Tuesday, March 28, 2017

FEAR IS ENEMY OF YOUR DEVELOPMENT

Do not let fear holding your back that is huge mistake di care have what friends or others have you need to find your own path number one mistake so many people make is that they care what people have i don't give up on anybody else if i have more or if i have less it does not matter just worry about your self the fact you worry about others accomplishment  is already your  losing formula you need to get rid of that firstly then you can focus on yourself stop focusing on others just focus on yourself.self.

Thursday, March 16, 2017

TOP TEN COMPUTER VIRUS


  1. Slammer is a worm dedicated for destroying both private and public services by attacking their key services, causing them to permanently stop. It spreads rapidly, for once the first server is infected, the number of victims is doubled in a matter of seconds. It destroy both private and public files. It has no alternative if you did not backup your data and files.
  2. Conficker first showed up in 2008, and was known among programmers as Downup while other virus experts called it “Super Bug” due to its complexity; once it starts it is so difficult, or almost impossible, to put an end to. This bug worked by taking advantage of the software’s flaws, creating a botnet. Attackers used it for stealing information, however the original aim that this virus was created for is still unknown. During it’s hub, in 2008 a group of experts were pulled together fully committed to work on stopping that virus. It can happen to the computer network system that has less security or it is not in updated security OR open shared folders OR computer without strong password.So the solution for this virus is just stay latest security update, strong password, secured shared folders and Anti-virus which prevent a system to be affected with worm.
  3. Fizzer is a computer worm created purely for money robbery. Like many other viruses, once it infects a computer, it starts sending out spams through the email to different contacts existing in the addresses book of the user. Fizzer was not as fast as Code Red, but caused enough disasters 
  4. Code Red Here is a fun fact about this computer worm; it was named that way for its creators were laying down drinking Code Red Mountain Dew at the time this discovery was brought to being. This virus’s main target was the computers with the web servers of Microsoft IIS installed. Once these computers are infected with Code Red  the virus starts copying itself in great numbers, wiping out most of the system resources. Code Red once overthrew the public website of The White House scaring away multiple agencies and forcing them to shut their websites off for a while. Although Code Red has caused severe damages at first, it is now considered the least threatening.
  5. Stuxnet This one was the first to cause damage beyond the virtual world, for it was the reason behind ruining half of the nuclear centrifuges of Iran. This virus was mainly created to target the softwares of Siemens to bring its systems down. In case this computer worm, Stuxnet infected a non-Siemens computer, it would not be active, however it would still cause mild damage, but not to the extent of sacrificing itself.
  6. Zeus virus started in 2007, and up till today, it is still a threatening tool, for it works on obtaining all the personal information and the credentials of login of any of the following: email, social accounts, and even banking accounts. Since technology is in progress and internet banking has become a trend, Zeus has become far more threatening than it ever was, because our identities are no longer only attached to name, dates of birth, or social security number, but are now linked to bank accounts too.
  7. MyDoom This one is considered the fastest spreading virus since the creation of ILOVEYOU. MyDoom  is another virus that acts as a back door, giving full access to the victim’s software. Like other viruses, it is sent in a form of an email that the unaware user would innocently open, then the harmful code would download itself and start plundering the victim user’s contacts. This virus would also overload the computer with information gathered from other multiple systems, and would keep send bouncing emails, infected ones for sure, until the computer’s operating system can no longer survive, and BOOM! It is totally disrupted.
  8. Mellissa was the name of a Floridan exotic dancer. The virus was formed as a word document, named Melissa, and it was actually a fake document claiming that it contains a list of passwords for several pornography sites. David L. Smith was Melissa’s creator; he used the dancer’s name, so people would be encouraged to download the corrupted file and open it. Once these actions were taken, the virus starts sending itself to all the contacts in the user’s address book causing email traffic. This virus consequently damaged the email services of large corporations and governments. Mellissa didn’t stay around for long, for David L. Smith was captured, and wasn’t allowed to use networks unless under an authorization.
  9. Poison Ivy No, it is not the good-looking villainess from Batman, but another dangerous computer virus that was used to be perceived as a nightmare since it threatened the computers security. Poison Ivy was known as a Remote Access Trojan, and that is because it serves as a back door, giving the attacker a full control over the victim’s computer. Once Poison Ivy  is installed into one’s computer, the attacker is given the ability to full manipulate the computer contents; he/ she can even use the speaker and the webcam to record all the victim’s actions audio and video.
  10. ILOVEYOU This was one of the most common computer viruses in 2000, for it is considered as one of the most toxic viruses ever created. ILOVEYOU  started from Philippines, and a very large amount of computers were infected by it; even some large corporations were exposed to massive financial loss. Back then, when that virus began to seep into virtual world, it was sent as an adorable love letter. Surely people got curious; trying to know who their secret admirers were, they opened the letters. Upon opening the email attachment, the virus would automatically send itself to your first 50 contacts, and that happens right after unleashing a damaging software onto your computer. This virus forced some of large corporations to temporarily turn their mailing systems offline, so they won’t get their computers infected.

Tuesday, March 14, 2017

STREAM LIVE SOCCER NOW


Hello guys this is special for those football fans i got something that can be interested to you . Have you try to find on how you can stream live soccer on your device such as Computer but failed. Here is a solution one of the website that allow you to stream live soccer and watch it with high definition or normal. I hope you will enjoy it maybe you will find a time to stay at home and stream it with you device. When you go to that site you will see the list of schedule and live match and you will choose the one you want and stream it


Just click SOCCER LIVE

Friday, March 3, 2017

DO YOU LIKE GAMES?

Hello guys i hope you are doing fine . Many people after being tired or on how to find a way to refresh their mind they tend to engage in different things so as to enjoy and relax such as watching movies, music,soccer, and play other sports. But today i'm here for those who try to relax and refresh their mind through playing Games such as Adventure,fighting, racing war and others. This is a chance for you to play different Games that you love a hundreds of Games here we go just download Games as much as you can its only matter on your internet bundles you can. This is the best site for you to download Games CLICK HERE.