Rodeo Blue Logo copyright (c) 2007 G Bloodsworth All Rights Reserved. Vans, Trailers, Removals, Holiday placements and 4x4 recovery, Courier and Driver Hire Vans,Trailers, Removals,Holiday placements and 4x4 recovery, Courier and Driver Hire Tara 4421

Thursday, 29 July 2021
Time:- 7:29 PM
Visits:- 244288 Online:-2
Quick Links RootKits hide things from your computer

Electronic Frontier Foundation
DuckDuckGo anonymous search
ABN check
WageLine replacement
Bureau Of Meterology
Glenn Gilson (0422) 783-304
GRC check your security
GRC Password Checker
Australian Constitution (PDF)

A CD whether or not its +/-R or RW is roughly 650 - 700 MegaBytes (Megs is slang).
A +/-R type CD is a Read only or Record once. RW type means Read/Write and can be erased and recorded many times. DVD has no Official name but Digitaly Vesitile Disk or Digital Video Disk have become synonymous.
A DVD of 4.7 is the norm in australia. it is this size because its is a Single sided Single layer.
There are other sizes (in storage capacity) in which the layers and sides differ.

A DVD or CD that has RW on it is a Read Write type. This means that it can be reused and recorded many times. those with +/- R are a Read only or record once. Once the information is stored it can not be removed.A MegaByte is Smaller than a GigaByte.
There is approximately 650 to 700 MegaBytes to a CD. A DVD has about 4.7 GigBytes. So, 700Meg x 6cd 's = 4.2Gig, which is well under the 4.7 Gig limit of the DVD.
If you were to use a smaller capacity, say 650Meg CD then you could get 7 cd 's onto a DVD of 4.7Gig.
Of course these are just rough figures for ease of calculation.An Uppercase 'B ' is a Byte.
There is really no convention,standard or hard rule, but it is generally accepted unofficially. A byte measure,(again only accepted not a standard) made up of 8 bits, due mainly to the history of micro computers. In the early days of microcomputing, a Byte has been anything from 4 to 12 bits.An Uppercase B is a Byte.
There is really no convention, standard or hard rule, but it is generally accepted unofficially. A byte is a measure,(again only accepted not a standard) made up of 8 bits, due mainly to the history of micro computers. In the early days of microcomputing, a Byte has been anything from 4 to 12 bits. A bit is One switch either ON or OFF.It is Generally accepted that 1 character is 1 byte, made up of 8 bits.
Because of the way a computer stores information in binary, 8bits or a Byte of information allows 256 possibilities.
Since there are other languages out there with special characters, numeric and both upper and lower cases, this is not really possible with todays computers, thou it is regarded as the standard unofficially.
For Convenience the Bytes or KiloBytes are rounded down to the nearest thousand.
People relate Kilo with one thousand, and since 1024 is the magic number for computing it is rounded to 1000, or 1kB.
ISP Marketing, takes full advantage of this, saying you get 1000 kB, instead of 1024 kB.For Convenience the Bytes or KiloBytes are rounded down to the nearest thousand.
People relate Kilo with one thousand, and since 1024 is the magic number for computing, it is rounded to a thousand, or 1MB. It 's true size would be 1024 KB, a little over 1MB.
MegaByte or MB (note the case) is Generally associated with hardware, ie. memmory or hard drives. Mb (again note the case) is Mega Bit which refers to transfer rates ie. uploading and downloading.For Convenience, KiloBytes, Mega Bytes, Giga Bytes and Terra Bytes are rounded down to the nearest thousand.
People relate Kilo with one thousand.
Since 1024 is the magic number in computing, for ease, it is rounded to a thousand, or 1GB. The true size would be 1024 kB or 1.24Gig.
GigaByte or GB (note the case) is Generally associated with hardware, ie. memory or hard drives. Gb (again note the case) is Giga Bit which refers to transfer rates ie. uploading and downloading.For Convenience the Mega Bytes, Giga Bytes and Terra Bytes are rounded down to the nearest thousand.
People relate Kilo with one thousand, and since 1024 is the magic number for computing, it is rounded to a thousand, or 1TB. It 's true size would be 1024 GB.
TerraByte or TB (note the case) is Generally associated with hardware, ie. hard drives. Tb (again note the case) is Terra Bit which refers to transfer rates ie. uploading and downloading. At the moment ie the year 2008 a hard drive is generally measured in how many Gig you have. Very soon it will be measured by how many Terra Bytes you have. (its a lot!)
they have already cracked the TB line in the sand, but is not the norm yet.M or MB (note the case) is accepted as Mega Bytes associated with hardware not to be confused with Mb (again note the case) is Mega Bits. This is more associated with transfer speeds. ie. uploading and downloading.G or GB (note the case) is accepted as Giga Bytes associated with hardware not to be confused with Gb (again note the case) is Giga Bits. This is more associated with transfer speeds. ie. uploading and downloading.TB (note the case) is accepted as Terra Bytes (TB) associated with hardware not to be confused with (Tb) (again note the case) is Terra Bits. This is more associated with transfer speeds. ie. uploading and downloading.Gig is slang in the computer world, for Giga Bytes (GB) associated with hardware. Its Easy to confuse with Gigabits (Gb) note the case? This is more associated with transfer speeds. ie. uploading and downloading.Internet explorer (IE) and Explorer are different.
One is used to look at the web and one is used internally to look at your computer.
Generally speaking you can still add a local address (c:/) instead of ( to the IE web browser and it seamlessly goes to explorer. If how ever you are using a third party browser you can still do this but the appearance is different.The Task bar is located at the bottom of the screen.
As its name suggests, it contains any task or thing you are doing. Generally you would use the items in the center of the bar, or the Start button to the left of it.
These center items contain programs or applications currently running. For Example if your surfing the web and using the built in calulator, then you would have 2 items in the center, calcutator and the Browser page you use to surf the net.

Click here too seeA Browser is generally a program or application that displays content.
This Content could be a web page, Games, music, text and even video. Some times called a Web Browser, because its used mainly to surf the Word Wide Web or net.
There are many types of Browsers, but their function is basicly the same, and the type you use is a personal one.
Some Well known ones are:-
Mozilla, Internet Explorer, (comes with Microsoft windows) Opera and Netscape.The "Start " Button is located on the "Task Bar ". By default the Task bar is located at the bottom of the screen. On the task bar to the left <- (that way) is the Start Button.

Click here to seeThe Quick launch icons (if enabled) are to the right (-> that way) of the Start Button, but the left (<- that way) of the task bar applications, like web pages and calculator programs running.
It is used, and often mentioned with installing new programs or Applications and is handy for running those programs quickly.
Mine looks like this, thou the layout is the same as yours, yours will be different. .

Click here to see
RAM or RANDOM ACCESS MEMORY is what the computer uses to store its thoughts, so it can work things out.
This is often confused with the HDD or Hard Disk Drive. When the power goes from the computer or is turned off, it forgets everything. Thats is where the HDD comes in to store what it needs to.A HDD is short for Hard Disk Drive.
Often confused with RAM or Random Access Memory. The HDD in your Computer is used to store information and is a mechanical device. This information is everything the computer needs to remember when the power goes out or the computer is turned off.
A computer uses it, a bit like a notepad you write things on to remind yourself when you go shopping.An ISP is service from a body like Westnet, Optus, IInet, Dodo, Netspace, AAPT or Telstra, that allows your computer to talk to other computers.

They are essentially the middle man.
They can usually provide an email address and homepage with your connection for the Web.
You may require a phone line for some services like "Dial up" and "*DSL".
Some services require special equipment like a satellite dish or a special cable to be installed,or both.Out of all those wires for your stereo / TV / AV.....
The Red one is probably for the Right channel, the White (or may be black) is for the Left channel, and the Yellow one in the case of TVs and DVD players, is for the Video signal. Hope that cleared things up!

The Ones pictured here are called RCA plugs and are associated with A/V equipment.

RCA plugs of different colors Red(right) White(left) black(left) Yellow(Video)Most viruses make your computer sick.
I say Most because some viruses are actually quite funny although annoying. A virus in its true form is a program that acts like a human virus.
It needs to invade to replicate and spread, and in most cases hide and cause damage.
When you get a cold you get warning signs like coughs or sneezing before you notice or feel anything wrong. This is called an incubation peroid.

A computer virus will generally not alarm you till it has spread or caused damage. There are some bad ones out there that cause hardware failures, wipe or corrupt information on the computer. Fortunately the hardware manufacturers put in safe guards that reduce hardware damage. Other funny ones just send emails to every one in your contacts and hence replicate on their computers.

Viruses can spread through emails CDs DVDs, Flash drives or any media that connect to the computer.A firewall is basicly just a security guard for your computer.
Simillar to the guards you find at the shopping centers. Some are very diligent and worth while and others are just there.

Provided you dont make a nuisance of yourself or bring attention about, the Security guard will leave you alone, just as the firewall will allow the comings and goings on the net or network.

Get to know your firewall!
The more familar you are with it and what it does the better instructions you can give your security.
Some firewalls become over zelous with security but these ones, are most likely the learning type and will ask less questions as time goes on. Because they learn your habbits and what is allowed.Trojans are called Trojans because of a story, where the Greeks constructed a huge wooden horse with men hidden inside and offered as a gift horse to the city of Troy.

Trojans are a program hidden inside another program that appears to be useful or free. I am not saying Free programs are bad!
Just like the story, Once inside (installed on the computer with your permission!) it is generally allowed to do what it likes because you have allowed the firewall, to allow it to do as it pleases, thinking its just the program you installed.
consequently you dont notice the damage being done till its too late.

A Virus will attach its self to another program and hide from detection and security where a trojan is generally inserted into another program and allowed to do so by the operator.
Trojans are usually responsible for opening the back doors and windows to the computer for other people and or programs to come and go while you use it.

They can also turn your computer into a Zombie. Yes a zombie. A zombie computer is used to attack other computers and or web sites so the attackers remain anonymous and your computer gets the blame. When many computers are infected a DOS (Denial Of Service) attack is an efficient way to stop websites.MP3 is a compression format used on sound files.
But like the hoover vacuum cleaner (vacuuming or hovering), or bluetooth( the ear piece ), its become synonomous with sound or sound players. Music or audio compressed with this format becomes alot smaller, but still maintains enough of the sound quality that most people wont know the difference.
A good idea of the compression is this...
The average Commercial CD you would buy in Record store (old school I know), will hold about 15-20 full songs about 3 mins long with excellent audio quality.
The same size CD with MP3 compressed sound and audio...... Wait for it!....
Will hold over or close to 180 songs!

If you decide to compress your own, a nice mix of audio quality and compression is about 128Kb/s or 128 Kilo Bits per second. The higher the number the better the quality but the less compression you will have. ( less songs on the CD or DVD )

PS.NOTE it was pointed out to me the other day that a person got 490 songs onto a CD this is probably possible but I know from experience the limit is around 180, without loosing all the quality. But to those who pointed it out, or anyone willing, please give it a go. you will be surprised.MPG or MPEG-x is a Video and audio compression, often confused with MP3 which is a sound compression only.
MPEG-1, MPEG-2, MPEG-3, MPEG-4 are incrementally better with each number attached. MPEG-4 being close to Blue Ray Quality, where MPEG-1 and MPEG-2, were normal for the web. There are letters in place of the numbers but that just gets confusing so I wont go into it here.
With todays Computer technology, the slowest thing in them is the Hard Drive.
This is because it's a mechanical device. It won't be long before the mechanical parts are removed.

To Defrag or Defragment a hard drive (HD) means to putting all the files back together. "How do they come apart"? I hear you say. Well, since a HD is so slow and its the only place information is not lost easily, files are saved and deleted all the time, leaving holes where files used to be.

Picture a file as numbered bricks.
Now picture the drive as a large wall, and you are the computer infront of that wall.
The computer tries to get that information,(down on paper so to speak) into the drive as soon as possible and if deleting, remove that information quick before more information comes.

Remember how you are infront of the wall? The numbered bricks you want are (murphy said it) at the other end. This means, there are holes where bricks (files) used to be and sometimes the bricks dont fit where you are. So the computer breaks the file apart into bricks and stacks them in any hole it finds close.

After time the computer needs to find the bricks (files) that go together, now spread far and wide. This takes time, slowing your computer down. Its like finding your clothes in the washing machine when you wanted them in your draws or cupboard.
ITS SO SLOW! so defrag your drive often to speed things up.BlueTooth is a language believe it or not! A Wireless protocol for electronic equipment to talk to each other.
Ever heard your grand parents or said yourself, "Hoover the floor" and its an electrolux vaccum cleaner?
Well thats what has become of Bluetooth. The marketing gurus have done it again, added more confusion to an already confused... anyway, bluetooth has become synonomous with the head set on your ears for hearing the phone, computer and PDA etc...
Glenn Gilson, Glenn Bloodsworth, Larna Frank, George Tarna, George Dipsinarcus or Sarah Cocksatot

"The brain is a computer, that creates a program, called mind." - UnknownIP or Internet Protocol is a digital address for your computer, and looks like this:-
There are 2 distinct types of IP, Dynamic and Static. Static mean the IP Address never changes. A Dynamic one changes all the time, sometimes at a set time of day or when you reboot your computer and or modem (depending on ISP connection).

Alot of information can be obtained from your IP. When your surfing, you leave a digital trail, a bit like wet muddy shoes in the house. From those footprints a description of the user can be created if needed.
Current (2008) IP addresses are made up of 4 numbers separated by a decimal point. There is about to be an addition to this to allow more addresses (sshhh we are running out!). Anyway, these numbers are arranged in such away that the address can be separated into countries and locations with the use of databases. So a web designer or ISP or Government can block / scan (take interest in) part or all people and or countries using the net.Browser Hijacking can turn your computer into a Zombie.
Things to watch for are changes in your favourites and desktop that you did not do, slow computer, lots of popups, can't surf the net or get to security, antivirus and anti trojan sites.

Zombie computers are computers that are controled by other people or sites.

This slows down your computer because its surfing other sites without your knowledge or redirecting you to other sites before the one you wanted, hence the "Browser is hijacked".

Personaly I recommend people to turn off pop up blockers whether built into the operating system, browser, or third party software. If your computer is not infected, then when you go to a site and you get popups, there's a good chance its a bad site and you will know before damage is done (most of the time) and not return.

Having said that, visiting the same site with your blocker on, the damage can still be done.

If you start getting popups on sites you know are ok, Like then its a good posibility that a site you have visited or software you installed recently is the culprit.

Please note that I have recently found 2 common anti virus software programs, (big companies, can't mention names) where there is an expiry date and further charges, Act like a virus and browser hijacker, after the software had expired.

There was no damage done but it was very annoying for both myself and the customer. It took 2 days, many phone calls and trolling through the internet to solve.
The Problem was that these type of programs, have full security clearance in and on the computer, so looking at it as a security risk was not an option.It was pointed out that for a Quick Info link, this is a little long. so first the short version.

Just like the hotel concierge, Web filters are expected to achieve the impossible and do their darndest to do / get what you want. The best Web filter is you, and if you are a minor then your parents or guardian.

Web filters are generally used to censor the users web browser, and is aimed at children so parents can feel at ease * Please read on below the short version *
There are many different types of web filter so here are a few.
Net Nanny
Cyber Sitter
SurfWatch *I have used this one as a web designer*
Web Sense

The long version

I have a bright 14yo daughter, and she now teaches me about computers. When she first showed interest, at the age of 3, my wife and I, needed to come up with some ground rules, that changed gradually as she got older but still rigid enough that she would not stray or get into trouble. They have worked well so...

My familys personal Computer rules are:-
  • The computers are mine. I can take it off you anytime for any reason

  • If there is a reason, you can make an argument to over rule it. (this is important for trust reasons)

  • Emails, message chats and passwords are open for scrutiny at any time.

  • If the trust is broken, a deeper look into WHAT you have been doing on the computer, will discover more and could result in a total ban

  • Under no circumstances, will you use your real name or upload a photo of yourself or friends

  • If there is a form to fill in I want to see it first and why is it needed. There are few reasons until around the age of 12-13 that a form is needed. this is usually a chat page of sorts for their social networking

  • If you get popups I want to know, Dont click on anything and remember that site as being bad. Many bad sites will have a picture, that looks like a warning message from your computer, usually along the lines of you have a Virus or Trojan click to fix.

    If your not sure put the mouse over the top and if any words or letters come up in the bottom left of your browser, it is a link.
    DONT CLICK use ALT + F4 this will close the open browser

  • This one will save your proverbial. The bottom left of the browser has text when loading or your mouse is over a link.

    Any moving (moving left or right scrolling) or permanent text in the bottom left of the browser when your mouse is moving, is a good sign of a bad site and I want to know!

  • NO and I mean NO toolbars Google or otherwise. Learn to use the computer instead. Anything a toolbar can do your computer already does

  • The Web is a big place and because of its dynamic nature is changing all the time. So Quite literally, what you find now, in 2 minutes could be somewhere else under a different name in a different country. The commonality is the code (universal for the web) or the words (changes with locality). This is a little ambiguous so bear with me.

    Web Filtering is the process in which the net is filtered.

    This filtering can be anything from Virus and Trojan detection on a site, stopping a particular protocol being used between computers, to stopping sites you or your children find offensive. But what is offensive? Well DER! I hear you say...

    In some countries, it is offensive to show your face, others its politics and or religion, some its sex, drugs, and Rock n Roll or even to hold a photo of someone that has died.

    With the net being World Wide and local at the same time, the line is blurred. So as you can see its not quite as easy to define as first thought.

    Web Censoring

    Sometimes web filtering is synonymous with censoring.
    The approach used most commonly is either URL, (address put into the web address bar) word scan or sometimes a hybrid of the two.

    Everyone knows that the Chinese are up there with technology. So if the net was able to be filtered, why do they have hundreds of people censoring the net, on top of the automated "web filters"? The answer simply is, it can not be done at this time.

    Until AI ( Artificial Intelligence ) can understand context, in all languages, dialects, and slang at a speed to handle the vast (and I do mean vast) amount of information, without slowing it to painful level, is impossible in the foreseeable future. This is the nature of the beast called WWW, World Wide Web, Dub Dub Dub or however you do it.

    Ok back to filtering. These Software Filters are good at their job, that does not mean they are good. They work best locally where they can be modified or changed, but one size cant fit all. more about this further on.

    Many people buy these to stop popups of offensive material and to stop offensive emails. If your computer is getting popups then your computer is either infected with something or your visiting the wrong sites.

    Reputable Web sites wont make popups, without your consent. So steer clear. If you are getting offensive emails, it is because you have filled out a form that has a tick in accept emails bla bla bla, or allowed them to be sent to you, when installing toolbars or software. DONT BE BULLIED into agreements.

    Ok back to the one size cant fit all.
    Remember I said filters work on URLs and or Words? well this is where common sense takes hold, Especially for kids. Context is a funny thing, here I am only talking about written words but verbal is similar. Context can change from the punctuation, a simple example:-

    Lets eat Dad
    Lets eat, Dad
    The first could be considered cannibalism, where as the second is a statement. Only humans can see the context and whether its a typo based on surrounding text, computers see the characters. So a computer can not see there could be offensive / graphic material within.

    Word and URL filtering example:-
    My Teacher gave me an assignment on the English channel, in England due tomorrow after that we have a choice on Womans liberation, The effect of drugs, The war on terrorism and handicap aids.
    This is an assumption that it was received in an email or message program the filter looks at (most do) and the child may or may not search online for it.

    The above email / message / search would depending on the software, be blocked for these reasons:-
    If searched, English channel has a town called Sussex and Wessex. Both contain the word "SEX" so not all the information would be available.

    If searched, Womens liberation would have "Sex" in there somewhere and again blocked based on the word
    If searched, The War on terrorism, the effects of drugs and health aids would contain the words "Bomb", "Violence", "Sex or sexually", "Drugs" and "Aids"

    The email would be blocked only based on the word "Terrorism" and the same for the effect of "drugs" and Handicaped "Aids" On the other hand it may not cope with "S E X" because its spaced out.

    As for the URL Part, take note of the goble de gook in the address bar. It all means something. If the Words in the URL, intentionally or not, make a banned word the site will be blocked. Having said this the URL method is generally used to block known websites.

    So as you can see, the filters do a very good job, but like I said before the Web is Dynamic and changes all the time, along with language.
    With the amount of information available, there are only so many things software and people can keep up with. Use your mind and educate yourself.
    Filters miss the context, because of strick inflexible rules and could result in misinformation for older children. There are many pros and cons but in the end you are the best filter and the first educator.Your Favourites (we live in australia so its Australian spelling here) is where you can put your favourite web site to go back to at a later date.

    Ever been to a site that has ADD THIS SITE TO YOUR FAVORITES or bookmark this site?
    This is because many people dont realise you can do it with 2 clicks.
    At the top of the browser there are headings that say something like this:-
    Browser Browser Heading

    By clicking Favorites or Bookmark (depending on browser you use) there will be a label saying ADD or something to that effect, so you can add the website your Visiting. Alternatively you can use it to go back to the same site.

    Why not click the ADD to bookmark links on the site I'm at? Well its more a bad habit than a bad thing. Besides adding links to your desktop is just plain messy. Remember, that for a bookmark or favorite to be added, requires a script that puts things onto your computer. These scripts may not just add the bookmark.In Australia 000 or tripple zero is the emergency number. America uses 911. Ireland's is 999, and so is the British Isles and Hong Kong.

    So how do you remember which number to use if your out and about, as it seems each place has its own emergency number?
    Well believe it or not, alot of people travel but most of these people have a mobile phone, so a standard for the mobile phones arose, 112. A UPS pronounced as its spelt U.P.S is an Uninterupted Power Supply.

    There are many sizes available, from the size of a Weet-Bix box to a small hatch back. The size will depend on how many modems, routers, monitors, printers and computers connected.

    Its basicly a battery in a box with an inverter to keep what ever is plugged into it running when the power or mains drops, surges or browns out, long enough to shut it all down.

    An inverter converts battery or DC power to AC (mains). The UPS will plug into your power point like a Power board.

    NOTE: in Australia the Mains voltage is 230v AC but accepted as 240v AC. This probably an obvious statement but is really for those of you DIY guys. Reason being that there should be a switch that selects from 120v AC to 230V AC or 240V AC. If not then be sure it is, or set to, a 240V system... or .... POOF!

    Armed with that information your computer Tech can decide for you or if your a DIY type person look on the box. Many have a rough guide.

    Its better to have a UPS thats over size or higher rated than your needs, to future proof and allow longer life when it gets older and worn out. Some may also have connections for network cables and phone lines. GPS stands for Global Positioning System, sometimes called Global Position satellite. The Latter is wrong but accepted amongst the public.

    There are a total of 24 satellites around the world and are used like artificial stars, similar to the old shipping days of sextons for navigation with the moon and stars. At most there are 12 satellites above the other 12 are on the other side of the earth and all are in a fixed position.

    GPS was originally developed for the military and later developed for commerce and then the public.

    Interesting and unintentional developments have been discovered with the GPS.
    The original system was a mapping arrangement to know where on the map you are, the altitude and if a compared history was used the direction of travel.

    One interesting thing was found, if 2 aerials were used, the direction was clearer and when used on a plane the pitch, altitude and yaw can be detected.

    It is also used for earthquake detection by monitoring the movements of tectonic plates.For those that know better ;) this information is for people that want English not techish.
    If you think the information is not accurate enough or want more information, please feel free to Google or search for more information. I wont be offended.

    Digital TV is better than Analog for many reasons, but there are a few disappointments.

    In the old days of analog TV, if you had a bad picture or poor reception, replacing the aerial was expensive so a cheaper effective way was an amplifier or MASTHEAD. This was used to BOOST the signal resulting in a clearer less snowy picture.

    This does not work for digital.

    The reason is that its the quality of the signal ( the amount of information NOT missing) not the strength of the signal that is needed. Unfortunately the only way to get a better picture is to get the best aerial you can for your money to improve the quality signal.

    If you try to amplify a poor quality signal, all you do is get a bigger poor quality signal, the information needed is still missing, so nothing changes except your Digital Set Top Box or digital TV may warn you about an over boosted input or aerial signal. Google it, if you want more technical information.

    Anyway, the beauty of Digital is it can still be seen with a poor signal if the quality signal is there. When there is no quality in the signal, the aerial part comes in and the cash for someone to tune the aerial for the best results.

    If there is low cloud cover or a storm near by, (usually with lightning) and or there is poor signal quality, you may loose the picture, frozen screen, get blocks on the screen, or even pops and clicks in the sound. Analog just went snowy and ghosted but you always had the sound and maybe lost the colour.

    The Analog system in Australia is based around the PAL system. This basically means there are 625 lines on the screen for a picture and is refreshed (new picture) 25 times a second. America uses the NTSC system which has a few less lines (525) but a faster refresh rate of 30 frames per second. France used SECAM. Similar to PAL thou the colours are displayed differently.

    Digital Increases the number of lines (actually dots in this case) and the sound quality. Many people that have Digital Set Top Boxes dont appreciate the full picture and sound because they are still using a screen that displays less than what is available.

    Intimacy with your computer is key!
    I have been looking for an example of Personal Antivirus (BAD BAD THING) to show the processes used, to fool for those of you that have not yet been caught out.

    First I would like, in a weird geeky kind of way (in no way do I condone the practice!) like to congratulate the web designer that created the Personal Antivirus page. Very convincing, you almost got me, and have done, with alot of my clients that are experienced computer people.

    Personal Antivirus is Malware, also know as Paranoia ware.
    Its aimed at tricking you into thinking your computer has detected adware, virus or trojans by showing you an alarm like this or pictured below.
    Like many other Viruses, Trojans, Worms etc are intentionally installed accidentaly, through the clever creation of programs or web sites.

    Click the pictures below to see an enlarged view
    Personal Antivirus Scam part1
    The innocent link on google was clicked and an Alarm is shown!

    Personal Antivirus Scam part1
    Then the computer appears to be scanning... but NOTE THE URL?( address bar at the top )
    The picture above has a different link to the one you first clicked, and not even on your computer!.
    Also it looks different to the one on my computer (intimacy is key) click here to see the difference
    The drives are all flashing in big bold red letters Warning! Will Robinson, Warning danger danger

    Personal Antivirus Scam part1
    After the dummy scan, you get another warning!
    By this time most users are panicing

    Personal Antivirus Scam part1
    Then if you try to close that one you get a more vivid alarm.
    Users have usually given in by this point.

    Personal Antivirus Scam part1
    Then if you try to close it, your told there is still, more to do your still, at risk

    Personal Antivirus Scam part1
    If you try to close that one, then you get another warning only this time is shows you the download to install.

    So as you can see at any point the download is available whether you accept or decline and the warnings alone are enough to force people to click on something that will allow a download.

    So be intimate with your computer and know what is normal for YOUR computer so you see the warning signs before it gets you into trouble.
    Root kits, Sounds rude doesnt it?

    Well it actually originated from the Unix system.
    Root, in Unix and Linux systems is what Microsoft systems call Administrator. Think of the internal command structure like the army ranks.

    So if your logged in as root, or in MS systems, Administrator, it means your at the top of the control chain inside the computer and can make some very big changes to how the computer works.

    Back to the Root kits, they can be good or bad depending on how they are used. and can be inserted by a hacker (usually to make a zombie),in a Trojan or other program good or bad.

    Rootkits can be a program or programs and are designed to intercept internal computer requests, similar to the old school viruses.
    These intercepted calls can do, or change something, without the computer knowing the program is there. This sounds very strange I know but it is possible.
    Originally they were used to fix systems that were not working properly.

    Some anti virus, CD software, Ripping software and system repair programs use these Rootkits and is done so for good?.
    For Example:- A virus is telling the computer to DESTROY.
    In between the Virus and the Computer is an anti virus program hidden.
    It intercepts the viruses call to the computer "Destroy that file" and changes it to "ignore that file and Destroy the file that told you to destroy it".
    Get the idea?

    Recently there has been an increase in Root Kits. These are more evil, but work the same way, and are found in malware.
    These usually hide some or portions of itself and intercept the programs being run, to see if its an anti virus program and disables it before it can find the Rootkit.
    There are anti root kits available which will figure out what is good and bad, AVG has a good one and its free.
    Quick Info
    8 bits = 1 Byte
    1024 Gig = 1 Terra Byte
    TB = Terra Byte
    Browser displays content
    Viruses are not Trojans
    Firewalls are Security Guards
    Trojans are programs that hide in other Programs
    Defrag is defragmenting your Hard Drive
    RootKits hide things from your computer
    MPG or MPEG is a Video format
    UPS is backup power till you shut down
    GPS is Global Positioning System
    Smart Phone QR code or Quick Response Code for
    RodeoBlue QR Code
    for Smartphones