CLICK TO HOSTING A WEBPAGE

Web hosting

Thursday, December 31, 2015

Wednesday, December 23, 2015

Hack linux system easily hit the backspace key 28 times.

So what would anyone need to bypass password protection on your computer?

It just needs to hit the backspace key 28 times, for at least the computer running Linux operating system.

Wait, what?

A pair of security researchers from the University of Valencia have uncovered a bizarre bug in several distributions of Linux that could allow anyone to bypass any kind of authentication during boot-up just by pressing backspace key 28 times.


This time, the issue is neither in a kernel nor in an operating system itself, but rather the vulnerability actually resides in Grub2, the popular Grand Unified Bootloader, which is used by most Linux systems to boot the operating system when the PC starts.
The source of the vulnerability is nothing but an integer underflow fault that was introduced with single commit in Grub version 1.98 (December 2009) – b391bdb2f2c5ccf29da66cecdbfb7566656a704d – affecting the grub_password_get() function.

Here's How to Exploit the Linux Vulnerability


If your computer system is vulnerable to this bug:

Just hit the backspace key 28 times at the Grub username prompt during power-up. This will open a "Grub rescue shell" under Grub2 versions 1.98 to version 2.02.

This rescue shell allows unauthenticated access to a computer and the ability to load another environment.

From this shell, an attacker could gain access to all the data on your computer, and can misuse it to steal or delete all the data, or install persistent malware or rootkit, according to researchers Ismael Ripoll andHector Marco, who published their research on Tuesday.

Here's How to Protect Linux System


The Grub vulnerability affects Linux systems from December 2009 to the present date, though older Linux systems may also be affected.

Also Read: Is This Security-Focused Linux Kernel Really UnHackable?

The good news is the researchers have made an emergency patch to fix the Grub2 vulnerability. So if you are a Linux user and worried your system might be vulnerable, you can apply this emergency patch,available here.

Meanwhile, many major distributions, including UbuntuRed Hat, and Debian have also released emergency patches to fix the issue.

Linux is often thought to be a super secure operating system compare to others, and this Grub vulnerability could be a good reminder that it's high time to take physical security just as seriously as network security.

Sunday, September 27, 2015

How to hide hide the paritition drive of a computer

Hello Friend today i m going to show you how to hide the drive for eg d e f etc from your computer this 1:52s video tuturial illustrate you better.

https://youtu.be/YjhyVCZfqz0

Thank you.

Thursday, September 24, 2015

How to know a friend facebook password

                                            Hello friend this generation is IT generation

Today i will show you how to a Facebook password if your friend recently login with your laptop or PC Here is a simple YouTube video tutorial from which you can get a friend facebook password :-

you can know your friend Facebook password see the tutorial carefully:-

                       https://www.youtube.com/watch?v=CM6TvWLZlF0

Monday, September 21, 2015

How to hack WI-Fi in simple step with picture.

Today I will show you how to crack or get WPA password. How easy to hack a Wi-Fi password by using few steps you can hack any Wi-Fi at any place.


Tools used are
i)                   

One android mobile or tablet.
ii)                  
And one PC with a software called jumpstart.



i)                    One android mobile or tablet :-
                                                                 

 This is use to get a WPS pin. You have to download an app called “WPS CONNECT” from the Google play store and run it. After that:-
             a)      Scan.
             b)      Select one of the network and press ok you will get a WPS pin of 8 digits.
             c)       Select first pin if that does work use second pin if also it doesn’t work use third pin.




ii)                   And one pc with a software called  jumpstart :-

                                              Download jumpstart http://en.softonic.com/s/jumpstart (remember that to run jumpstart you should have to install Microsoft dot net (http://www.microsoft.com/en-us/download/details.aspx?id=30653)in your system) and run it.
a)     


b)     




      c)       Enter the 8 digit pin From that android phone and click next.

d)  
                                

                        e) After little bit time you was connect to that Wi-Fi.

Note: - To know the password please subscribe me I will soon show you how to know that password

If you like these tutorials please share to everyone. We are learner how much we can share that much we can learn and also don’t forget to subscribe.

Remember these tutorial is for educational purpose only. don’t use this tutorial for unethical purpose.


Do it in your own risk I doesn’t have any responsibility if your father in law caught you.

Sunday, September 20, 2015

HOW TO MAKE YOUR PENDRIVE BOOTABLE.

                                                           HOW  TO MAKE YOUR PENDRIVE BOOTABLE.


This is a tutorial about  making a pendrive bootable .I will show you to make an pen drive bootable in few steps:-


1)Tool to make pen drive bootable is Rufus (you can download form this site :- http://rufus.akeo.ie/?locale).


     2)      After download run it
      

     3)      Insert your pen drive  and click on this portion.
               

    4)After  that select an ISO file from your computer  location. And press on start wait lil bit  after sometime you will get a pendrive booted.

        
Thank you and enjoy . 

Friday, September 18, 2015

HOW TO KNOW THAT I GOT VIRUS IN MY COMPUTER AND HOW TO REMOVE IT

Caught A Virus?

       This is a much more curiosity that "is   i got a virus in my computer how to know and remove the virus " Here is some tips to remove the virus or caught the virus form your computer.

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide 

23 BEST WAY TO MAKE YOUR WINDOWS FASTER THEN IT IS

                    23 BEST WAY TO MAKE YOUR WINDOWS FASTER THEN IT IS 

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows  handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows  NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows  loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

10 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.


1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be
s@3qwer1ya2. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., www.grisoft.com). And doublecheck your AV with the free, online-only scanners available at www.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

Tuesday, September 1, 2015

What Is CEH Certification

The CEH certification was created to offer a wide-ranging certification, in the sense that it’s intended to certify competence with many different makers/vendors.
                                                       This certification is designed for security officers, auditors, security professionals, site administrators, and anyone who deals with the security of the network infrastructure on a day-to-day basis. The goal of ethical hackers is to help organizations take preemptive measures against malicious attacks by attacking systems themselves, all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief by thinking like a thief. As technology advances organizations increasingly depend on technology, and information assets have evolved into critical components of survival. You need to pass only a single exam to become a CEH. But obtaining this certification doesn’t mean you can provide services to a company—this is just the first step. By obtaining your CEH certification, you’ll be able to obtain more experience, build on your interest in networks, and subsequently pursue more complex and in-depth network knowledge and certifications. For the latest exam pricing and updates to the registration procedures, call either Thomson Prometric at (866) 776-6387 or (800) 776-4276, or Pearson VUE at (877) 680-3926. You can also go to either www.2test.com or www.prometric.com (for Thomson Prometric) or www.vue.com (for Pearson VUE) for additional information or to register online. If you have further questions about the scope of the exams or related EC-Council programs, refer to the EC-Council website at www.eccouncil.org.

Monday, August 31, 2015

What is fifth generation computer ?

Hello friends! In an computer era the development or grow up in computer technology is growing so most quickly.The process of development of computer by an era to era is called generation of computer.Basically there are upto fifth generation in computer development.In the first to third generation of computer development the cost of the computer machine is so much expensive.In forth generation the microprocessor invent which is the main features of the sucess of forth generation computer. The invented micro system reduces the cost of computer.Nowadays we all human have atleast one computer in a single home.And then the new generation of computer system after forth is view as fifth generation of computer.In fifth generation the computer work in the basics of artificial intilligence for eg Robot, chess game etc.

i) First Generation of Computers

1) Technology used: Vacuum tube
2) Operating speed: Millisecond range
3) Programming language used: Machine language
4) Memory used
: Primary memory: Magnetic core memory
: Secondary memory: Magnetic drum, Magnetic tape.
5) I/O device:
Punched card as input device, printing device as output device.
6) Use: Simple mathematical calculation.
7) Computers were extremely large in size, and they required special cooling system. e.g.: ENIVAC, EDVAC, UNIVAC, etc.

ii) Second Generation of Computers:

     1) Technology used: Transistor
     2) Operation speed: Micro second range (10-6 sec)
     3) Programming language used: Assembly language
     4) Memory used
           : Primary memory: Magnetic core memory.
           : Secondary memory: Magnetic drum, Magnetic tape.
     5) I/O: Punched card as input device, Printer as output device
     6) Use: Computers were used for complex scientific calculations.
     7) The size, cost, power requirement, heat generation decreased compared to previous generation.
     8) Processing speed, storage capacity, use of the computer increased compared to previous generation.
E.g.: IBM 1620, IBM 7094, LEO MARK III, etc.

Advantages of transistor over vacuum tube:

   i) One transistor could replace one thousand vacuum tubes.
  ii) Size of a transistor is 1/200 th times of a vacuum tube.
 iii) The power requirement of a transistor is 1/20 th times of a vacuum tube.
 iv) Transistors are more reliable than vacuum tube.

iii) Third Generation of Computers

i) Technology used: IC (Integrated Circuit)
ii) Operating speed: Nanosecond range (10 -9 sec)
iii) Programming language used: HLL (High Level Language)
                            Like FORTAN, COBOL, PASCAL, C, C++, etc.
iv) Memory used:
           Primary memory: Semiconductor memory (silicon)
          Secondary memory: Magnetic tape, Magnetic disk like floppy disk, hard disk, etc)
v) I/O device: Keyboard as input device, monitor as output device.
vi) Use: Computers were used for managing population census, bank, insurance company, etc.
vii) Concept of database was developed and used.
viii) Size, cost, power requirement, heat generation decreased compared to previous generations.
ix) Processing speed, storage capacity, use of the computer increased compared to previous generations.
E.g.: IBM 360 series, ICL 900 series, Honeywell 200 series, etc.

IC and its types:

IC is a small silicon chip which contains large number of electronic components like transistor, resistor, capacitor, etc.
The process of creation of IC is called fabrication.
Types of IC on the basis of number of electronic components.
    i) SSI (Small Scale Integration)
           (1-20 components)
   ii) MSI (Medium Scale Integration)
           (21-100 components)
  iii) LSI (Large Scale Integration)
          (101-1000 components)
 iv) VLSI (Very Large Scale Integration)
          (1001-10000 components)
 v) ULSI ( Ultra Large Scale Integration)
          (More than 10000 components)

iv) Fourth Generation of Computers:

         1) Technology used:- VLSI (or Microprocessor)
         2) Operating speed:- Pico second range
         3) Programming language used: 4GL (Problem Oriented Language)
         4) Memory used:
                  Primary: Semi-conductor memory
                  Secondary: Magnetic tape, Magnetic Disk, Optical memory (CD/DVD/ Blu ray), Flash
                                    memory(pen drive, memory card)
        5) I/O device:
               Advanced I/O devices like mouse, touch screen, scanner, LCD, LED, color printer, etc are developed.
        6) Use:
               Computers are used for different task in different areas like education, business, hospital, transportation, military, etc.
7) Microcomputers like desktop PC, laptop, notebook, etc, are developed.
8) The popular communication media like internet, email, mobile communication, etc were developed.
9) Advanced, user friendly, web based software, etc are developed.
10) Size, cost, power requirement, heat generation decreased compared to previous generation.
11) Operating speed, storage capacity, use of the computer increased compared to previous generation.
E.g.: IBM desktop PC, HP laptop, Acer notebook, Mac book, etc.

vi) Fifth Generation of Computers:

1) Technology to be used:- Bio-chip
2) Operating speed:- Femto second range
(10 -15 second) / TIPS
3) Programming language to be used:- Natural language
4) The computers will have AI.
5) The computers will be used in complex calculation where intelligence of the computer is required.
6) The computers will have parallel processing in full fledge.
7) The computers will be based on KIPS (Knowledge based Information Processing System)

Different type of virus.

The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.