Friday, March 15, 2013

Using Computers




These days it's strange to hear people say, "I'm just not computer literate," as computers have evolved from archaic scientific calculators to simple point-and-click type machines. We suspect that today's "computer illiterates" are people who haven't taken the time to experiment with such a machine. And we strongly believe that spending just twenty minutes with one could turn the most adamant technological caveman into any one of those who have fun wreaking chatroom havoc on the Internet today.





Today, one only needs to learn how to manipulate a mouse, punch a few buttons on a keyboard, or really just turn the thing on to use a computer. It's hard for some folks to believe, but the computers of this generation almost run themselves! For fun, let's investigate just how little knowledge these thousand-dollar machines actually require.





Can an absolute newbie operate a computer without knowing how to use a mouse or keyboard? Assuming that a computer is set up to operate on voice command - sure! Voice command software allows users to tell a computer what to do and the computer responds by fulfilling the user's commands. Although it's pretty new and still under development, voice directed technology has already infiltrated consumer service related systems.





Think back to the last time that you paid a bill over the phone. Instead of speaking to a human being, chances are that you spoke to a computer that not only responded to what you said and followed the commands that you gave it, it also asked you for more information such as your full name or credit card number. In this case, a person (such as yourself) operated a computer without even knowing it!





Can an absolute newbie sit down at a computer without knowing how to use one? Assuming that a computer is set up to operate on touch command - the answer is again, yes! Touch command software allows users to literally touch objects on a monitor and tell the computer what to do with a finger. Known as "kiosks," these programs are already in use world wide at ATM machines, employment centers, and in health monitoring systems.





Neither a mouse nor a keyboard is required. A computer user only needs to touch various boxes on a screen to control a computer. Sure, the programming behind such technology is extensive and advanced, but to the end user, it makes computer use less intimidating and plain easy.





Of course when we talk about operating a computer, we envision more involvement than speaking on the phone or touching things on a screen. The above illustrations were just a couple of examples of how far computer technology has grown, and how far we've pushed "user-friendliness" to its limit. Eventually, the keyboard and mouse will have to play a role when computer newbies have to work with one as a cash register, as a hotel booking program, or as a library's catalog system.





These requirements don't make computers any less easier to operate, but they don't make them that much harder either. So much of today's software is designed to accommodate the experience of a new user that anyone could get connected to the Internet, send an email message, and download an MP3 file within the first five hours of purchasing a personal PC.


Thursday, March 14, 2013

Viruses




Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention.





In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer.





A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus.





Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service.





Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null.





We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing.





To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.





PPPPP





Word count 578



1 Source: http:// news.yahoo.com/s/livescience/20070426/sc_livescience/recordsettingspameffortturnscomputersintozombies