iklan

add

Your Ad Here

Hello Friends ..

I'am Newbie.... But I Will Work Hard.

Tuesday, August 28, 2007

Google Optimization in the SEO Process

Google Optimization in the SEO Process


Google optimization is one of the most critical factors for search engine optmisation campaign. Google is above all the search engines. Google is based on the key factors as the Google page rank, the renowned Google sand box and inbound links.

Google optimization depends on the three key factors, Google page rank, Google sand box and the inbound links. In the process of optimizing a website you should always see the inbound links pointing to your website domain and pages. Google makes all the difference with the quality of one way inbound links. So you should concentrate on getting quality inbound links for your website. This can be done by article writing, buying links and link exchanges. With the quality inbound links your page rank will increase by itself.

The effect of Google sandbox is on the new domain names and holds them in a filter. Generally all domain names are not held in the filter. Normally by using competitive keywords, adding relevant content and linking external sites to yours can get you out of the Google sand box. One needs to keep patience in such a situation and keep on working according to Google guidelines.

There are certain guidelines for Google optimization.

• Always defining a clear navigation structure for the website. Every page should be reachable from at least one static text link.
• Create a sitemap to your users with links that point to all parts of your site. Create a useful, information-rich site with pages that clearly and accurately describe the content about your services.
• Add the words in the content users would type to find the pages.
• Always try to use alt text instead of images to display important keywords, contents or links.
• Make sure that your title and alt tags are relevant, descriptive and accurate.
• Keep the links on your pages to less than 100. Get other relevant sites link to yours. Manually submit your site to directories and search engines.
• Submit your site to Google. http://www.google.com/addurl.html.
• Submit an xml site map file at Google webmaster tools. Google uses sitemap file to learn about the structure and coverage of your site.
• Submit your site to relevant directories such as open directory project and yahoo directory as well as to other industry specific expert sites.
• Upload the robot.txt file on your web browser. This file tells crawlers which directories can or can not be crawled.
• Use robot.txt to prevent crawling of search result pages or other auto generated pages that don’t add much value for users coming from search engines.
• Make pages for users, not for search engines.
• Avoid “doorway” pages with little or no original content.

Some of the don’ts for Google optimization are.

• Don't deceive your users or present different content to search engines than you display to users, which is commonly referred to as "cloaking."
• Don't link to web spammers or "bad neighborhoods" on the web, as your own ranking and PR may be affected adversely by those links.
• Never participate in link schemes designed to increase your site's ranking or Page Rank.
• Don't use hidden text or hidden links on your site.
• Don't employ cloaking or sneaky redirects.
• Never send automated queries to Google.
• Don't create multiple pages, sub domains, or domains with substantially duplicate content. This may get your site black listed in Google.
• Don't create pages that install viruses or Trojans.
• Do not use unethical tricks to improve search engine rankings
• Don not see any broken links and see site html is correct.
• Try not to use “?” character in dynamic pages.
• Do not use JavaScript, cookies, session IDs, frames, DHTML, or Flash as search engine spiders. This may search engine spiders create trouble crawling your web site.

Personal Web Hosting Information

Personal Web Hosting Information

Personal web hosting is the best way to express yourself on the web. Personal web hosting is a great way to create a web site and keep in touch with friends and family from all over the world. Personal web hosting is the best solution for your personal site and those who want to build a web site for the very first time.

Web

Web design is an art of inserting plainness, consistency, professionalism, clear visibility, a steady flow, and most significantly, relevance into a website. Web designing can be very challenging, as the web designer is solely responsible or creating the first impression of a visitor logged on to a website. Website hosting can be described as a place to display your website pages so that the rest of the world can view them. Web hosting, one of the most important functions in the website process, allows website owners to put up their creative masterpieces.

Personal

Personal web hosting gives you the liberty to work at your own pace and manage your web site your way. Personal Web Hosting Features The service is designed with flexibility in mind. Personal web hosting is one of the easiest ways to get your personal web site online, providing you with your own personal domain name, personal full featured web hosting account, many email accounts. However, whether you are an Internet pro or a novice, there are some different things that personal web hosting can provide to help.

Internet

Internet web site hosting is in great demand more than ever. Internet connectivity has already changed the way people access information. Internet service providers face mounting pressure to keep their networks free of pests--not only for the benefit of their customers, but also for the good of the Internet in general. So often people graduate from school or move away for a new job and lose touch, but with the internet that doesn't have to be the case. No matter where you or your friends are in the world, if there's an internet connection available, then you can stay connected from thousands of miles away.

Services

Web host provider are of many different types providing services on different platforms like a web site host provider who provides hosting on Unix platform is known. Web Hosting, website design and domain name registration services Offers do-it-yourself and web design, hosting, ecommerce, domain name, marketing, and email. There are even sites that compare providers based on user reviews, and even feature a point-by-point comparison of each of the services provided by different web hosting providers. Of course for premium services, you have to be willing to pay a premium price. The good news is that web hosting plans are very affordable; even the best web hosting services are not that prohibitive in price.

Company

Company that provides the web servers to host your website is called web hosting providers. There are many different web hosting companies available with a range of different offers and features making it difficult to decide which web hosting company you should use. Picking a good web hosting company is important to keeping your website open and your costs down. How To Select A Web Hosting Company When starting out, it is easy to overlook some of the most important factors when selecting a web host while paying too much attention on great features which you may not need at the start.

Cheap personal web hosting is not a difficult thing to find because there are so many hosting companies that offer services with low price, since the files of a personal website is rather small. Whichever plan you may wish to purchase or get, personal web hosting is available for all your needs and requirements.

Disadvantages of Having Affordable Web Site Hosting Service

Disadvantages of Having Affordable Web Site Hosting Service


1. Technical and customer support is not available with most web site hosting services that offer cheap or low costs. But there are some who are able to find a handful of affordable web hosts that do have 24-hour technical support. What you actually need to do is continue to find those types of web host providers.

2. Getting a cheap website hosting service can mean having to put up with streamers and advertisements that could be very irritating but unfortunately unavoidable. This could affect the efficiency of your product endorsements.

This could come as an inconvenience for those who are using the web site for business. What those ads do is lead your readers from focusing on your product and other promotions. This increases the risk of your readers to give more interest to products and promotions other than your own, therefore making your efforts futile. Web host providers mainly make their web site services affordable so that they can get more money.

3. Low-cost web hosting services usually do not offer sufficient amounts of disk space and enough bandwidth. This means that they may be unable to support an existing website you might want to diversify. For instance, you might want to add larger files for more graphics, videos and audio files. These additions are just not possible with low disk space and could be a real hindrance.

4. Down time is also a constant problem if you are paying a low-cost web host provider for your web site. Although this is so, constant down time is not the case with all web site host providers. There are affordable web hosting providers that do care about what their clients want or might ask about. You can also take into consideration that a server that has connections that often go down has the predisposition to lose clients.

5. Affordable web hosting services may not offer the best internet connection speed. This can influence how many visits your web site will have. People especially do not want their time wasted waiting for your web site to load. When your server is not fast enough and files take forever to download, people start avoiding your web site and money will be lost on your end.

6. Security is always at risk among cheap web hosting services. Security support system is not that sophisticated and is quite loose which can result to easy hacking of your web site. The web host provider might not have back-up services; hence, you will have a hard time (or worst, not having at all) accessing the root menu.

7. Cheap web host providers are the ones that likely go bankrupt in the web hosting business. This will result to the shutting down of web sites - and this means, loss of business for your part. Moreover, transferring to another web host entails a lot of inconvenience for yourself as well as for your clients.

Saturday, August 25, 2007

4 Basic Steps To Protect Your Computer Against Internet Intruders

4 Basic Steps To Protect Your Computer Against Internet Intruders
It never ceases to amaze me how many people connect to the Internet with no protection on the PC at all! This is a very dangerous activity and has led to financial ruin for some people.
I have had family members and friends who ask me to check out their PC's because they are 'slow' or they can't stop these damn popup windows from coming up. These are the first signs of infection or security breaches on your PC.
It takes 4 simple steps and it costs you nothing at all except a bit of time and effort.
Step 1 - Get a firewall installed.
Firewalls help to protect you from Internet attacks and intrusion from hackers on the Internet who go 'sniffing' for unprotected computers.
What do they do when they hack your computer? Well they look for password files, security breaches that allow them to use YOUR computer for malicious attacks on other computers on the Internet.
There was a story not long ago about the Russian Mafia hacking into a household computer and using it to transfer funds from unsuspecting bank accounts for their own illegal purposes. When the Feds tracked down the responsible computer, it belonged to some unsuspecting person who had no idea of what was happening. So be warned!!
Microsoft Windows XP has a built in firewall so you could enable that and it gives you some basic protection.
If you don't want to use that firewall then try a free firewall called zone alarm from http://www.zonelabs.com
Zone alarm is a great firewall and even better for the price - they have a free version for home and non-commercial use.
Step 2 - Get an anti virus product installed
Anti virus software scans your computer for malicious code that can cause all sorts of problems on your computer and even delete files and make your computer inoperable.
You can get a very good free virus scanning software called AVG virus scanner from http://www.grisoft.com/
Step 3 - Get a reliable anti-spyware software
Spyware tends to sit on your computer and 'spy' on what you are doing. It can do things like look at web sites you have visited, record your key strokes (looking for account numbers and passwords) and it can then sends this information back to its originator.
A great and well know spyware scanner is called Spybot-S&D from http://www.safer-networking.org/The other great spyware utilities are adaware from lavasoft, and Microsoft have one as well.
My advice would be to run two or three spyware utilities, particularly if you do a lot of online transactions with your computer.
Step 4 - Keep your Microsoft (MS) Windows Operating System (OS) updated
Microsoft come out with security patches on a regular bases to close up security 'holes' that have been identified. These patches can be applied manually by you or you can have MS Windows download and install them automatically.
To check out what updates you require -
1. Go to the Microsoft Windows Update page here - http://windowsupdate.microsoft.com/
2. Scan your computer to find out what critical updates and security patches are not installed.
3. Select the updates to install paying particular attention to CRITICAL Updates.
You may need to restart your computer after the patches have been applied
As a final word on the 4 steps, it is critical that you keep all of the programs up to date. So check back with the vendors on a regular basis (at least weekly) to see if updates are available. The better programs (like Spybot) will have options in them to check for updates.
The above list of programs is not the ultimate list. Like any programs there are dozens of choices. The ones above are those that I have had first hand experience of.
I personally use commercial programs because I spend so much time connected to the Internet, my family surfs quite regularly and I am a big fan of online transactions. Even the commercial programs only cost pennies compared to what can happen if you do get an infection.

Keeping Your Kids Safe Online At Home

Keeping Your Kids Safe Online At Home
With the internet becoming readily available to people from all ages, child safety is becoming a rising concern for parents. While this isn't a threat in a secure, controlled environment like the internet access children get at school, it becomes more important at home where your children have free access to a computer.
Like in real life, you can't always be there to protect your kids; you have to teach them to be able to look out for themselves and stay safe. Here are a few tips you can take to educate your children in proper internet useage:
Parental Controls - like cable TVs and dvd players, computers have parental filters that you can set to filter out programs that you don't want your kids to access. You can also use the parental control to monitor your child's internet activities.
Explain to your child that most of the rules that apply to real life also apply to internet security. The safety basics are especially important. At the top of the list though, is NOT giving personal information out to strangers, particularly address and phone number, as this is all too easy to do online.
Make sure that your child realizes that not all information on the internet is true. There is as much misinformation and bogus scams online as there are in the physical world. While the internet is a valuable source of information and is already an established tool for modern research and education, children should be taught to approach you or their school teachers to confirm the validity of information that they acquire online.
Instruct your children in proper netiquette. Just because a person can't see them face to face, they shouldn't disregard the rules of good social behavior. Remaining polite and avoiding harsh language should be drilled into them, as people tend towards verbal abuse online because contact is anonymous. Conversely, you should also encourage your children to come to you if they are on the receiving end of such verbal abuse online.
While children will be able to meet other people through online chat rooms and online games, you should insist that they DO NOT meet those other people in person. If they insist on doing so, make sure that you chaperone them to ensure your child's safety.
Lastly, it's a sad fact that our children these days learn so fast that they usually wind up knowing more about the internet than we do. Don't sweat it. You can actually use this as a bonding opportunity with your child, asking your little boy or girl to help you learn more about the internet. Aside from the bonding, this also gives your child more self confidence.

Should You Have a Firewall?

Should You Have a Firewall?
The internet is littered with evil intentions and malicious - albeit smart and brilliant – plotters. They are constantly in the prowl for innocent, unprotected computers. Internet hackers use all sorts of codes such as viruses, worms, and Trojans, to crack into and ruin your computer. You must therefore be prepared to block them off from ever entering your computer’s system at all times.
It is often said that the best cure is prevention. And the saying applies to your computers. If you want to protect your computer from the threat of viruses, worms, Trojans, and other malicious code, one of the best options to take is setting up a firewall.
What is a Firewall?
Imagine a firewall to be the fence that sits between your computer and the internet, or between your computer network and all the other computer networks out there.
It serves as a defense mechanism against harmful codes or data that may destroy your computer, and it works by examining the information that attempts to enter your computer or your network.
When a firewall is set up properly, hackers will not be able to detect your computer in their search for vulnerable ones to victimize.
What are the Types of Firewalls?
Firewalls are generally divided into three categories: software firewalls, hardware routers, and wireless routers. To know which kind of firewall is suitable for your needs, there are two factors on which your decision should depend on:
1. The number of computers that your firewall will service
2. The kind of operating system that you use (it can be Linux, a version of Windows, Apple Macintosh, and so on).
Choosing a Software Firewall
If you are planning to set up a firewall for a single computer, it is ideal to use a software firewall. It also works well with most Windows operating systems. They are readily available from software development companies for a certain fee.
Some of the advantages of a software firewall include:
- No additional hardware is required for it to work- There is no additional wiring that needs to be installed for the software to work.
However, there are also some disadvantages to deciding on using a software firewall:
- A software firewall may cause money and can be a bit costly- You will need to install and configure the software to get it to work properly- If you have multiple computers, you will need to install the software on each one of them to get them protected.
Choosing a Hardware Router
If you are planning to protect a small network of computers, say in your home or at a small office, a hardware router is probably more ideal for you.
The main advantage of using a hardware router is that they are more convenient to use for multiple computers as they usually have at least four network ports to which you can connect a number of computers.
However, its major disadvantage is that because of all the wiring that you will have to setup for it to work, it will potentially clutters your work space.
Choosing a Wireless Router
If you want a wireless network of computers, you would definitely want it protected by a wireless router.
Some advantages of using a wireless router include
- No wiring will be required, so it avoids clutter. It can connect personal computers, printers, scanners, without the use of any physical wiring. - It is ideal if you want to protect a set of laptops, notebook computers, and desktop computers
Some of the disadvantages of using a wireless router include:
- The radio signals that wireless devices use (including wireless routers) can be intercepted by other individuals with the right equipment
- Wireless routers are not always equipped with a built-in firewall, so you might have to purchase a firewall separately
- You might have to purchase extra equipment to set up a wireless router
Operating systems such as Microsoft Windows XP and Microsoft Vista are already equipped with a built-in firewall, but older versions of Windows as well as other operating systems require that you set up a separate firewall.
Setting up a firewall is recommended to any computer owner, especially to those who have very important data stored in their computers. Often the question lies not on whether you need a firewall or not, but instead on which type of firewall you should set up.

Setting Up A Safe Home Network

Setting Up A Safe Home Network
Securing the computer in your home is a task that requires your full and serious attention.
They take a lot of your time and there are steps that need to be done. The following are some of the tips and advice you could do to be able to secure your very own personal computer.
Anti-virus programs is a must
Imagine it this way, would you allow someone to knock at your door and enter your own living space in order to make you buy something or use your own telephone?
If they were neat and presentable enough you could probably let them inside your own home, but just like anyone else, you definitely would be watching their every move.
Observe just what it is you have done. You have already profiled that person and based on the profile you have come up with, have also decided what you will do.
This is because you are very much cautious and concerned on just who enters your own space.
Basically, this is how anti-virus programs work.
These programs scan all contents of every file, looking for patterns that are specific and one that would match a particular profile. This is basically termed as virus signature – or something that is notoriously harmful to your computer.
Every file that has a signature match, the program provides options on just how it is it should respond. One such response is by removing the patterns that are offensive or one that destroys the file.
A virus basically works this way. They are like salesmen who knock in your own living space and they would get you to buy or listen to their sales pitch. However, they could try to pilfer your money or valuables.
One way to know if a particular scammer is prowling in your neighborhood is probably by reading about them in the news or seeing them in a tv news report. These reports could give you an idea of what these scammers look like or what are the things to be wary and watch out for.
Anti-virus software programs basically work similarly. When the vendors know of a new potentially threatening virus, they have a set of updated signature viruses that could include the new virus threat.
Scan and check, check and scan
Other ways and means for viruses to enter your personal computer is via floppy disks, web sites, email, CD-ROM as well as downloaded files.
As much as possible, all these avenues must be checked if they contain viruses or not.
For instance, prior to using a particular floppy disk, it must first be checked for any viruses.
Also, when downloading a specific file from the net, these must be checked for any viruses. Your own anti-virus software program usually allows you to specify and check these places for any viruses. They may also do this scan automatically.
Patch it now, patch it good
The instance your computer’s system breaks down, do you have an idea on how you should restore its functions?
Many vendors have patches whose purpose is to fix any types of bugs. Usually, vendors offer patches that are free in their own web sites. When purchasing programs, it is a great idea if you ask the vendor how they supply patches.
Software vendor programs also have a service that allows you to a recall. Notices for patches could be received via e-mail through mailing list subscription. Through this service, one can easily learn computer problems even if you have yet to discover them and before any intruders could have the opportunity to exploit your computer’s system.
Be cautious when reading attachments via e-mailAlways be careful when opening received e-mails that carry attachments. Sometimes, the potentially threatening messages could come from unsolicited e-mails.
To be able to determine if an email is safe or not, it would be best to conduct the following test and ask these questions: Was the email sent by someone you know? Did you receive this e-mail before? Is the subject of the email described in a clear manner?
A suspicious e-mail usually read as BradPitt.jpg.vbs. Worms could travel this way and reading / opening it could bring damage to your computer system.
All in all, caution and care is needed to be able to protect your computer from unnecessary attacks by malicious viruses and worms.

Malware: Spyware And Adware

Malware: Spyware And Adware
Malware is any program designed to do harm, though sometimes what's considered harmful is a bit vague. Viruses, Trojans, spyware, adware, pop-ups, even spam and more have all qualified. Sometimes, though, one man's junk is another man's treasure.
Adware
Adware actually has two flavors - software supported with advertising, or a more malicious sort. The first could be a useful utility released free of charge but using advertising to generate revenue to support development - similar to TV commercials. You're not required to watch, but if you do you get ads along with content. Often this type of software is also available in ad-free form for a modest price.
The other, more malicious, type monitors your browsing habits and delivers targeted advertising. This type of software may be considered a type of spyware, especially if it's installed without your knowledge and consent. When does adware becomes spyware? A gray area. Some software vendors claim that disclosing the inclusion of this type of software in the user agreement grants legal consent for its installation. Most users, obviously, don't read the fine print, which is full of legal jargon and unattractively formatted.
Spyware
Spyware can have a more insidious meaning, however. This can refer to software which does much more than simply monitor a user's browsing habits. It can also redirect your browser to advertising sites.
This type is almost always installed without the user's consent or knowledge. It may be hidden in another program or arrive as the payload of a worm or virus. It's also illegal in many countries. In the U.S. the FTC (Federal Trade Commission) has indicted, and in some cases convicted, several purveyors.
Some software vendors require the user to install spyware as part of a package. File sharing utilities like Kazaa or BearShare are notorious for this practice. Its inclusion is declared in the user agreement but users don't have the option of not installing it - if they want the main program they have to install the spyware as well. Annoying, but legal.
The spyware installed with these, and many other, programs gather information about web browsing habits so that targeted advertising can be delivered to the user. 'Targeted' advertising is designed to be presented to specific groups, selected by analyzing their buying or browsing habits. Selections are made by discovering gender, age, frequently visited sites or by other criteria.
Spyware vendors argue that it doesn't collect specific personal information and there's an active controversy over whether it constitutes legitimate market analysis or privacy violation.
Most users find it annoying at best and intrusive in the main. Advertisers claim it's the best way to deliver products and services to potential new customers who may actually end up wanting what's offered. Legally, they assert, it's just another form of free speech. Users retort that the advertisers' free speech doesn't reach to their browser or e-mail Inbox.
The argument isn't likely to be settled soon.

Fighting Spam, Part II: Webmaster Strategies

Fighting Spam, Part II: Webmaster Strategies
Fighting spam — like countering any illegitimate activity — is a battle fought best on multiple fronts. There are simple steps end-users can take to minimize the impact of junk mail (outlined in Part I), but the webmaster or e-mail provider has even more tools available.
If spammers had to gather e-mails individually the effort would outweigh the reward. Their enterprise takes advantage of automation, in the form of spambots, programs that browse websites looking for e-mail addresses, which they then 'harvest' and collect into large lists.
Foiling them by raising the spammer's cost, without turning your efforts into a full-time job, is the most effective way to shift the equation in your favor. Some of the end-user techniques discussed in Part I are even more useful to the webmaster.
CAMOUFLAGE
Spambots can only do what they're programmed to do. Often, disguising a publicly visible e-mail address is enough to cause the spambot to bypass you. They're frequently programmed to look for character strings like John_Example@somecleverdomainname.com. A change to John_Example_at_NOSPAMsomecleverdomainname.com is enough to fool them.
Even if your disguised e-mail address is still harvested, at minimum the address has to be 'scrubbed' in order to be used. Scrubbing routines are even harder to write than spambots, because there are so many possible variations. (NO_SPAM, NOSPAM, no*spam, and many that are much more clever. Be creative!)
The method has a drawback: users have to strip out the extra letters and insert the @-sign (in the above example) — something they sometimes fail to do.
E-mail addresses can be made un-harvestable by embedding them in a graphic, rather than using mailto: or other plain-text options. Very few bots are sophisticated enough to read a graphic and translate the pixel pattern into usable text — particularly since the graphic can have an infinite variety of shapes. Here again, users can't simply copy-and-paste or reply to, so there's some inconvenience for them.
An alternative option is to eliminate visible and accessible e-mail addresses entirely. Instead, provide a feedback form that stores user information in areas unsearchable by spambots. Or, store the information in easy to encode but difficult to crack encrypted formats by using for example javascript.
BARRIERS
Banning visible e-mail addresses, or hiding them in graphical form, makes communication between trusted parties more difficult. Put the burden back on the spammer by blocking known spambots.
They often have an easily spotted signature, in the form of a known IP address or process name (or both), or by looking for non-browser User-Agents.
IP address blocking is a simple matter for any webmaster, but blocking unwanted processes isn't difficult either. Just start a cron job that periodically scans for a process name and uses kill to terminate the associated process ID.
The more sophisticated webmaster can have a daemon that sleeps until a process name is instantiated, wakes up instantly and kills the process before it can do any harvesting. Only slightly more difficult to implement, sample programs are available by searching your favorite engine.
It's possible to set a spambot trap that blocks incoming requests based on excessive search behavior or other pattern. The technique is a little more difficult to implement and administer since it requires defining patterns and altering them for different bots. Again, sample perl scripts and how-to guides are available by a brief search.
RAISE THE PRICE
Eventually, even determined spammers get tired of programming variations to bypass the hurdles thrown in their way, deciding the effort isn't worth the reward. The trick is to make the cost of their effort much higher than the reward, while making the cost to you low and the reward high.
Spammers won't surrender until the profit is taken out of their efforts. Even legislation, such as CAN-SPAM in the U.S., seems to have deterred mostly legitimate businesses who were not the guilty parties.
But junk mail filters are getting more sophisticated, penalties for sending spam are having some effect and there are new proposals being discussed (such as "mailer id") that will eventually reduce the problem to a negligible annoyance.
That's bad news for spammers — which is welcome information for the rest of us.

Virus Hoaxes, As Bad As The Real Thing?

Virus Hoaxes, As Bad As The Real Thing?
Computer viruses cause real damage to systems or lead to data theft. The consequences are lost time, broken programs and sometimes real money stolen.
A hoax can have these same consequences.
A virus hoax is typically distributed by e-mail to 'warn' recipients of a new threat to computer systems security. After detailing how this new virus is a serious threat, the e-mail advises you to forward the message to everyone you know. This 'chain letter' effect causes one kind of real harm.
Virus hoaxes can circulate widely. Suppose a recipient distributes it to 10 people and each of those 10 people distribute it to 10 more people, and so on down the line. After only six generations, one million bogus e-mail messages will circulate throughout the Internet. By the seventh generation the number reaches 10 million, and by the eighth generation - 100 million e-mail messages that serve no purpose are clogging up networks worldwide.
This effect can cause servers or routers (specialized computers that route Internet traffic) to slow down or even crash.
Often such hoaxes are forwarded with good intentions. A classic example is the e-mail warning about a virus called 'Deeyenda', circulating since 1995. It claims a virus called Deeyenda is circulating via e-mail. The e-mail explains the FCC (Federal Communications Commission) has issued warnings about this virus, and advises the recipient to pass the message on.
Everything about the warning is false. Viruses can't be activated by reading a text e-mail and the FCC doesn't issue warnings about viruses. (Spyware, yes. But then it's not usually a warning, but the annoucement of a criminal indictment.) Furthermore, there has never been a virus called Deeyenda.
Even a hoax can do real system damage. Some warn the user to delete certain files allegedly containing the virus. Such files are typically (unknown to the average user, of course) critical to proper computer operation. Deleting them may have no immediate effect - until the system is re-booted and fails to start.
How to Combat Virus Hoaxes
Fighting a hoax starts with 'recognizing the enemy'.
One clue that a warning is bogus is the use of technical jargon. The 'Good Times' virus hoax contained this warning: 'If the program is not stopped, the computer's processor will be placed in an nth-complexity infinite binary loop which can severely damage the processor.' This sounds very impressive, but in fact there is no such thing as an nth-complexity infinite binary loop. Also, no processor can be harmed by excessive use. Your system may be too busy to process desired commands, but no actual harm is done to the hardware.
Virus hoaxes often contain references to real organizations such as the FCC or a company specializing in antivirus software. If the warning is real, it'll be easy to verify on these organizations' web sites. If the virus warning is real, you can expect to find references to it in print, on television, as well as all over the Internet.
It should go without saying, though some have fallen prey, one should never 'buy' from someone unknown proposing to 'cure' your virus infection. There are many legitimate antivirus vendors - some offer downloadable products, others provide a service over the Internet. But all can be verified by reviews in trade publications and valid testimonials from trusted sources.
Don't be a victim.

Combating Viruses

Combating Viruses
Two simple precautions can help keep your computer virus free - install and use software from reliable vendors and avoid opening unexpected e-mail attachments.
Almost all e-mail attachments are potential virus carriers. Some of the most famous viruses were distributed by accessing address books of infected computers and sending e-mail (with attachments) to everyone in the address book.
Even those from known senders should be regarded with suspicion - e-mail addresses can easily be faked to appear to be from someone you know.
The 'Melissa' virus that appeared in 1999, originally posted on an Internet newsgroup, was distributed in a Microsoft Word document. When downloaded and opened the virus accessed the user's address book and sent copies of the document (along with the virus) to the first 50 people in the user's address book.
Every computer that received the virus sent out an additional 50 copies, creating a worldwide slowdown in Internet networks. The effect took only a few hours.
Another widespread virus distributed by e-mail was the 'ILOVEYOU' virus of 2000. When double clicked it sent copies of itself to every e-mail address in the infected computers address book. But far from a problem of the past, viruses are still very much with us.
What to do?
ANTIVIRUS SOFTWARE
Antivirus software is available in both commercial and freeware versions with a variety of features and prices, usually from free to less than $50.
Most antivirus software works by examining files as they arrive at the computer and by scanning later at configurable pre-set times. The programs work by examining each e-mail attachment and downloaded file looking for virus 'signatures'.
If a virus is found the user will be alerted and infected programs and attachments can be cleansed of the virus or, if not possible, infected files can be deleted or placed into 'quarantine' where they can't be run.
UPDATES
Whare are signatures? All programs have instructions in a pattern. Computer viruses - like their biological counterparts - come in known, though evolving, patterns. The fact of evolution is the reason virus-checking files need to be regularly updated. Updated files contain lists and the characteristics of new signatures.
Most antivirus software can be configured to alert you when the virus checking files are out of date, and even to automatically refresh signature files with the latest versions.
USER PARTICIPATION
Users can become complacent after installing antivirus software, thinking they're totally protected and don't need to worry about becoming infected.
Apart from the fact that antivirus software is written by humans, who can make errors, vendors can only react to viruses after they're created. By that time, much damage can already have been done. An e-mail attachment or program may be infected with a new type of virus that your software cannot (yet) detect.
Some antivirus software can - to a limited extent - detect virus activity even without being able to identify a particular virus. This is an extra level of protection against the latest viruses, but still shouldn't allow users to become overconfident.
Always use trusted sources for downloading software and treat every e-mail attachment with caution.
OTHER INFECTION ROUTES
Lastly, a special note about CDs and DVDs. While they can't be written to (those that can are called CD-R's, DVD-R/W or some variation), they can still contain viruses. Users who burn their own CDs or DVDs - inexpensive and easy these days - can accidentally copy infected programs onto the disc. Since CDs can contain files that automatically act when the disc is inserted, it's possible - though rare - for viruses to be spread without additional user action.
Once again, the lesson is clear. Only accept material from those you know and trust, and who practice 'safe file sharing'.
Be safe out there, now.

Finding The Best Anti-Spyware

Finding The Best Anti-Spyware
Spyware programs are a rapidly growing threat in computer security. These programs are essentially worm type viruses that copy themselves onto your computer without your consent, and the copied porgrams are designed to allow a hacker to access to your computer from a remote terminal.
The threats to your security are many, ranging from small, relatively harmless things like allowing a program to bypass your firewall security protocols and flooding your computer with useless and unsolicited advertisments, to more dangerous things like allowing a hacker to access your personal information, or even to gain actual control your PC from a remote terminal.
There are dozens of anti spyware programs available over the internet. When looking for one to buy, here are the factors you should definetely consider when making your choice:
Buy Anti Spyware Software - it is a truism that there are no free lunches. While there are fairly good free, downloadable anti spyware programs available, studies and consumer feedback show that the most comprehensive packages are the ones being marketed by major companies for consumer purchase. Try to obtain ones from a company that you have heard of and trust. Also, some of the more devious types of spyware actually disguise themselves as free anti spyware programs. These WILL block out the attempts of OTHER spyware programs, but will themselves be accessing your terminal...
Compatibility Issues - when buying an anti spyware program, check consumer reviews for it first; make sure that the program is completely compatible with all of the other major programs that you're using on your computer. A compatibility issue is more than just a matter of convenience, since some spyware programs can use the incompatible programs as a back door to avoid the anti spyware's detection and access your computer.
Periodic Updates - find a provider for your anti spyware program that periodically updates it's services to keep up with the latest technology, and offers you the ability to download these updates. Hackers are continually working to modify their programs and finding new measures to bypass known countermeasures. Therefore, what works today may not defend against next week's spyware programs, unless you keep your security program up to date.
Added Security Programs - aside from spyware, packages are available that feature anti virus systems, firewalls, and anti adware programs. Even if you already have similar existing security programs installed on your computer, two security systems work better than one. As stated earlier, just make sure that the two programs are compatible with each other.

Notebook Computers in the Age of the In

Notebook Computers in the Age of the In
Everyone knows that our world cannot exist without computers. Ever tried to make a purchase at a convenience store when their computers are down, ever waited for someone to make change when their register computer is down, or have you ever tried to find a book in a library when the system is down? If you have ever experienced one of these inconveniences, you know that our world hinges on whether or not our computers are working.
Remember when you told your teacher that the dog ate your homework? Did she believe you? Probably not. Now the excuse is my computer crashed, my printer wouldn't print, or we were out of ink. Even kids rely on computers to do their schoolwork. The days of pen and pencils are almost over. In fact most students know more about computers than their teachers or parents. They don't even remember a time without computers.
As computers become more and more intuitive and powerful, we must proceed with them. If you are still among the population that resents the encroachment of the computer, think about this scenario. If Eve in the Garden of Eden had access to the Internet, she could have looked up information about snakes. She would have found out that they have forked tongues and an evil reputation. Instead of listening to the snake's lies, she would have thrashed him with a tree branch. Think how much better our world would be now.
The best present any graduate can get this June is a desktop computer or a laptop. In my day, girls were given matching luggage to take their clothes to school. Yes, I know I am dating myself, but I do have a point. Today buy your child a computer and let them take their clothes is a paper sack. They don't care; an old gym bag will do. I know; schools have computer labs, but they are always full. Wouldn't you rather your son or particularly your daughter not be out of the dorm or apartment working on projects or papers? Also, when your newly graduated senior has moved away to school, e-mail will become your best friend. Even if you hate computers, you will learn to love them because they will become your link to your child. The nest will never be empty as long as you have e-mail.
Computers are links to the outside world. The world has never been more accessible or smaller. You have to keep up or you will be left behind and who wants to be the last straggler on the planet? Not me!