- Virus: A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
- Trojan horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves
- Worm: A program or algorithm that replicates itself over a computer network and usually performs malicious actions
- Blended threat: Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities .
- Antivirus program: A utility that searches a hard disk for viruses and removes any that are found.
Tips to Combat Viruses, Worms and Trojan Horses on Your Computer
Keep The Operating System Updated
Friday, 6 April 2012
Networking Hardware?
Did you know what it is? this is another entry that i want to share who do not know or who already know about it...
there are several parts of the network hardware that we should know:
- file server
- workstations
- network internet cards
- switches
- repeaters
- bridges
- routers
- firewall
Servers
One or more network servers is a part of nearly every local area network.These are very fast computers with a large amount of RAM and storage space, along with a one or more fast network interface card(s). The network operating system provides tools to share server resources and information with network users. A sophisticated permissions-handling system is included, so that access to sensitive information can be carefully tailored to the needs of the users. For small networks, a singe network server may provide access control, file sharing, printer sharing, email, database, and other services
Workstations
Computers that humans use are broadly categorized as workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need large storage hard drives, because files can be saved on the file server. Almost any computer can serve as a network workstation.
Network Interface Cards
Often abbreviated as NIC, an expansion board you insert into a computer so the computer can be connected to a network. Most NICs are designed for a particular type of network, protocol, and media, although some can serve multiple networks.A Wi-Fi network card with an external aerial for the signal
A network cable can only have one data packet in it at any instant.
So if two or more computers want to place a data packet on to the network at exactly the same time, then a 'data collision' will take place.
The network protocol is set up to deal with this. Basically it declares the collided data as unusable and forces the two computers to re-send their data packets at a slightly different time.
Repeaters
All signals fade as they travel from one place to another.
Of course, computers on a real network can easily be more than 200 metres apart. Therefore the network cable is split up into segments. Each segment is less than the maximum length allowed. Joining the segments together is a device known as a 'Repeater'.
Here are some typical maximum cable lengths:
- Copper cable - 100m
- Thick Ethernet - 500m
- Thin Ethernet - 185m
Bridges
A bridge is not as capable as a Router - but it is less expensive.
Both networks have to be using the same protocol
A Router is a device that transfers data from one network to another in an intelligent way. It has the task of forwarding data packets to their destination by the most efficient route.
When a data packet arrives, the router does the following:-- Reads the data packet's destination address- Looks up all the paths it has available to get to that address- Checks on how busy each path is at the moment- Sends the packet along the least congested (fastest) pathOther tasks the Router can perform:- Exchange protocol information across networks- Filter traffic - helps prevent unathorised intrusion by malware
Subscribe to:
Posts (Atom)