Friday, April 28, 2017

Rummy

Online Rummy is the 3rd most popular card game in the world.
Gin Rummy : a 52 card version of the standard game. For 2 players, 10 cards are dealt to each player.
Rummy : (Straight Rummy) a 52 card version of the standard game. For 2 players, 10 cards are dealt to each player.
Rummy [...]

Hoax Virus, Fake Email Offers

How Can I spot a hoax email or fake offer ?
Hoax Virus Alerts
There are a lot of viruses out there. But some aren’t really out there at all. Virus hoaxes are more than mere annoyances, as they may lead some users to routinely ignore all virus warning messages, leaving them vulnerable to a genuine, [...]

Protect your Computer

How Can I Prevent My Computer From Being Hacked?
Although no system is 100% safe from outside intruders you can minimize the risk. The best way to protect against hackers is to use a firewall program. As well as some self help.
Here are the steps I would advise following

Dont choose easy passwords such as your name [...]

Port Scanning

What is Port Scanning?
Port Scanning has been talked about a lot over the years in magazines on in the Internet most users know its something bad but little else on what it actually is and what it does.
What Are Ports?
Most people know that the back of there computer has ports, your plug your [...]

DoS Attack

content

What is a Trojan

What is a Trojan?
According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to get into the fortified city of Troy. In today’s computer world, a Trojan horse is defined as a “malicious, security-breaking program that is disguised as something benign” such as a screen saver, game.
Trojan horses [...]

Hackers and Crackers

What is a Hacker and Cracker?
This is an ongoing debate and really the answer depends on who you ask. In general terms, a hacker is an “enthusiastic programmer”, and likes to “perfect technologies”. A hacker is a very productive person. They are some of the main producers of freeware found online. The hacker usually [...]

Protect your Computer

How To Protect Your Computer From Virus
Nowadays it is crucial that your computer has an antivirus program on and is kept up-to-date this will help catch and contain the majority of viruses trying to infect your computer. Sometimes virus or malicious code can infect your machine due to a security hole found in your operating [...]

Worm Type Virus

What is a Worm Virus
A worm is a virus that uses open (insecure) computers or known security bugs to gain access to a machine. A worm is a self-replicating program like a virus. However, unlike a virus, a worm does not infect other programs.
Worms are generally embedded in programs or attachments to email messages. When [...]

Parasitic Virus

File Viruses
A file virus (also called Program Virus) is a type of virus which inserts itself into, or associates itself with a file. They only infect files that can be executed. This includes, but is not limited to: .EXE .COM and .DOT files. File viruses can be further divided into:

Parasitic Viruses
Overwriting Viruses
Companion Viruses [...]

Next Page »