July 29, 2013

# 5 COMPUTER STORAGE

SOLID STATE DRIVES




Solid state storage devices store computer data on non-volatile "flash" memory chips rather than by changing the surface properties of a magnetic or optical spinning disk. With no moving parts solid state drives (SSDs) -- are also very much the future for almost all forms of computer storage.
Sometime in the second half of this decade, solid state drives are likely to replace spinning hard disks in most computers, with several manufacturers now offering hard-disk-replacement SSDs. These are often very fast indeed, extremely robust and use very little power. As pictured above, typically today most hard disk replacement SSDs are the same size -- and hence a direct replacement for -- a 2.5" hard drive. They also usually connect via a SATA interface.
Unfortunately the prices of solid state drives are currently high, with the lowest capacity disks . At present SSDs are therefore generally only being used in high-end PCs and laptops, and as a means of increasing robustness, reducing noise, decreasing power consumption, and often significantly decreasing boot-up times.
As a notable exception, for a couple of years some ultramobile "netbook" computers and some low-power desktop computers -- such as the Asus Eee PC -- used an SSD rather than a traditional hard drive, and which was made cost-effective by limiting disk sizes to around 4-8GB. Sadly, on netbooks this trend has now died out. However, the new Google Chromebooks are SSD-based.

# 4 COMPUTER STORAGE

EXTERNAL HARD DISKS / DIRECT ATTACHED STORAGE (DAS)



A hard drive is a computer component that holds data. Every computer needs at least one hard drive to store its operating system, programs and user information. This drive usually is internal, or built into the computer, but as computer systems have evolved and different needs, threats and circumstances have arisen, external hard drives have become more popular. External hard drives usually are used in addition to internal hard drives in order to store more data. They also allow the user to put sensitive, confidential or otherwise important information on them, then disconnect them and store them in secure locations.

Physical Characteristics
An external hard drive sits outside the main computer tower in its own enclosure. This portable encasement is slightly larger than the hard drive itself, and it sometimes contains a cooling fan. The external hard drive is connected to the computer via an interface cable, which allows the external hard drive to communicate with the computer so that data can be passed back and forth.

Why It is Needed
Internet access regularly exposes computers to potential security threats such as Trojan horses, viruses and spyware. It has become increasingly difficult to guard against these threats, even when employing firewalls and antivirus programs. Aside from online threats, multiple family members often use the same system, putting sensitive documents at higher risk of inadvertent corruption or loss. Additionally, the space required for multimedia storage has soared, with digital media files often taking up large amounts of space on a user's hard drive. All of these concerns can be addressed with an external hard drive.

Advantages
A portable or external hard drive allows the user to back up or store important information separate from the main internal hard drive, which could become compromised, damaged or corrupted. Sensitive documents, large music files, movies, images and other backup files can be kept securely and safely on an external hard drive. Another advantage of an external hard drive is that it is portable and operates on a plug-and-play basis so that other compatible computers can recognize the drive as a storage device and can be used to access the files. A user can easily transfer files from the computer to the portable hard drive or from the portable drive to the computer, or programs can be run directly from the portable hard drive.

source : wisegeek

July 14, 2013

#3 Computer Storage

RAID


On servers and high-end PC workstations (such as those used for high-end video editing), at least two hard disks are often linked together using a technology called RAID. This stands for "redundant array of independent disks" (or sometimes "redundant array of inexpensive drives"), and stores the data in each user volume on multiple physical drives.


Many possible RAID configurations are available. The first is called "RAID 0". This divides or "strips" the data in a storage volume across two or more disks, with half of each file written to one disk, and half to another. This improves overall read/write performance without sacrificing capacity. So, for example (as shown above), two 1TB drives may be linked to form a 2TB array. Because this virtual volume is faster than either of its component disks, RAID 0 is common used on video editing workstations.

In contrast to RAID 0, "RAID 1" is primarily intended to protect data against hardware failure. Here data is duplicated or "mirrored" across two or more disks. The data redundancy so created means that if one physical drive fails there is still a complete copy of its contents on another drive. However, this does mean that drive capacity is sacrificed. For example (as shown above), a 1TB RAID 1 volume requires two 1TB disks. While data write performance is not improved by using RAID 1, data read times are increased as multiple files can be accessed simultaneously from different physical drives.


If more than two drives are used, several other configurations become possible. For example, using three of more drives, "RAID 5" strikes a balance between speed and redundancy by stripping data across two drives but also writing "parity" data to a third. Parity data maintains a record of the differences between the blocks of data on the other drives, in turn permitting file restoration in the event of a drive failure. Many modern personal computer motherboards permit two SATA hard disk drives to set up in a RAID configuration. However, for users who do not require the extra speed provided by RAID 0, RAID 5 or RAID 10, there are relatively few benefits to be gained. Not least, it needs to be remembered that any hardware setup featuring more than one internal hard disk -- whether or not in a RAID configuration -- at best provides marginal improvements in data security and integrity. This is simply because it provides no more tolerance to the theft of the base unit, nor to power surges or computer power supply failures (which can simply fry two or more hard drives at once rather than one).
(more will be revealed in this video)

#2 Computer Storage

 Hard Disk Storage






Spinning hard disk (HD) drives are today the most common means of high capacity computer storage, with most desktop and laptop computers still relying on a spinning hard disk to store their operating system, applications programs and at least some user data. Traditional, spinning hard disk drives consist of one or more disk "platters" stacked one above the other, and coated in a magnetic media that is written to and read by the drive heads. As discussed in the hardware section, hard disk drives can transfer data directly to other computer hardware via a range of three interface types (SATA, IDE/UDMA, or SCSI) and come in a range of speeds from 4200 to 15000 revolutions per minute (RPM).

Hard disks are almost always manufactured with either 3.5" of 2.5" platters (although just to break the rule a few smaller -- most notably 1.8" -- and even some larger platter disks are made by some manufacturers). For many years 3.5" hard disks have been standard for desktop computers and servers, and 2.5" hard disks for laptops. Yet this is now starting to change, with enterprise class 2.5" hard disks now increasingly being used in servers and some desktop computers due to their low power requirements. Indeed, the fact that Western Digital's top-of-the-range Velociraptor hard drives now use a 2.5" rather than a 3.5" mechanism speaks volumes and probably indicates that within a few years most spinning hard disk drives are likely to be 2.5". (Note that some raptor models are supplied in a metal "sled" for fitting into a 3.5" bay)




Whilst at least one hard disk is usually required inside a computer as the "system disk", additional hard disk drives can be located either "internally" inside the main computer case, or connected "externally" as an independent hardware unit. A second internal hard disk is highly recommended where a user regularly works on very large media files (typically digital video files) that are always accessed directly off the hard disk, rather than loaded into RAM. Where such files are loaded off a computer's system disk, the disk drive heads are inevitably constantly nipping back and forth between accessing the large media file and writing temporary operating system files, and this both degrades performance and reduces the life of the disk.

#1 Computer Storage


Computer storage is measured in bytes, kilobytes (KB), megabytes (MB), gigabytes (GB) and increasingly terabytes (TB). One byte is one character of information, and is comprised of eight bits (or eight digital 1's or 0's). Technically a kilobyte is 1024 bytes, a megabyte 1024 kilobytes, a gigabyte 1024 megabytes, and a terabyte 1024 gigabytes. This said, whilst this remains true when it comes to a computer's internal RAM and solid state storage devices (like USB memory sticks and flash memory cards), measures of hard disk capacity often take 1MB to be 1,000,000 bytes (not 1,024,768 bytes) and so on. This means that the storage capacity of two devices labelled as the same size can be different, and which remains an ongoing source of debate within the computer industry.
 Any sensible computer user will plan for two categories of storage. These will comprise the storage necessary to keep files internally on their computer, as well as those media required to back-up, transfer and archive data (as also explored in the security section). In turn, when deciding on suitable external storage devices, the key questions to be asked should be how much data actually needs to be stored, and whether the external data archive will be subject to random-access or incremental change.

Storage Capacity And Requirements:
If a computer user is usually only going to create word processor documents and spreadsheets, then most of their files will probably be in the order of a few hundred KB or maybe occasionally a few MB in size. If, however, a computer is being used to store and manipulate digital photographs, then average file sizes will be in the region of several MB in size (and potentially tens of MB if professional digital photography is being conducted). Yet another level of storage higher, if a computer is being used to edit and store video, individual file sizes will probably be measured in hundreds of MB or even a few GB. For example, an hour of DV format video footage consumes about 12GB of storage. Non-compressed video requires even more space -- for example 2GB for every minute of standard definition footage, and 9.38GB for each minute of non-compressed 1920x1080 high definition video. Knowing what a computer is going to be used for (and of course many computers are used for a variety of purposes) is hence very important when planning storage requirements.

In addition to capacity requirements, whether the data in a user's back-up archive will have to change in a random-access or incremental fashion can be a critical factor in the choice of external storage devices. A digital photographer, for example, will probably have incremental back-up requirements where each time they complete a shoot they will want to take a back-up of several hundred MB or a few GB of photographs that will subsequently never change. In other words they will want to keep a permanent record of an historical digital state of the world. Writing data like photographs to write-once media (such as CD-R or DVD-R as discussed below) would hence be perfectly acceptable. The photographer's total archive may be hundreds of GB in size, but would only be added to incrementally with previously stored data never being changed.

In contrast, somebody producing 3D computer animation may be re-rendering tens of GB of output on a regular basis to replace previous files in a random-access fashion. In this situation not only would re-writable media be more suitable, but the speed of the back-up device would become far more critical. Having to take a copy of even 50GB of data at the end of a working day is a very different proposition to a few GB, let alone a few tens or hundreds of MB. Further discussion of the suitability of different media for incremental and random-access back-up continues within the following explanation of available storage devices and technologies.

July 08, 2013

What to Look for


source: itsagadget

Antivirus software products block malware from entering your computer system. When security software is unsuccessful at preventing attacks, it is then supposed to detect and remove the malware that gets through the defenses. If you begin to analyze all of the forms of malware and all of the potential entry points, it quickly becomes quite complicated and confusing. You can reduce the complexity of shopping for virus protection by asking a few key questions. How does the antivirus software perform in third-party tests? What features does it have that pertain to my needs? Does it provide support during the times I will need it?

To get some answers, let's discuss these questions one by one.

Performance
The best way to verify vendor claims about performance is to learn how products perform in tests at independent labs. One of the best antivirus researchers is AV-Test, with laboratories in Germany. AV-Test has a lot of credibility within the industry. AV-Test's labs have two dozen servers connected to 280 workstations, where its technicians simulate test environments and perform analysis. They have more than 50 million pieces of malicious test data. Each day, the collection grows by 55,000 new items of malware. The AV-Test suite of tests measures security software's protection, repair and usability components. AV-Test results are the objective criteria we consider when we rank the best antivirus software.

Features
You can usually count on antivirus software to be easy to install and use. You should be able to schedule scans so that they occur when you do not need to use the computer to avoid slowdowns from the software's resource usage requirements. Antivirus software ought to protect you against malware infiltration whether it attempts to reach your computer via web browsing, email, instant messaging or removable storage devices. No security software is perfect, so when a threat successfully accesses your computer, your antivirus software has a second chance to protect you by detecting and disabling the invader.

Help & Support

When you examine help and support, ask yourself whether you will need 24/7 access to technical support or whether you can make do with fewer hours. Some vendors provide support by email. If you want telephone support, use our reviews to learn whether the vendor offers it before you buy.

source: toptenreviews

Combat with Viruses !

source: blogalaxia


Keep the Operating System Updated

The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.

Use a Firewall

You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in outgoing e-mails and see this as regular network traffic.
For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

Know More !

credit to : here
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. 

What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

What Are Blended Threats?
Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.

source : webopedia

Types Of Viruses





Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.

Trojan Horse:
A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worms:
A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.

Logic Bombs/Time Bombs:

These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.


credit to: 
source: click here
pic : here

Virus Attack!


What Is a Virus?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
kindly click here for more information ;)

July 03, 2013

CSC and Me 。◕ ‿ ◕。


yeshhh? meoww (´ω`)

By looking at the thickness of the book, it is adequate for me to worry with this subject. "whoaa. it looks sophisticated and smart.. (my first impression on CSC textbook) uhh..never mind, i'll give it a try. it looks fun,though" so, after a little conversations in my head, i've decided to register and take the challenge. 
frankly speaking, i'm a gadget lover. i mean, come on..who doesn't,right? besides that, i just wanna know more and more about computers and devices :)
from the first class, i really enjoyed myself. crown it all , we're lucky to have such a "sempoi" (i don't know how to translate the word.sorry.hehe) lecturer and makes it more fun and exciting with her interactive assignments. before this, i didn't bother with myDrawer and group forum in student portal.back then, i logged in the portal just to download tutorials and slides but now, she has made me checked the forum everyday.well, i could say that it is quite a big change for me - a change to something better. 
a ton of thanks to my dearest Mdm. Azyan Yusra,lecturer of CSC134 for AS1204A2 *claps* ever since i'm in your class, i've learnt so many things about computer,devices and so on. i never thought that microsoft word  is so awesome. i never thought about how much microsoft word can make my life easier - especially when dealing with assignments. i never thought i could make poster with it too! i really enjoyed myself when it comes to CSC. so,yeah CSC is so fun! :D


me before.

me after                                        






hehe ( ´∀`)☆

July 02, 2013

Hey,Hey everybody :D


this is how my blog looks like. i haven't updated my first blog for "centuries" and now i'm starting to feel weird. lol. it's 4.10 a.m and i can't sleep.instead of scrolling my cursor for nothing,i think it's better for me to do something and not wasting my precious time. so, i decided to work my fingers on the keyboard and starts to blog again (after a long time) hewhew~ 
so..first of all, i know for sure, most of you guys don't ever realized about my existence in this class,do u? nahh..never mind that. once u read this, maybe it'll give hints about who i am and wash away all your who-is-she thoughts. okay,let's start. the name given is Wan Hazei Harniza bt Mohd Sariff. i'm twenty and was born on August 31 (yup. anak merdeka lah.hehe) from Klang,Selangor. truth to be told, i'm a quite noisy and active person (and yeah,sometimes crazy too) but i only be like that when i was with people who knows and close to me. so, befriend with me and u'll know how crazy i am :D
i should be in part 5 but when i was in part 2, i got hospitalized on final exam week so, i couldn't sit for the examination. it was stressful and disappointing yet i could do nothing about it- it has written in my fate and i have to bear with it. but hey, it wasn't that bad. on the second thought, if i hadn't been in hospital,maybe i didn't has the chance to meet u guys. well,yeah. that's make me feel better :)
do u know manga? how about anime? Naruto? K-On? are u a gamer? DMC? Final Fantasy? Tekken? if u know all these stuffs, all i wanna say is, welcome to the club and we are in the same world. hohoho. i'm literally a big fan of anime,manga and games. i'm not an Otaku and hardcore gamer yet but i'm quite positive i will be someday. it might sound weird when a girl like these stuffs but thy're all in me and i enjoyed myself. besides that, i ♥ mustache. i don't know why and when i felt this way but doesn't it look cute to u? i'm collecting mustache and feel free to tell me where i should go to add my collections.
me as Mrs.Potato with mustache! xD
whoa. post has become an essay. sorry guys. i couldn't stop typing *bite fingers* yeah. i think i should end it here or it'll be 2 pages essay about myself hahaha. well,then. i hope with this post, we can be closer and comfortable with each other. just say hi to me and i'll definitely hi u back ;)
thanks readers ♥♥