervals – re-focus on distant or close objects to exercise the muscles in the eye.
  • Take regular breaks.
  • Use an anti-glare filter in front of the monitor to cut down on screen reflections that can also tire the eyes.
Stacks Image 4084

Back and Neck Ache

Many people suffer from back and neck pain after working at a computer for a long time. This is usually due to them having a bad sitting posture.

This problem can be solved:
  • Use an adjustable, ergonomic chair, and take the time to set it up properly.
  • The computer keyboard and monitor should be at the correct height for the seated person (keyboard lower than the elbow, top of monitor at eye level).
  • Take regular breaks: get up, walk around, stretch your muscles
Stacks Image 4101
Bad Posture
Stacks Image 4108
Good Posture
Stacks Image 4115
The science of how we interact with the objects around us is called ergonomics.

An ergonomic chair is one that fits the body well, giving support to areas such as the lower back (lumbar region)

Repetitive Strain Injury (RSI) in Wrists and Hands

Any repetitive movement (same movement over and over again) can result in a health problem called repetitive strain injury (RSI).

In particular, typing and using a mouse for long periods are common causes of RSI in the wrist (it is often called carpal-tunnel syndrome).
This problem can be solved:
  • Use a wrist-rest to support the wrists while typing and when using the mouse.
  • Take regular breaks from typing or using the mouse.
Stacks Image 4138 
 
You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents...
Trailing Cables
Computer equipment is often connected to lots of cables: power, network, etc.

If these cables are laying on the floor, they can cause people to trip over them

Solution: Place cables inside cable ducts, or under the carpet / flooring
Stacks Image 4173
Spilt Drinks
or Food
If any liquids are spilt on electrical equipment, such a s a computer, it can result in damage to the equipment, or an electric shock to the user.

Solution: Keep drinks and food away from computers
Stacks Image 4192
Overloaded
Power Sockets
Plugging too many power cables into a socket can result in the socket being overloaded, overheating, and a fire starting.

Solution: Never plug too many cables into a socket. Always make sure there are fire extinguishers nearby
Stacks Image 4211
Heavy Objects
Falling
Many items of computer equipment are very heavy: CRT monitors, laser printers, etc. Heavy items can cause serious injury if they fall on people.

Solution: Make sure equipment is placed on strong tables / shelves
Stacks Image 4230

m

Health and Safety

Possible dangers and solutions

Within information technology it is important that people have an awareness of the various health and safety issues. Steps should also be taken towards preventing common problems rather than trying to cure them at a later date.

Back problems

Many computer users suffer serious back problems. This is probably due to a poor posture or an awkward position while sitting at a computer.

Solutions

  • A fully adjustable chair should avoid poor posture.
  • Footrests can reduce these problems.
  • Screens should tilt and turn to a position that avoids awkward movements.
user sat on adjustable chair, at an adjustable desk with foot rest and adjustable monitor

Eyestrain

Eyes can become strained after staring at a computer screen for a long time, particularly if working in bad light, in glare or with a flickering screen.

Solutions

  • Screen filters can remove a high percentage of the harmful rays emitted from a computer screen.
  • Use screens that do not flicker.
  • Take regular breaks - do not work for more than one hour without a break.
  • Lighting must be suitable and blinds fitted to windows to reduce glare.

Repetitive Strain Injury (RSI)

silver and black keyboard with two hands typing
Repetitive Strain Injury (RSI) is damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time.

Solution

  • To prevent RSI, make sure your posture is correct, use wrist rests and have a five-minute break from typing every hour.

Ozone irritation

Health experts have suggested that ozone emitted from laser printers can lead to breathing problems.

Solution

  • It is recommended that laser printers should be situated at least one metre away from where people are sitting and there should be good ventilation in the area.

5 health issues, every over 40 computer user should be aware of!

By the time you are 40 years of age, your body has undergone and is undergoing fair amount of wear and tear. So, it makes you that much more vulnerable to any occupational hazard. If you have a career in computers, you might want to know what possible problems could crop up and what you could do to prevent their occurrence.
Here are five of the most common problems, which a PC user may face:
1) Eye Strain
Cause: Staring at the monitor glare  and  the writing on it continuously for hours , day in day out, puts a strain on the eyes. The eye lens and the eye muscles stay locked in the same position for a long time and thereby, get strained. They subsequently weaken and are unable to perform the contraction and relaxation to the required extent, which is  needed to adjust the eye lens in order to view an object at a close distance or faraway. Vision thus, gets impaired.
Symptoms: Headache, pain in the eyes, watering of the eyes.
Remedy: Glasses.
Prevention:
  • Keep monitor at a distance of two feet
  • Take frequent breaks and focus at an object far away. This will release the eye lens and muscles from their locked positions, and prevent strain.
  • Keep cotton soaked in raw (unboiled) milk over the eyes before going to bed at night. Squeeze them a bit to prevent dripping. Let them be overnight. Do this atleast once a week
  • Rub your palms till they feel warm and place them over the eyes till the warmth is felt over the eyes. Rotate eyes gradually clockwise  a couple of times and then similarly anticlockwise. Repeat 2 to 3 times a day. This will exercise the eye muscles and strengthen them.
  • Take Vitamins A and C regularly through natural sources like fruits and vegetables, meat and fish.
  • Use protective tinted eye glasses to protect your eyes from the monitor glare
  • Force yourself to relax your eyes using Eyes Relax.
2) Cervical Spondylosis and Lumbar Spondylosis
Cause: Although you might be aware that proper posture is important, you tend to forget this when you are sitting in front of the computer for hours, everyday. You do not hold your neck in that neutral position and you do not sit upright, as a result of which, you tend to shift into a more comfortable position of slouching or leaning back. The muscles of the neck and back then are held in this unwanted position, over long periods, everyday. They get strained and subsequently weaken over time. As a result, they are not able to perform their function of holding the vertebrae (bones of the vertebral column) upright as they should. A particular vertebra slips and the space between the two adjacent vertebrae is reduced. There is pressure on the inter-vertebral disc which is present between two vertebrae. It starts getting eroded over time and the nerves coming out through the inter-vertebral space get pressed by the vertebra which has slipped. Symptoms appear and this can be crippling if not managed on time.
Symptoms: Cervical Spondylosis –  Pain in neck and shoulder/s, Headache, Tingling and numbness in one or both hands, Stiffness of neck and shoulder muscles. Lumbar Spondylosis –  Low Back pain, Tingling and Numbness in one or both the Lower Limbs, inability to bend and stand or sit for a long time due to pain. In advanced stages, there is sharp shooting pin in the lower limb/s.
Remedy: Your Physician may advise you rest till the pain disappears. This could be followed by a lifelong regimen of neck or back strengthening. Proper posture will become mandatory and he may advise you to wear the lumbo sacral belt while sitting at your work station to prevent you from slipping into that improper posture. In advanced cases, traction becomes necessary and a cervical collar or a lumbo sacral belt (as the case maybe) has to be worn at all times. In severe cases, surgical intervention becomes necessary. See how to sit in front of computer.

Prevention:
Keep monitor at eye level, Maintain a proper posture of the neck and the back, exercise daily, specially  to keep the back and neck muscles strong. Yoga exercises will be very helpful.

computer virus

Tokeo la picha la computer virus

  

A computer virus is a small software program that can spread from one computer system to another and cause interferences with computer operations. A computer virus has the capacity to corrupt or to delete data on your computer and it can use an e-mail program to spread the virus to other email addresses in your online address book. In the worst case scenario, it can even delete everything on your hard disk.

Forms of Computer Viruses

In the same way as viruses harm peoples' bodies, computer viruses can do considerable damage to computer systems. Viruses are infections. Computer infections can come in several forms and your computer can "catch" one in several ways:
  • An email virus is one type of computer virus. An email virus can travel through attachments in email messages and can automatically replicate itself by mailing itself to dozens or even hundreds of people on your list of contacts found in your online address book. There are email viruses that can launch themselves into your computer while you are simply viewing the messasge. You don’t even need to double-click the message in order for the message to install itself.
  • A Trojan horse is not a virus. It is a computer program that claims to be a game but, in actuality, will just do damage once you run it. It may even erase your hard disk. It cannot automatically replicate itself.
  • A worm is a type of software called mallware that uses security holes and computer networks in order to replicate itself. The worm will scan the network for machines which carry a particular security hole. It will then copy itself to the machine through the security hole and will start replicating itself.
Viruses in general, start working and spreading once you start using the application or program to which the virus is attached. For instance, a program that has a virus in it will place the virus in the system’s memory each time that program is run.
Once the virus is in the memory, one of several things can happen. First, it can be programmed to attach itself to other programs and applications, folders, or disks. Second, if given the chance, it can infect a network.

How Computer Viruses Are Activated

Computer viruses are easily spread through the use of attachments in various email messages or via messages from instant messaging; so, you must never open unexpected email attachments unless you know and trust whoever sent the message.
Be very careful as computer viruses can be easily disguised as ordinary-looking attachments or even as attractive images, funny graphics, cards, video, and audio files. Computer viruses can also spread through downloads you do while online. They can be hidden in software, especially in pirated items, or in other programs and files which you are downloading.

How Computer Viruses Operate

Viruses operate in a multitude of ways. Some will stay active only when the application to which it is attached is running. Others will be inactive once the computer is turned off, while some will run every time you turn your computer on after it has infected the network or system files.
There are some indicators that will tell you that your computer is infected:
  • Your computer is running slower than normal
  • Computer applications are not working right
  • Disk drivers and disks have become inaccessible
  • You cannot print
  • You find unusual, error messages
  • Dialog boxes and menus are distorted
  • You find double extensions on attachments which you’ve recently opened (ex. gif, jpg, vbs)
  • Your antivirus program is suddenly disabled or cannot be restarted
  • Antivirus programs cannot be installed in your computer or cannot run
  • New and unusual icons suddenly appear on your desktop
  • Strange music or sounds suddenly play from the speakers
  • A program you typically use suddenly disappears from your computer without you purposely removing it
To safeguard your files and to protect your computer, take time to understand computer viruses and what you should avoid doing to save your system from the virus. Be sure to always turn on the firewall, keep your computer’s operating system updated, update your antivirus software, and use updated antispyware programs

Read more at http://www.yourdictionary.com/computer-virus#Fd0uOqOb57dUeigc.99

Computer Virus Information


What is a computer virus?

Tokeo la picha la computer virus

Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day.

How does a computer virus find me?

Even if you’re careful you can pick up computer viruses through normal Web activities like:
  • Sharing music, files or photos with other users
  • Visiting an infected Web site
  • Opening spam email or an email attachment
  • Downloading free games, toolbars, media players and other system utilities
  • Installing mainstream software applications without fully reading license agreements

What does a computer virus do?

Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.

What are the symptoms of a computer virus?

Your computer may be infected if you recognize any of these malware symptoms:
  • Slow computer performance
  • Erratic computer behavior
  • Unexplained data loss
  • Frequent computer crashes

Computer Virus Help: Arming yourself with the best computer virus protection?

Tokeo la picha la computer virus

When you arm yourself with information and resources, you’re wiser about computer security threats and less vulnerable to threat tactics. Take these steps to safeguard your PC with the best computer virus protection:

Make sure that you have the best security software products installed on your computer:

  • Use antivirus protection and a firewall
  • Get antispyware software
  • Always keep your antivirus protection and antispyware software up-to-date
  • Update your operating system regularly
  • Increase your browser security settings
  • Avoid questionable Web sites
  • Only download software from sites you trust. Carefully evaluate free software and file-sharing applications before downloading them.

Practice safe email protocol:

  • Don't open messages from unknown senders
  • Immediately delete messages you suspect to be spam
An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in and out of your computer and hide your PC from online scammers looking for easy targets. Products like Webroot Internet Security Essentials and Webroot AntiVirus with Spy Sweeper provide complete protection from the two most dangerous threats on the Internet – spyware and computer viruses. They thwart threats before they can enter your PC, stand guard at every possible entrance of your computer and fend off any computer virus that tries to enter, even the most damaging and devious strains.
While free antivirus downloads are available, they just can't offer the computer virus help you need keep up with the continuous onslaught of new strains. Previously undetected forms of can often do the most damage, so it’s critical to have up-to-the-minute, guaranteed antivirus protection.
Tokeo la picha la computer virus

virus

Tokeo la picha la computer virus
In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.
Generally, there are three main classes of viruses:
Tokeo la picha la computer virus

File infectors. Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk. (Allow several days for recovery.) This is why you should make sure you have a bootable floppy.
Macro viruses. These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.

How to Print Screen on a Laptop Using the Fn Key


Some laptops require you to press the The Print Screen key allows you to take a snapshot of everything displayed on your laptop’s screen. You can use this feature to save screen information as an image or create images for business documents, websites or presentations. Some laptops require you to press and hold the Function (Fn) key in order to use the Print Screen key to save the screen capture. Once you’ve taken the screen capture, you can paste it into a graphic program, such as Microsoft Paint, to convert it into an image.
Step 1Navigate to the screen you want to capture on your laptop.
Step 2Press and hold the “Fn” key, then press the “PrtScn” key to take a screen capture.
Step 3Click the Start button and type “Paint” in the search box.
Step 4Select “Paint” from the search results to launch Microsoft Paint.
Step 5Press "Ctrl-V.” This will paste a copy of your screen capture in Paint.
Step 6Edit the image as needed and then save the screen capture as an image file on your laptop.