WelCome To OnlineSAB Cyber 'n' Communication (P) LTd

Well, Its just a Small Blog For My Own Small business with high destination at the small town of Pokhara, Nepal. its just a small business from my side to myself! it is located In Lamachour -16, Pokhara, Nepal. Its One Completed Cyber and Communication Center at the small town with few of customers but hoping to get more than more guest at the time. I would like to describe my all kind of facilities and services here but not in this post because of i had given all kind of information in this blogspot to you ! I love to making this blogspot myself here ! thanks for All my visitors and friends who visit this blogspot and try to encouraging me personally in my inbox....... I am always Waiting some comments and mails from you so never be late to write me......
Image by FlamingText.com
title="Image
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com
Image by FlamingText.com

TECH-INFO

Short-Cut Keys of Computer

Windows Shortcut :

Shift + F10 right-clicks.

Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.

Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.

Win + Control + F: Open Find dialog. (Computers)

Win + U: Open Utility Manager.

Win + F1: Open Windows help.

Win + Pause: Open System Properties dialog.

Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.

Win + Shift + Tab: Cycle through taskbar buttons in reverse.

Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.

lt + Shift + Tab: Display Cool Switch; go in reverse.

lt + Escape: Send active window to the bottom of the z-order.

lt + Shift + Escape: Activate the window at the bottom of the z-order.

Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.

Shift while a CD is loading: Bypass AutoPlay.

Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)

Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.

Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.

Print screen: Copy screenshot of current screen to clipboard.

Alt + Print screen: Copy screenshot of current active window to clipboard.

Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.

Ctrl + Alt + Up Arrow: Undo inversion.

Win + B : Move focus to systray icons.


General


Ctrl + C or Ctrl + Insert: Copy.

Ctrl + X or Shift + Delete: Cut.

Ctrl + V or Shift + Insert: Paste/Move.

Ctrl + N: New... File, Tab, Entry, etc.

Ctrl + S: Save.

Ctrl + O: Open...

Ctrl + P: Print.

Ctrl + Z: Undo.

Ctrl + A: Select all.

Ctrl + F: Find...

Ctrl+W : to close the current window

Ctrl + F4: Close tab or child window.

F1: Open help.

F11: Toggle full screen mode.

Alt or F10: Activate menu bar.

Alt + Space: Display system menu. Same as clicking the icon on the titlebar.

Escape: Remove focus from current control/menu, or close dialog box.


General Navigation


Tab: Forward one item.

Shift + Tab: Backward one item.

Ctrl + Tab: Cycle through tabs/child windows.

Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.

Enter: If a button's selected, click it, otherwise, click default button.

Space: Toggle items such as radio buttons or checkboxes.

Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.

Ctrl + Left: Move cursor to the beginning of previous word.

Ctrl + Right: Move cursor to the beginning of next word.

Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.

Ctrl + Down: Move cursor to beginning of next paragraph.

Shift + Left: Highlight one character to the left.

Shift + Right: Highlight one character to the right.

Shift + Up: Highlight from current cursor position, to one line up.

Shift + Down: Highlight from current cursor position, to one line down.

Ctrl + Shift + Left: Highlight to beginning of previous word.

Ctrl + Shift + Right: Highlight to beginning of next word.

Ctrl + Shift + Up: Highlight to beginning of previous paragraph.

Ctrl + Shift + Down: Highlight to beginning of next paragraph.

Home: Move cursor to top of a scrollable control.

End: Move cursor to bottom of a scrollable control.


File Browser


Arrow Keys: Navigate.

Shift + Arrow Keys: Select multiple items.

Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.

(Letter): Select first found item that begins with (Letter).

BackSpace: Go up one level to the parent directory.

Alt + Left: Go back one folder.

Alt + Right: Go forward one folder.

Enter: Activate (Double-click) selected item(s).

Alt + Enter: View properties for selected item.

F2: Rename selected item(s).

Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.

Delete: Delete selected item(s).

Shift + Delete: Delete selected item(s); bypass Recycle Bin.

Ctrl while dragging item(s): Copy.

Ctrl + Shift while dragging item(s): Create shortcut(s).

In tree pane, if any:
Left: Collapse the current selection if expanded, or select the parent folder.

Right: Expand the current selection if collapsed, or select the first subfolder.

Numpad Asterisk: Expand currently selected directory and all subdirectories. No undo.

Numpad Plus: Expand currently selected directory.

Numpad Minus: Collapse currently selected directory.


Accessibility


Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.

Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.

Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.

NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.

Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.


Microsoft Natural Keyboard with IntelliType Software Installed


Win + L: Log off Windows.

Win + P: Open Print Manager.

Win + C: Open control panel.

Win + V: Open clipboard.

Win + K: Open keyboard properties.

Win + I: Open mouse properties.

Win + A: Open Accessibility properties.

Win + Space: Displays the list of Microsoft IntelliType shortcut keys.

Win + S: Toggle CapsLock on and off.



Remote Desktop Connection Navigation


Ctrl + Alt + End: Open the NT Security dialog.

Alt + PageUp: Switch between programs.

Alt + PageDown: Switch between programs in reverse.

Alt + Insert: Cycle through the programs in most recently used order.

Alt + Home: Display start menu.

Ctrl + Alt + Break: Switch the client computer between a window and a full screen.

Alt + Delete: Display the Windows menu.

Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.

Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.


Mozilla Firefox Shortcuts


Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.

Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.

Ctrl + (1-9): Switch to tab corresponding to number.

Ctrl + N: New window.

Ctrl + T: New tab.

Ctrl + L or Alt + D or F6: Switch focus to location bar.

Ctrl + Enter: Open location in new tab.

Shift + Enter: Open location in new window.

Ctrl + K or Ctrl + E: Switch focus to search bar.

Ctrl + O: Open a local file.

Ctrl + W: Close tab, or window if there's only one tab open.

Ctrl + Shift + W: Close window.

Ctrl + S: Save page as a local file.

Ctrl + P: Print page.

Ctrl + F or F3: Open find toolbar.

Ctrl + G or F3: Find next...

Ctrl + Shift + G or Shift + F3: Find previous...

Ctrl + B or Ctrl + I: Open Bookmarks sidebar.

Ctrl + H: Open History sidebar.

Escape: Stop loading page.

Ctrl + R or F5: Reload current page.

Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.

Ctrl + U: View page source.

Ctrl + D: Bookmark current page.

Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.

Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.

Ctrl + Numpad0 or Ctrl + 0: Set text size to default.

Alt + Left or Backspace: Back.

Alt + Right or Shift + Backspace: Forward.

Alt + Home: Open home page.

Ctrl + M: Open new message in integrated mail client.

Ctrl + J: Open Downloads dialog.

F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.

Shift + F6: Switch to previous frame.

Apostrophe ('): Find link as you type.

Slash (/): Find text as you type.


Gmail Shortcuts


Note: Must have "keyboard shortcuts" on in settings.

C: Compose new message.

Shift + C: Open new window to compose new message.

Slash (/): Switch focus to search box.

K: Switch focus to the next most recent email. Enter or "O" opens focused email.

J: Switch focus to the next oldest email.

N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.

P: Switch focus to the previous message.

U: Takes you back to the inbox and checks for new mail.

Y: Various actions depending on current view:

Has no effect in "Sent" and "All Mail" views.

Inbox: Archive email or message.

Starred: Unstar email or message.

Spam: Unmark as spam and move back to "Inbox."

Trash: Move back to "Inbox."

Any label: Remove the label.

X: "Check" an email. Various actions can be performed against all checked emails.

S: "Star" an email. Identical to the more familiar term, "flagging."

R: Reply to the email.

A: Reply to all recipients of the email.

F: Forward an email.

Shift + R: Reply to the email in a new window.

Shift + A: Reply to all recipients of the email in a new window.

Shift + F: Forward an email in a new window.

Shift + 1 (!): Mark an email as spam and remove it from the inbox.

G then I: Switch to "Inbox" view.

G then S: Switch to "Starred" view.

G then A: Switch to "All Mail" view.

G then C: Switch to "Contacts" view.

G then S: Switch to "Drafts" view.


List of F1-F9 Key Commands for the Command Prompt

F1 / right arrow: Repeats the letters of the last command line, one by one.

F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line

F3: Repeats the last command line

F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line

F5: Goes back one command line

F6: Enters the traditional CTRL+Z (^z)

F7: Displays a menu with the command line history

F8: Cycles back through previous command lines (beginning with most recent)

F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.

Alt+Enter: toggle full Screen mode.

up/down: scroll thru/repeat previous entries

Esc: delete line

Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.


Helpful accessibility keyboard shortcuts


Switch FilterKeys on and off. Right SHIFT for eight seconds

Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN

Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK

Switch StickyKeys on and off. SHIFT five times

Switch ToggleKeys on and off. NUM LOCK for five seconds

What is the Internet?

The word internet is used to describe a network of networks which incorporate a very large and complicated set of equipment. To understand the internet, there are three areas of discussion which are very helpful. These include the various services provided across the internet, the functions that enable the internet to work, and the various organizations that are part of the internet.

Internet Services

The main services used on the internet include:
  • Web browsing - Supported by the HTTP protocol, this functions allows users to view web pages using a web browser.
  • E-mail - Allows people to send and receive electronic messages.
Other lesser used services include telnet (allows remote login to computers), FTP (Allows quick file transmission to remote computers), and gopher (An early form of text based form of reading internet documents which is rarely used today).

Internet Functions

The internet provides for the following two functions which support communications. Without the communications support mentioned below, the internet could not function. These two functions are provided by internet service providers listed below under the "Internet Organizations" header.
  • Physical lines that data is sent across.
  • Routing of data - There are special machines on the internet called routers, that determine where data needs to go to get from the sender of the data to the receiver of the data.

Internet Organizations

  • ISPs (Internet Service Providers) - They provide the connection to the internet for users and also provide routers that direct internet traffic.
  • Corporations or Web hosting providers with mail servers and web servers - They provide the information posted on the internet and virtual data connections to other mail servers.
There are also other organizations that regulate the internet, providing communication standards and designing new communication standards for improvements. These communication standards are also known as protocols.

Summary

So the internet is a collection of organizations that provide equipment that support the internet functions and services. The internet connects many corporate and organizational private networks together thus enabling all these organizations to easily communicate.

Accessing the Internet

People use an internet browser to access web pages that are available across the internet. Internet browsers include Microsoft Internet Explorer, Netscape Navigator, Mozilla, and others.
Web pages are created in a marked up form of text file called HTML (Hyper-Text Markup Language). The markup within the text indicates document structure showing where paragraphs begin and end, what items are in a list, headers, tables and other document structure.
When people are browsing of surfing the internet, they usually go from place to place by clicking on links. These links are locations for specific pages and indicate the three things:
  1. Protocol being used such as http or ftp
  2. The domain that the web page is found on. This will point to a specific organization's or company's web server.
  3. The location of the page on the server including the directory path and file name.
An example link is "http://www.comptechdoc.org/basics/bastutorial/osintro.html". In this case http is the protocol being used, the comptechdoc.org domain indicates where the organization's web server is, and the "/basics/bastutorial/osintro.html" part of the string indicates the folders the file is in and the name of the file.
These links are sometimes called hyperlinks or URLs (Uniform Resource Locators)
****************************OnlineSAB Cyber 'n' Communication*************************

What is a Network?

The word network can be used to describe a very large and complicated set of equipment. In its most accurate and simplest definition a network refers to the cables and electronic components that amplify the signals going through the cables. The amplifying equipment is necessary to ensure accurate communication and make the signal stronger if it needs to go long distances.

Broader Definition

When many people talk about a network, they are talking about a network using a very broad concept. For instance if someone cannot get to their email, they may say "the network is down". Likewise they may say this if they cannot surf the internet or get to their files. They may not stop to think that in each specific instance there is a single piece of equipment that may provide the capability which they are trying to use.
Most people who work on a corporate or organizational network think about the network in component parts. The three main parts are:
  • The cabling and amplifiers mentioned in the first paragraph.
  • The workstations which most members of the organization use to access resources.
  • Higher powered computers called servers - These are the machines that provide what network administrators call services. Services include the functions that most people try to use such as email, reading and writing files, printing, and getting to the internet. Whenever a user is trying to do something on the network, there is a service or machine providing the capability to do so. This even includes times when someone is trying to get to network resources from their home.

Services

Services include:
  • Email service
  • File service - Allows users to use and share file space on a computer with a lot of file space.
  • Print service - Allows printing to printers connected on the network.
  • Web surfing - Allowing someone to open web pages and see web sites on the internet.
  • Filtering out undesired sites on the internet.
  • Allowing someone to access the network from the outside (from home).
  • Updating virus definitions on workstations.
  • Allowing someone to log onto the network.
  • Even giving a workstation an address on the network is a service. If your computer does not have an address, it cannot access the internet or any other resource on the network.

A Typical Network

A typical corporate or organizational network is shown below:
Typical Network
Of course there are variations on this network layout and some details have been left out for the sake of simplicity but this drawing should give you some idea about what goes on behind the scene on the network at your organization. Some servers and server functions have not been shown here.
The firewall is the device that protects all computers in the network from many attacks. It allows some types of network traffic into the network from the outside, but usually only for mail or web services. Usually the internet traffic that that is allowed to come into the network is routed to the part of the network labeled "DMZ" on the right side of the diagram. DMZ stands for demilitarized zone and is also called a semi-private network. In this DMZ is a web server which is used to allow people surfing on the internet to see web pages posted by the organization. A mail server is also shown in the DMZ but this could be replaced by a mail relay server while the mail server is placed inside the private network. The mail relay server would forward mail traffic from the outside to the mail server. This would increase the security of the network since a direct connection from the internet to the mail server would not be allowed.
The private network is of course the most secure part of the network. There are several servers on this network including:
  • A login server (called a domain controller) which controls everyones permissions and access to the network resources such as files. Without this server, they cannot login to the network.
  • An address server (called a DHCP server) which provides addresses to computers on the network so they can communicate as discussed earlier.
  • A file server which provides common files and a private folder for users.
  • A remote access server which allows users to connect to the network by telephone from the outside.
Also the workstations are part of this network.

Conclusion

Knowing the above information, if someone cannot get their mail, they may think the network is down. This is not likely to be the case. The mail server may be down but the network is not likely to be down. The same goes for when someone can't surf the web. There may be a problem with the firewall or the line connecting to the internet, but it is unlikely that the whold netwlrk is down. When problems are noticed it is best for the user to describe what they were trying to do and what happened.
****************************OnlineSAB Cyber 'n' Communication*************************

Hardware

The term hardware describes the physical parts of your computer which you can physically touch or see such as your monitor, case, disk drives, microprocessor and other physical parts.

Software

The term software describes the programs that run on your system. This includes your computer operating system and other computer programs which run. Software is written in a computer language (such as Basic, C, Java, or others) by programmers. The computer language is in a text format and can be read by a person although if you do not understand the structure and rules of the language you may not understand it very well. Once a program is written, an operation is performed on it which is called compiling. Compiling is the process of changing the textual written language into a binary language which can be understood by the computer.
Writing these text files and converting them to computer readable files is the way operating systems and most application programs are created.

BIOS (Basic Input/Output System)

BIOS is a low level program used by your system to interface to computer devices such as your video card, keyboard, mouse, hard drive, and other devices. What BIOS programs provide in the computer are very simple function calls or small subprograms which can be used by higher level programs to perform simple operations on computer devices. For example a BIOS program would provide the ability to write a character to memory on a video card.

BIOS is normally written in a low level computer language and is permanently or semi-permanently written into the computer system. This type of computer program is commonly referred to as firmware since it was historically written permanently into computer systems. Although BIOS is a program, because of its permanent state, it was not quite considered to be software so the term firmware is used to describe it.
Historically BIOS programs were written into a type of memory called ROM (read only memory). This type of memory would not lose its data when the computer lost power thus ensuring these BIOS programs would always be available. There were different variants of ROM memory some of which could be written multiple times but this memory could not normally be changed or re-programmed once the computer system was sold to the customer. Once ROM memory was written to, it could not be written to again and could only be read when in the possession of the customer. In more recent years a more flexible form of memory was developed called flash ROM which allows ROM memory to be written to after the computer system is in possession of the customer.
 
****************************OnlineSAB Cyber 'n' Communication*************************

Computer Data

To help understand computers it is best to first learn about computer data. Computer data is information required by the computer to be able to operate. It is used to:
  • Run programs - This is the actual executable program data that the computer will execute to run the program such as Microsoft Word.
  • Store program or system configuration information.
  • Store information that the computer user needs such as text files or other files that are associated with the program the computer user is running. A common example of a program the computer user is running is the Microsoft Office suite of products which include Microsoft Word, Microsoft Excel, and others. These programs are also known as applications.

Data Structure

Computer data is in what is called binary format. This means that it is always a 0 or a 1. It only has these two states and must be in one of them.
There are several fundamental data units which include:
  • Bit - A data unit which must be in one of the two binary states described above. It is the smallest data unit that exists.
  • Byte - 8 bits of data which has a possible value from 0 to 255.
  • Word - Two bytes or 16 bits of data with a possible unsigned value from 0 to 16535.

Data transmission

Data transmission is the act of sending data from one place to another. Data is transmitted both inside and outside your computer. There are two fundamental methods of data transmission.
  • Serial - Data is sent on a single line and one bit is sent at at a time. This is similar to a line which one item must come one after another.
  • Parallel - Data is sent on more than one line at a time. This may be any number of bits at a time, but is usually one word at a time (two bytes) or possibly three bytes at a time.

****************************OnlineSAB Cyber 'n' Communication*************************
 

Computer Hardware

The term computer hardware refers to the various electronic components that are required for you to use a computer along with the hardware components inside the computer case. As you know your computer equipment is made of several common components. These include:
  • The main computer box.
  • A monitor - Looks like a television screen.
  • A keyboard.
  • A mouse.
  • Speakers.
  • An optional printer
The main computer box is the main component of the computer. It has computer hardware parts inside that perform the following functions:
  • Temporary storage of information (known as data in more technical terms) - This function is done by memory.
  • Permanent storage of information - This function is done by a hard disk, floppy disk, or CD ROM.
  • Manipulation or processing of data - Used to determine where data is stored and perform calculations which support operations that the user is doing.
  • Interfacing to the outside components or to the outside world - This supports the ability for the user to communicate with the computer and know how the computer is responding to commands which are done primarily through the monitor, keyboard, and mouse along with their interface components in the main computer box.
  • A power supply which provides the electrical power to the components in the computer box.

The Main Computer Box

The main computer box is made of several computer hardware components and subcomponents which include:
  • The case - The outside component which provides protection for the parts inside and provides a fan and power supply which are used to both cool the working parts inside and provide power to them.
  • The motherboard - Hold the following computer hardware subcomponents:
    • Memory - Used to provide temporary storage of information as discussed earlier.
    • Microprocessor - Used to provide the processing of data function as discussed earlier.
    • Video interface card which is also called the video card - This card is an interface between the computer monitor and the motherboard and its subcomponents such as the microprocessor and memory. This card may be included as part of the motherboard or it may plug into a card slot on the motherboard.
    • Sound card is an interface between the computer speakers and the motherboard and its subcomponents such as the microprocessor and memory. This card may be included as part of the motherboard or it may plug into a card slot on the motherboard.
  • One or more permanent storage devices some of which may be optional:
    • Hard disk - Most computers today have a hard disk (sometimes called hard drives) which is the component most commonly used to provide permanent storage of data. Hard disks are usually permanantly installed in a computer.
    • CD ROM drive or DVD drive - Used to provide permanant storage of data but this type of drive is used to bring information into the computer more commonly than it is used to store information from the computer. Sometimes this type of drive is used to back up data from the hard drive so data is not lost if a hard drive breaks. A DVD drive holds more data than a CD ROM drive and DVDs have enough storage capacity that they may be used to play or store movies. The storage media, the CD ROM or DVD may be removed from the computer.
    • Floppy Drive - A low capacity storage device which can be written to as easily as it is read. The floppy disk may be easily removed from the computer. It is called a floppy because the part of the media that holds the data is on a material that is not rigid but it is enclosed in a more rigit case to give it durability.
There are also other minor computer hardware components inside the case which include cables which may be used to hook other internal parts together along with connecting an interface to the case for printers and other devices such as a high speed serial bus called USB. (A serial bus simply refers to the fact that data is sent in a stream which is like sending one bit at a time.

The Case

The drawing below shows a typical case. It may help you understand where your connections for your monitor, keyboard, mouse, and other devices are if you should need to hook them up. For more specific information you should refer to your computer owner's manual.
Typical Computer Views
The drawing below shows a typical layout of the components inside your computer case.
Inside the Case
****************************OnlineSAB Cyber 'n' Communication*************************



What is a Virus?

A computer virus is a programme, or piece of code, that is written to interfere with, and harm, your machine. A virus can replicate itself, spread to other computers, and attack other programmes on your computer. (By attack, we mean change or delete files.) Computer experts distinguish between a virus, a worm, and a Trojan. Here's the differences:

Virus - Can replicate and spread to other computers. Also attacks other programmes
Worm - A special type of virus that can replicate and spread, but generally doesn't attack other programmes
Trojan - Doesn't replicate, but can spread. Doesn't attack other programmes. Usually just a way of recording and reporting what you do on your PC
Viruses are split into different categories, depending on what they do. Here are a few categories of viruses:
Boot Sector Virus
The Boot Sector of a PC is a part of your computer that gets accessed first when you turn it on. It tells Windows what to do and what to load. It's like a "Things To Do" list. The Boot Sector is also known as the Master Boot Record. A boot sector virus is designed to attack this, causing your PC to refuse to start at all!
File Virus
A file virus, as its name suggests, attacks files on your computer. Also attacks entire programmes, though.
Macro Virus
These types of virus are written specifically to infect Microsoft Office documents (Word, Excel PowerPoint, etc.) A Word document can contain a Macro Virus. You usually need to open a document in an Microsoft Office application before the virus can do any harm.
Multipartite Virus
A multipartite virus is designed to infect both the boot sector and files on your computer
Polymorphic Virus
This type of virus alter their own code when they infect another computer. They do this to try and avoid detection by anti-virus programmes.

How do Viruses get on my computer?

The most common way that a virus gets on your computer is by an email attachment. If you open the attachment, and your anti-virus programme doesn't detect it, then that is enough to infect your computer. Some people go so far as NOT opening attachments at all, but simply deleting the entire message as soon as it comes in. While this approach will greatly reduce your chances of becoming infected, it may offend those relatives of yours who have just sent you the latest pictures of little Johnny!
You can also get viruses by downloading programmes from the internet. That great piece of freeware you spotted from an obscure site may not be so great after all. It could well be infecting your PC as the main programme is installing. And if you or your children download software from peer to peer networks (like Kazaa, Morpheus, Shareaza) then you could be downloading more than you bargained for!
If your PC is running any version of Windows, and it hasn't got all the latest patches and updates, then your computer will be attacked a few minutes after going on the internet! (Non Windows users can go into smug mode!)

Could I be infected by a Virus?

If you are infected by a virus, your computer may exhibit some well-known symptoms. Here's a few signs that you may be infected:
  1. Your computer starts running more slowly than it usually does
  2. Your computer keep crashing
  3. Your computer keep crashing and then restarting
  4. Programmes you normally work with suddenly start behaving oddly
  5. You can't access your disk drives

Other symptoms to look out for are strange error messages, documents not printing correctly, and distorted menus and dialogue boxes. Try not to panic if your computer is exhibiting one or two items on the list.
The first thing to do is to scan your PC with your (up-to-date) anti virus software. If your anti-virus software fails to detect anything, then that doesn't mean you're NOT infected - it may just be poor anti-virus software. And remember, most popular doesn't mean most effective. While Norton and Mcafee are good, extensive tests in respected computer magazine show that they are not the best. Not being the best means that they may fail to detect the virus on your PC! Not only that, Norton and Mcafee are becoming really expensive to maintain!

Free Anti-Virus software

There are some good free anti-virus solutions out there. The most popular is AVG. This has gotten results that are as good as the market leaders. You can check it out here (this page also tells you what you DON'T get with the free edition):
Once installed, AVG will update itself on a regular, daily basis. It will also scan emails for viruses, and alert you if it finds anything. The interface is a bit old-fashioned but, hey, it's free and it does a quite a good job!
Another good solution is AntiVir from Avira. The classic edition is free, as well. Check out their website here:
AntiVir will also protect users of non Microsoft computers (Linux/FreeBSD/Solaris). It is, of course, debatable whether you need anti-virus protection if you don't have a Windows machine!
NOTE: If you're changing AV software, you MUST make sure that the old one has been completely uninstalled first. Norton and Mcafee can be difficult to uninstall, and you should consult their website BEFORE uninstalling - they may even have a special tool to do the job. Some people have said that trying to uninstall Norton or Mcafee was worse than getting a virus. (If you see an ad below for either of these two - it's not because we chose it!)
****************************OnlineSAB Cyber 'n' Communication*************************