Computers and Internet

Tips to speed up your systems


Nothing frustrates users more than a sluggish system. To get things moving along, first check the obvious stuff, like what’s running at start-up.
Pare down the list of programs to the essentials that you need to launch.
Then make sure you are rebooting regularly (it’s amazing how many users will just run their machine nonstop for weeks). You can also try these simple tips to get things moving faster.

Defragment: Clean up the disk: Remove spyware/malware:

Computers and Internet

What’s using 25% of your company’s bandwidth?


Hint: It has nothing to do with business.
A quarter of the average company’s bandwidth is used up by various non-work-related applications, according to a recent report by security vendor Palo Alto Networks.
The findings are based on logs of customers’ networks conducted over a one-week period twice a year.
On average, nearly 25% of the companies’ bandwidth was being used for:
1.social networking
2.filesharing
3.personal e-mail, and
4.instant messaging (IM).
Experts recommend taking steps to block those uses of the corporate network, since they can cut down on the productivity of users who are trying to get work done.

Computers and Internet

Here some of the threats that most often go overlooked


Unauthorized smartphones IT departments go to great lengths to make sure all the computers and other devices connected to the corporate network are secure — but many allow users to connect to WiFi on their personal gadgets. That can cause problems if those smartphones are infected with malware, or intruders could gain access to the phones via Bluetooth and use them as a back door to get on to the network.

Computers and Internet

NTLDR is Missing.


Issue:NTLDR is Missing.
Related errors:
Below are the full error messages that may be seen when the computer is booting.
NTLDR is Missing
Press any key to restart
Boot: Couldn’t find NTLDR
Please insert another disk
NTLDR is missing
Press Ctrl Alt Del to Restart
Causes:

 1.Computer is booting from a non-bootable source.
2.Computer hard disk drive is not properly setup in BIOS.
3.Corrupt NTLDR and/or NTDETECT.COM file.
4.Misconfiguration with the boot.ini file.
5.Attempting to upgrade from a Windows 95, 98, or ME computer that is using FAT32.
6.New hard disk drive being added.
7.Corrupt boot sector / master boot record.
8.Seriously corrupted version of Windows 2000 or Windows XP.
9.Loose or Faulty IDE/EIDE hard disk drive cable.
10.Failing to enable USB keyboard support in the BIOS.

Computers and Internet

Computer Worm


A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program.

Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.

Computers and Internet

Spyware


Spyware is computer software that is installed surreptitiously on a personal computer to collect information about a user, their computer or browsing habits without the user’s informed consent.

While the term spyware suggests software that secretly monitors the user’s behavior, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information, such as Internet surfing habits, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, and redirecting Web browser activity.

Computers and Internet

Computer Virus


A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.
A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.