"Creating EXTRAORDINARY incomes, for ORDINARY people !"
Need a proofment?....CLICK HERE!!

Tuesday, September 19, 2006

Buying a Printer
Help and Tips

Buying a printer? Whether it is color, black and white, laser, inkjet, or bubblejet, these tips should help in your purchase decisions.

#1: Faster Speed May Require USB 2.0

You may not be able to get advertised fast printer speeds without USB 2.0.

#2: Consider a Multifunction UnitBlogger beta: Source of Internet Informations - Create Post
Pros and cons of multifunction printers, plus a list of manufacturer links.

#3: Always Buy Extra Toner or Cartridges
Keep extra printer toner in the house or office.

#4: Can A Printer Print Photos Without Edges?
The difference between printing photos on a regular printer and photo printer.

#5: Separate Colored Ink Cartridges
Separate colored printer ink cartridges can lower a printer's TCO.

#6: Make Sure it Fits on Your Desk
When purchasing a printer, be sure to consider its footprint.

#7: Are Cables Included?
Will you need to buy USB, parallel, or Firewire cables for your printer?


Adream machine for anyone.

One whose cost factor determines that you must buy it carefully.

If you are thinking of going in for a laptop (or�a notebook, as it is called among the tech circles), here are a few tips that will come in handy.

Image1. Opt for an Intel Pentium 4 or an Intel Centrino processor. The processor forms the computing core of your laptop and is one area where you must not compromise.

Invest wisely here. The processor is the first component likely to get outdated and it is not possible to upgrade it.

2. Opt for a 256 MB DDR SDRAM. A RAM of lower memory capacity will make it difficult to run certain applications and software.

Upgrading from 256 to 512 MB DDR SDRAM could cost you between Rs 4,000 and Rs 5,000.

3.�Choose an Active-matrix (TFT) display, preferably an LCD. The display is an active matrix if you can see the arrow while it traverses the screen. Most displays nowadays are TFTs as the Passive-matrix (dual scan) is now outdated.

TFTs are highly preferred because of their sharper images, better resolution and smoother images of motion on the screen.

Wide screen laptops are a visual treat and recommended for those interested in the movie experience. But they�cost 8% to 10% more than the conventional laptops, are obviously bulkier to carry and slightly low on battery life.

4. If you travel extensively, take care that your laptop weighs under 5 pounds. If your laptop will be confined to your room, you could go in for a slightly heavier one. It will�be cheaper. It will also have a few more features.

5. Check the battery life on the laptop. Insist that it is a Lithium-ion (Li+) battery (nearly all laptops will have this one). Choose batteries with a high voltage and a high mAh. Do not go for NiMH batteries, as you will have to keep charging them frequently.

6. If you have no intention of using a CD frequently, an external DVD and CDRW drives may be preferred to inbuilt ones. The main convenience being that they reduce the weight of the base piece and provide lesser complications later on.

If they are an integral part of your work, you might as well opt for an inbuilt version.

Incidentally, the prices of DVD drives are expected to fall considerably over the next one year.

Don't stress on your laptop having a floppy drive. Floppies are getting obsolete by the minute and will soon be terminated.

7. If you are on the move, buy a laptop with a spill-resistant keyboard and shock-resistant hard drives. This will ensure your hard disk does not crash and you don't lose data in the event of a minor crash or fall.

8. Ensure the laptop has two or more USB ports, as you will need them to attach your peripheral devices like printers and scanners.

You could even consider buying a pen drive to act as a reliable data transfer mode.

Choose a laptop with wireless connectivity in the form of Bluetooth and Infrared. These make data transfer very convenient and reliable and you can send data to multiple recipients at one go.

These facilities on your laptop would cost you around Rs 1,000 more and are independent of any service providers.

9. Windows XP Professional is an ideal system for a laptop meant for office use. In laptops, it is very inconvenient to upgrade your operating system, so choose the latest one.

Windows is the most popular operating system, with XP Professional being the latest that supports all the software available today.

10. Some people prefer a touchpad mouse as the navigating option while others prefer the rubberised button situated between the keys G, H and B. Try working with both and pick the one you are most comfortable with.

Some laptops come equipped with both. You could also consider a cordless mouse, which is half the size of the regular one.

11. Insist on an inbuilt LAN card and modem.

There are basically two types of modems on offer -- internal modems and PC card-based modems. Make sure the internal modem is fast enough for your needs. Else, opt for the PC card-based one that sticks out of your computer, but is slightly better performance wise.

12. While budgeting for your laptop, bear in mind that a cheaper machine might prove expensive if you plan to upgrade it.

Do not compromise on the processor, the RAM and the operating system.

The memory capacity (GB) can be upgraded later on, so can the CD/DVD drives.

When you are buying your laptop check on upgradation. You can upgrade your machine with or without discarding it. If you plan to change your machine within two years, don't invest too heavily on it.

Where brands are concerned, do note that the IBM laptop division has been taken over by the Chinese company, Lenova.

HP and Compaq are the same brand when it comes to laptops. The good thing about this brand is that it is in a position to provide good service simply because of an established network of service centres.

Despite all the advice you get, make it a point to test your laptop before purchasing it. Don't just take someone's word for it.

Check if you are comfortable with the interface, the keyboard, the touch pad and the display. After all, it is you who are going to be using it and paying for it.

Tomorrow: Buy a laptop to suit your budget.

Sunday, September 10, 2006

Computer virus

From Wikipedia, the free encyclopedia

Jump to: navigation, search

In computer security, computer virus is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents. A computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of a virus into the program is termed as an "infection", and the infected file, or executable code that is not part of a file, is called a "host". Viruses are one of the several types of malicious software or malware. In common parlance, the term virus is often extended to refer to worms, trojan horses and other sorts of malware; viruses in the narrow sense of the word are less common than they used to be, compared to other forms of malware.

While viruses can be intentionally destructive, for example, by destroying data, many other viruses are fairly benign or merely annoying. Some viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of hosts. A time bomb occurs during a particular date or time, and a logic bomb occurs when the user of a computer takes an action that triggers the bomb. The predominant negative effect of viruses is their uncontrolled self-reproduction, which wastes or overwhelms computer resources.

Today, viruses are somewhat less common than network-borne worms, due to the popularity of the Internet. Anti-virus software, originally designed to protect computers from viruses, has in turn expanded to cover worms and other threats such as spyware, identity theft and adware. Included in the many types of viruses are:

Trojan horses
A Trojan horse is just a computer program. The program pretends to do one thing (like claim to be a picture) but actually does damage when one starts it (it can completely erase one's files). Trojan horses cannot replicate automatically.
Worms
A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.
E-mail viruses
An e-mail virus will use an e-mail message as a mode of transport, and usually will copy itself by automatically mailing itself to hundreds of people in the victim's address book.

A computer virus will pass from one computer to another like a real life biological virus passes from person to person. For example, it is estimated by experts that the Mydoom worm infected a quarter-million computers in a single day in January of 2004. In March of 1999, the Melissa virus spread so rapidly that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be dealt with. Another example is the ILOVEYOU virus which occurred in 2000 and had a similarly disastrous effect.

Use of the word "virus"

The word virus is often claimed to be the acronym of Vital Information Resources Under Siege, although this is obviously a backronym. The word is derived from and is used in the same sense as the biological equivalent. The term "virus" is often used in common parlance to describe all kinds of malware (malicious software), including those that are more properly classified as worms or trojans. Most popular anti-virus software packages defend against all of these types of attack. In some technical communities, the term "virus" is also extended to include the authors of malware, in an insulting sense.

The English plural of "virus" is "viruses". Some people use "virii" or "viri" as a plural, although computer professionals seldom use these words. For a discussion about whether "viri" and "virii" are correct alternatives for "viruses", see plural of virus.



History

A program called "Elk Cloner" is credited with being the first computer virus to appear "in the wild" -- that is, outside the single computer or lab where it was created. Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. This virus was originally a joke, created by the highschooler and put onto a game. The game was set to play, but release the virus on the 50th time of starting the game. On this time, it would instead of playing the game change to a blank screen that read a poem about the virus named Elk Cloner. The computer would then be infected.

The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, BasitAmjad Farooq Alvi, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus. and

Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of personal computers, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk.

Traditional computer viruses were mostly first seen at the last half of the 1980s, and they came about because of a few reasons. “The first reason was the spread of personal computers. Prior to the 1980s, home computers were nearly non-existent or they were toys. Real computers were rare, and they were locked away for use by "experts." During the 1980s, real computers started to spread to businesses and homes because of popularity. By the late 1980s, PCs were widespread in businesses, homes and college campuses.

The second reason was the use of bulletin boards on the computer. People could dial up a bulletin board with a modem and download all sorts of different programs. Most popular were games, and then simple word processors, spreadsheets, etc. Bulletin boards led to what is now known as the virus called a Trojan horse. The third reason that led to the creation of viruses was most definitely the floppy disk. At the end of the 1980s, programs were very small, and one could fit the operating system, a word processor and many documents onto a single floppy disk. Most computers didn’t have hard disks, so one would turn on one's computer and it would load the operating system and everything else straight from the floppy disk. Viruses took advantage of these three facts to create the first self-replicating programs.

As bulletin board systems and online software exchange became popular in the late 1980s and early 1990s, more viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBSes. Within the "pirate scene" of hobbyists trading illicit copies of commercial software, traders in a hurry to obtain the latest applications and games were easy targets for viruses.

Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Numerically, most of these viruses did not have the ability to send infected e-mail. The ones that did usually worked by accessing the Microsoft Outlook COM interface.

Macro viruses pose unique problems for detection software. For example, some versions of Microsoft Word caused macros to replicate themselves with additional blank lines. The virus behaved identically but would be misidentified as a new virus. In another example, if two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".[1]

A computer virus may also be transmitted through instant messaging. A virus may send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) and follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.

Why people create computer viruses

Unlike biological viruses, computer viruses do not simply evolve by themselves. Computer viruses cannot come into existence spontaneously, nor can they be created by bugs in regular programs. They are deliberately created by programmers, or by people who use virus creation software. It is possible that copying errors and recombination may lead to the actual evolution of a computer virus; however, the possibility of this type of 'digital evolution' is extremely remote.

Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, vandalism, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines. Some viruses were intended as "good viruses". They spread improvements to the programs they infect, or delete other viruses. These viruses are, however, quite rare, still consume system resources, may accidentally damage systems they infect, and, on occasion, have become infected and acted as vectors for malicious viruses. A poorly-written "good virus" can also inadvertently become a virus in and of itself (for example, such a 'good virus' may misidentify its target file and delete an innocent system file by mistake). Moreover, they normally operate without asking for permission of the owner of the computer. Since self-replicating code causes many complications, it is questionable if a well-intentioned virus can ever solve a problem in a way which is superior to a regular program that does not replicate itself.

Releasing computer viruses (as well as worms) is a crime in most jurisdictions.

See also the BBC News article.[2]

Replication strategies

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user tries to start an infected program, the virus' code may be executed first. Viruses can be divided into two types, on the basis of their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect these targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.

Nonresident viruses

Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.

For simple viruses the replicator's task is to:

  1. Open the new file
  2. Check if the executable file has already been infected (if it is, return to the finder module)
  3. Append the virus code to the executable file
  4. Save the executable's starting point
  5. Change the executable's starting point so that it points to the start location of the newly copied virus code
  6. Save the old start location to the virus in a way so that the virus branches to that location right after its execution.
  7. Save the changes to the executable file
  8. Close the infected file
  9. Return to the finder so that it can find new files for the replicator to infect.

Resident viruses

Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. However, this module is not called by a finder module. Instead, the virus loads the replication module into memory when it is executed and ensures that this module is executed each time the operating system is called to perform a certain operation. For example, the replication module can get called each time the operating system executes a file. In this case, the virus infects every suitable program that is executed on the computer.

Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. For instance, a fast infector can infect every potential host file that is accessed. This poses a special problem to anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory, the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. For instance, some slow infectors only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably, and will at most infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach doesn't seem very successful however. Virus that are common in the wild are mostly relatively fast to extremely fast infectors.

Host types

Viruses have targeted various types of hosts. This is a non-exhaustive list:

Companion viruses

A few older viruses called companion viruses[3] do not have host files per se, but exploit MS-DOS. A companion virus creates new files (typically .COM but can also use other extensions such as ".EXD") that have the same file names as legitimate .EXE files. When a user types in the name of a desired program, if he does not type in ".EXE" but instead does not specify a file extension, DOS will assume he meant the file with the extension that comes first in alphabetical order and run the virus. For instance, if a user had "(filename).COM" (the virus) and "(filename).EXE" and the user typed "filename", he will run "(filename).COM" and run the virus. The virus will spread and do other tasks before redirecting to the legitimate file, which operates normally. Some companion viruses are known to run under Windows 95 and on DOS emulators on Windows NT systems. Path companion viruses create files that have the same name as the legitimate file and place new virus copies earlier in the directory paths. These viruses have become increasingly rare with the introduction of Windows XP, which does not use the MS-DOS command prompt per se.

Methods to avoid detection

In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however.

Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KiB in length, did not add to the size of the file.

Recent viruses avoid any kind of detection attempt by attempting to forcefully kill the tasks associated with the virus scanner before it can detect them.

As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced.

Avoiding bait files and other undesirable hosts

A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of hosts that viruses sometimes avoid is bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:

  • Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small infected bait file, than to exchange a large application program that has been infected by the virus.
  • Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.
  • Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system.

Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of 'garbage instructions'.

A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.

Stealth

Some viruses try to trick anti-virus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is "clean". Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.

Self-modification

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

Simple self-modifications

In the past, some viruses modified themselves only in fairly simple ways. For example, they regularly exchanged subroutines in their code for others that would perform the same action - for example, 2+2 could be swapped for 1+3. This poses no problems to a somewhat advanced virus scanner.

Encryption with a variable key

A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible.

Mostly, the decryption techniques that these viruses employ are fairly simple and mostly done by just xoring each byte with a randomized key that was saved by the parent virus. The use of XOR-operations has the additional advantage that the encryption and decryption routine are the same (a xor b = c, c xor b = a.)

Polymorphic code

Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts that stay the same on each infection, making it impossible to detect directly using signatures. Anti-virus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body. See Polymorphic code for technical detail on how such engines operate.

Some viruses employ polymorphic code in a way which constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for anti-virus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that, as a result of this, some instances of the virus may be able to avoid detection.

Metamorphic code

To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that use this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of it part of the metamorphic engine.

Viruses and legitimate software

The vulnerability of operating systems to viruses

Another analogy to biological viruses: just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses.

This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. Users who use Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) are especially vulnerable to the spread of viruses. Microsoft software is targeted by virus writers due to their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated applications, applications with scripting languages with access to the file system (for example Visual Basic Script (VBS), and applications with networking features) are also particularly vulnerable.

Although Windows is by far the most popular operating system for virus writers, some viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. Some operating systems are less secure than others. Unix-based OSes (and NTFS-aware applications on Windows NT based platforms) only allow their users to run executables within their protected space in their own directories.

As of 2006, there are relatively few security exploits [4] targeting Mac OS X (a Unix-based operating system); the known vulnerabilities fall under the classifications of worms and trojans. The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. However, Mac users are advised to install anti-virus software, because they can accidentally pass on a file which is infected with a Windows virus or trojan. While this malware does not affect the Mac, it can infect a Windows PC. It is safe to say that Macs are less likely to be exploited due to its secure Unix base. Virus vulnerability between Macs and Windows was/is a chief catalyst of the platform wars between Apple Computers and Microsoft.

Windows and Unix have similar scripting abilities, but while Unix natively blocks normal users from having access to make changes to the operating system environment, Windows does not. In 1997, when a virus for Linux was released – known as "Bliss" – leading antivirus vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows.[5] The Bliss virus may be considered characteristic of viruses – as opposed to worms – on Unix systems. Bliss requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as the administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.[6]

The role of software development

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies which produce large numbers of bugs will generally also produce potential exploits.

Closed-source software development, as practiced by Microsoft and other proprietary softwareOpen source software such as Linux, for example, allows all users to look for and fix security problems without relying on a single vendor. Some advocate that proprietary software makers practice vulnerability disclosure to improve this weakness. companies, is seen by many as a security weakness.

On the other hand, some claim that open source development exposes potential security problems to virus writers, hence increases in the prevalence of exploits. They counter claims that popular closed source systems such as Windows are often exploited by claiming that these systems are only commonly exploited due to their popularity and the potential widespread effect such an exploit will have.

Anti-virus software and other countermeasures

There are two common methods which an anti-virus software application uses to detect viruses. The first method is to use a heuristic algorithm (Heuristic (computer science)) to find viruses based on common behaviors. This method has the potential abilitiy to detect viruses which may not be discovered by anti-virus security firms. The second and most common method of virus detection is to create a list of virus signature definitions. The disadvantage of this detection method is that users are only protected up until their last virus definition update. Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. There have been attempts to do this but adoption of such anti-virus solutions can void the warranty for the host software. Users must therefore update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats and hoaxes.

Virus extensions

@mm is an extension commonly appended to the end of a mass mailing computer virus. This model is used by security firm Symantec, and follows any variant letter. Examples include:

  • W32.MyDoom@mm
  • Mac.Simpsons@mm
  • W32.MyParty@mm
  • W32.Nimda.A@mm

Other similar extensions or prefixes are applied to computer viruses, however the decision to do so and indeed the 'name' of the virus is determined by the will of individual security firms.

References

  1. ^ Vesselin Bontchev. Macro Virus Identification Problems. FRISK Software International.
  2. ^ "Why people write computer viruses", BBC News, date.
  3. ^ Kaspersky Lab. Companion virus. Glossary.
  4. ^ Malware Evolution: MacOS X Vulnerabilities 2005 - 2006. Kaspersky Lab (July 24, 2006). Retrieved on August 19, 2006.
  5. ^ McAfee. McAfee discovers frirst Linux virus. news article.
  6. ^ Axel Boldt. Bliss, a Linux "virus". news article.

See also

External links

Virus Help and Information

Virus sources

Anti-virus

Top Paying Keywords: How to Increase Your Pay Per Click Returns
by Christopher W Smith


There is no doubting the success of Google's Adsense program. Even Yahoo! and Kanoodle have joined in on the game, offering to join publishers with advertisers. Given the right circumstances, its a win / win situation for both.

There have been many sites that promote Top Paying Keywords and how if you add these keywords you can instantly improve your Adsense revenue. However, if you really want to see a dramatic increase in pay per clicks, you need to ensure 2 very important areas are addressed. They seem very obvious, but many site owners miss the opportunity to attract higher paying ads simply because they ignore these two areas.

Optimization

Many “would be" web designers decide to build a site around the highest paying keywords, yet, forget to optimize their site around a specific keyword. Instead, they forget the basics of how to properly create a title tag, page description, keyword density and having clean search engine spider friendly code. Remember, it's the source code that the Adsense and Kanoodle programs are using to decide what ads will appear. If your top 2 keywords are “insurance" and “downloads", you may find that you end up with ads regarding “insurance downloads" which of course will not pay much.

Also, having a high keyword density score for the keyword can get you into trouble with the search engines (specifically Google). Keywords spamming is never a good idea.

Optimize your page and you will search more hits to that page and not confuse the bots that create the ads for you.

Content

This is by far the most important and most missed tips. If you are going to include top paying keywords on your site, remember, if you want to attract high paying ads, you need to be selling your visitor on what your advertiser wants. Your content should sell to the visitors needs. Why should your visitor consider car insurance? What are the benefits of car insurance? Where can they get the best quotes? If you pique the interest of your visitor, they are more likely to click on your ads than if they feel that they are not getting the information they came to your site for in the first place.

Your content should have a specific flow to it. If you start jamming keywords into your content, your visitor will automatically suspect that you are trying to deceive them. Once you do that, they are gone! Why waste your visitors time after working so hard to get them to your site in the first place? Well optimized, focused content will always produce better, higher paying ads. That is why you are a publisher: you want those high paying ads on your site. What use though are those high paying keywords if your content doesn't pique your visitors curiosity? Be passionate about your content, and the click through rates will skyrocket!

Its also important to make sure that you are using the right number of ads per page, but that is for another article!

Christopher Smith has been helping web site owners make money through Google Adsense by providing them with the Top Paying Adsense Keywords for his visitors to Adsense Heaven. For more tips on how to improve your click through rates for your pay per click programs, please visit http://www.adsenseheaven.com.




Below you will find the top three paying keywords for this month.

Simply enter the keyword or phrase you'd like to research below and click "Search" or scroll down to a letter category to see the keywords associated with that letter.

Some of last months highest paying keywords :

eloan 228.42/ click
peritoneal mesothelioma 213.94/ click
lendingtree 200.02/ click
baines and ernst 187.9/ click
mesothelioma symptoms 180.57/ click
lexington law firm 179.98/ click

at t cellular phone $66.64
adult friend finder $64.51
alicante car hire $59.82

baines and ernst $187.90
budget car rental $45.07
buy domain $40.94

credit repair $133.30
consumer credit counseling $82.93
cheap domain $58.45

domain name search $121.30
discover credit card $87.12
domain search $74.46

eloan $228.42
equity line of credit $176.85
eloan com $48.69

fico score $41.02
free credit report $32.59
free credit reports $28.84

game rental video $27.04
gas prices compare $15.99
graduate degree program $15.29

home equity line of credit $139.71
home equity loans $86.91
hosting services $43.37

interest credit cards $9.40
international phone card $8.36
insurace $7.50

job $24.38
jesus is our homeboy $16.31
jewish $9.77

karas adult playground $6.96
keyword bidding $4.08
knee support $3.74

lendingtree $200.02
lexington law firm $179.98
lexington law $178.15

Mesothelioma $231.77
mega life and health $133.60
mysql hosting $38.02

northwestern mutual life $51.61
netquote $36.45
no limit texas hold em $18.36

ocean finance $231.27
online degree $50.38
overture $44.83

prostate cancer $51.93
purchase domain name $50.11
projector rental $36.59

quicken $8.14
quick book $7.96
quick money $5.53

ross simon jewelry $72.88
register domain names $64.15
register domain name $57.75

student credit card $62.21
sponsored links $60.90
selectquote $58.61

trans union $159.32
turbo tax $62.04
trans union llc $55.21

uk web hosting $24.58
unicare $21.45
uk hosting $17.33

virus $71.39
video conferencing $41.23
visa credit card $39.94

web name registration $61.90
web domain name $42.88
web site register $41.05

x box system $5.29
xm satellite $2.42
x box for sale $2.30

yahoo domain $343.16
yahoo domain name $301.93
yahoo chat com $7.18

zenith television $3.40
zyban $3.14
zire pda $3.04
$54.33 mesothelioma lawyers
$47.79 what is mesothelioma
$47.72 peritoneal mesothelioma
$47.25 consolidate loans
$47.16 refinancing mortgage
$45.55 tax attorney
$41.22 mesothelioma
$38.86 car accident lawyer
$38.68 ameriquest mortgage
$38.03 mortgage refinance
$37.55 refinancing
$35.99 auto accident attorney
$35.52 equity mortgage
$34.34 mesothelioma texas
$34.05 mortgages
$33.80 criminal defense attorney
$33.54 epocrates
$32.95 mesothelioma
$32.08 car accident attorney
$31.60 mortgage refinance rate
$31.38 loan refinance
$31.29 personal injury attorney
$31.24 best refinance
$30.14 register domain names
$29.86 medical malpractice lawyer
$29.68 incorporate
$29.68 malignant mesothelioma
$29.49 mortgage refinance
$29.45 freecreditreport
$29.41 fargo refinance
$28.53 mortgage loans
$28.15 125 refinance
$28.05 los angeles lawyer
$27.96 re mortgage
$27.38 how to register a domain name
$27.31 mortgage refinance rate
$26.86 personal injury
$26.48 refinance
$26.17 refinance
$25.43 mortgage loan
$25.35 texas refinance
$25.33 medical malpractice attorneys
$25.33 mortgage application
$24.46 mortgage companies
$24.33 countrywide
$23.92 low mortgage rate
$23.26 va refinance
$22.83 gmac mortgage
$22.17 california mortgage rates
$21.86 ameriquest
$21.68 florida lawyer
$21.41 dui
$21.29 refinance leads
$21.16 domain register
$21.07 refinance new york
$20.62 refinance rental property
$20.46 utah mortgage
$20.38 mortgage lenders
$20.35 find a lawyer
$20.20 mortgage note
$20.17 wrongful death

Saturday, September 09, 2006

18 Common Mistakes by Google Adsense Publishers that
Violate Terms of Service

Google Adsense program is a popular web advertising program which provides a good income source for many websites. There are well defined terms of service to strictly adhere to when participating in the program.

On my visit through sites and forums, I daily notice several instances of misuse of Adsense ads. So here a few helpful Google Adsense tips, probably many you already know, and few you might gain by knowing now. These adsense faq are all picked from the Program Policies, Terms and Conditions and FAQ itself and presented in a simplified manner.

1. Never click your own adsense ads or get them clicked for whatever reason.

You know this one very well. This is a surefire way to close you Adsense account. Never tell your office associates or friends to click on them. Keep a check if your family or children are busy increasing your income by clicking your ads and indirectly trying to stop your income. Dont even think of offering incentives for clicks, using automated clicking tools, or other deceptive software. Adsense is very smart to detect fraudulent clicks. Check the ads which appear on your pages by the Google Preview tool if required.

2. Never change the Adsense code.

There are enough means of adsense optimization & customizations available to change the colour, background or border to suit your needs. Do whatever you want to do outside the code, never fiddle within the ad or the search code. They know it when you do. The search code has more limitations to colour and placement, but you should adhere to the rules. The code may stop working and violates the TOS.

3. Do not place more than 3 ad unit and 1 ad links or 2 adsense search boxes on any web page.

Anyway, ads will not appear in those units even if you place more ad units. But this is the limit they set, so it is better to stick to it.

4. Do not run competitive contextual text ad or search services on the same site which offer Google Adsense competition in their field. Never try to create link structures resembling the adsense ads. Never use other competitive search tools on the same pages which have Adsense powered Google search. They do allow affiliate or limited-text links.

5. Do not disclose confidential information about your account like the CTR, CPM and income derived via individual ad units or any other confidential information they may reveal to you. However, you may reveal the total money you make as per recent updates to the TOS.

6. Label headings as “sponsored links” or “advertisements” only.

Other labels are not allowed. I have seen many sites label ads with other titles. Dont make your site a target in a few seconds gaze.

7. Never launch a New Page for clicked ads by default.

Adsense ads should open on the same page. You may be using a base target tag to open all links in a new window or frame by default. Correct it now as they do not want new pages opening from clicked ads.

8. One Account suffices for Multiple websites.

You do not need to create 5 accounts for 5 different websites. One account will do. If you live in the fear that if one account is closed down for violation of TOS, believe me they will close all accounts when they find out. You can keep track of clicks by using channels with real time statistics. They will automatically detect the new site and display relevant ads.

9. Place ads only on Content Pages.

Advertisers pay only for content based ads. Content drives relevant ads. Although you might manage some clicks from error, login, registration, “thank you” or welcome pages, parking pages or pop ups, it will get you out of the program.

10. Do not mask ad elements.

Alteration of colours and border is a facility to blend or contrast ads as per your site requirements. I have seen many sites where the url part is of the same colour as the background. While blending the ad with your site is a good idea, hiding relevant components of the ads is not allowed. Also do not block the visibility of ads by overlapping images, pop ups, tables etc.

11. Do not send your ads by email.

Html formatted emails look good and allow placement of these javascript ads. But it is not allowed as per TOS. You do not want impressions registering on their logs from any email even once. They are watching!

12. Keep track of your content.

So Adsense is not allowed on several non content pages. But it is also not allowed on several content pages too. Do not add it on web pages with MP3, Video, News Groups, and Image Results. Also exclude any pornographic, hate-related, violent, or illegal content.

13. Do not alter the results after ad clicks or searches -

Ensure you are not in any way altering the site which the user reaches to after clicking the ads. Do not frame, minimize, remove, redirect or otherwise inhibit the full and complete display of any Advertiser Page or Search Results Page after the user clicks on any Ad or Search results.

14. Avoid excessive advertising and keyword stuffing

- Although the definition of ‘excessive’ is a gray area and is subject to discretion, yet Google adsense with correct placement, focused content and high traffic will get you much more income than other programs, so excessive advertising is not required. Keyword stuffing does target better focused ads, but overdoing it is not required.

15. Ensure you Language is Supported -

Adsense supports “Chinese (simplified), Japanese, Danish, Korean, Dutch, Norwegian, English, Polish, Finnish, Portuguese, French, Russian, German, Spanish, Hungarian, Swedish, Italian and Turkish”. In addition, AdSense for search is available in Czech, Slovak, and Traditional Chinese. If your web pages language is not supported, do not use the code on such pages.


16. Only single referral button per product per page

- With the launch of the google adsense referral program, you are allowed to put only one referral button for adsense referral, adwords referral, and Firefox with google toolbar referral

17. Do not specify Google ads as your alternate ads.

- Several services like Chitika eminimalls allow you to place alternate urls, when a targeted paying ad cannot be displayed. This involved creating an simple html page and putting the ad to be displayed instead. Even Adsense allows an alternate url feature instead of displaying public service ads. But never use Adsense ads as alternate urls.

18. Add Borders betweem Images and text ads

- It was a common policy to increase CTR by placing same number of images as the number of text ads, which falsely gave the impression that the text ads represented an explanation to these images. Insert a border when placing images and text ads in such a manner, to avoid confusing readers to falsely click ads.

Whenever in doubt, it is better to ask for adsense help from the learned staff of Google Adsense. They are very helpful!
Related Reading
More About Google Adsense Video Ads : Play Your Ads
Optimize Adsense : Modify Code & Alternate Ads to Test Channels
Google Adsense Ads Without “Ads by Google”
Google Adsense Offers Personal Optimization Support to Web Publishers
New Google Adsense Referral Buttons
5 Sure Ways to Explode your Adsense Revenue

Contrary to what you read in some Ebooks, making money with Adsense
is extremely difficult. Sure, anyone can make a dollar or two a day
by putting up a website about their favorite hobby. However what we
are referring to here is making some serious money. These 5 tips,
will not make you a millionaire overnight, but they will guarantee
that you are maximizing your possible revenue. If you are not using
all 5, then somewhere along the line, you are losing money.

1. Make your Adsense ads look like they are part of the content

The simple fact is, that people do not like being advertised too.
You have to try and change their attitude towards this and make it
seem that they are not. The position on the page is extremely
important. As much as possible, try to make your ads contained
within your content as opposed to around it. This can be done by
putting your ads within a table and then left or right aligning
that table

Everyday in newspapers and magazines we look at ads. Most are with
borders. By making the background and the borders the same color
as the background of your page you will significantly increase your
clickthru rate very quickly. This can easily be done through your
Adsense control panel by creating a new theme

2. Also Use a Google Search Box

Within your Adsense panel, you will find that you can also obtain
code to put a search box on your website. Many people don't do this
as it does not seem to create much revenue. However, positioned
correctly, it can act as the place where visitors to your site do
enter their search time to go to the next place. If they click on
one of the ads on the search page, then you will make money.

Surfers surf the internet to find information. It is easy for
visitors to find this information through Google or another search
engine. By putting a search box on your page, you are making it
easy for visitors as well as generating revenue for yourself.

3. Provide good content.

CONTENT IS KING!! If you want visitors to come to your website,
bookmark it and click on your ads then it is extremely important,
that you provide them with good content. If visitors feel cheated
and do not find on your page what they thought that they would,
then they will surely leave as quickly as they came and not click
on your ad.

4. Repeat Success

If you have built a website that you find works with Adsense and
does generate you money, then be sure to repeat that formula for
further sites. If you have one site and then create another site
with the same success, then you will have doubled your Adsense
revenue. Build 10 sites and you will have multiplied your earnings
by ten!

5. Choose the Correct Keyword Phrases

There is no point in building lots of sites and finding that your
clicks are pennies in the pound. The MOST IMPORTANT factor to
exploding your Adsense revenue is to choose the right keywords.

If you would like to see your revenue increase in the right
direction then please visit
http://www.adsenseadwords.com/message.asp where you can do some
serious keyword research to find your niche. Not only will you find
suggestions on how to build your Adsense site, but more
importantly, you will find the words and phrases that will quickly
and easily make you money.

AdSense


AdSense is an ad serving program run by Google. Website owners can enroll in this program to enable text, image and, more recently, video advertisements on their sites. These ads are administered by Google and generate revenue on either a per-click or per-thousand-impressions basis. Google is also currently beta-testing a cost-per-action based service.

Google utilizes its search technology to serve ads based on website content, the user's geographical location, and other factors. Those wanting to advertise with Google's targeted ad system may sign up through AdWords. AdSense has become a popular method of placing advertising on a website because the ads are less intrusive than most banners, and the content of the ads is often relevant to the website.

It currently uses JavaScript code to incorporate the advertisements into a participating site. If it is included on a site which has not yet been crawled by the Mediabot, it will temporarily display advertisements for charitable causes known as public service announcements (PSAs). (Note that the Mediabot is a separate crawler from the Googlebot that maintains Google's search index.)

Many sites use AdSense to monetize their content and some webmasters work hard to maximize their own AdSense income. They do this in three ways:

  1. They use a wide range of traffic generating techniques including but not limited to online advertising.
  2. They build valuable content on their sites; content which attracts AdSense ads and which pay out the most when they get clicked.
  3. They use copy on their websites that encourage clicks on ads. Note that Google prohibits people from using phrases like "Click on my AdSense ads" to increase click rates. Phrases accepted are "Sponsored Links" and "Advertisements".

The source of all AdSense income is the AdWords program which in turn has a complex pricing model based on a Vickrey second price auction, in that it commands an advertiser to submit a sealed bid (not observable by competitors). Additionally, for any given click received, advertisers only pay one bid increment above the second-highest bid.

AdSense for feeds

In May 2005, Google unveiled AdSense for feeds, a version of AdSense that runs on RSS and Atom feeds that have more than 100 active subscribers. According to the Blog, "advertisers have their ads placed in the most appropriate feed articles; publishers are paid for their original content; readers see relevant advertising — and in the long run, more quality feeds to choose from".

AdSense for feeds works by inserting images into a feed. When the image is displayed by the reader/browser, Google writes the ad content into the image that it returns. The ad content is chosen based on the content of the feed surrounding the image. When the user clicks the image, he or she is redirected to the advertiser's site in the same way as regular AdSense ads.


AdSense for search

A companion to the regular AdSense program, AdSense for search lets website owners place Google search boxes on their pages. When a user searches the web or the site with the search box, Google shares any ad revenue it makes from those searches with the site owner. However, only if the ads on the page are clicked, the publisher is paid. Adsense does not pay publishers for mere searches.

How AdSense works

Each time a visitor visits a page with an AdSense tag, a piece of JavaScript writes an iframe tag, whose src attribute includes the URL of the page. Google's servers use a cache of the page for the URL or the keywords in the URL itself to determine a set of high-value keywords. (Some of the details are described in the AdSense patent.) If keywords have been cached already, ads are served for those keywords based on the AdWords bidding system.

The storage requirements of an AdSense system are stunningly modest. If each URL has just 8 "high-value" keywords, each represented by a single 32-bit number, then the keywords for each URL could be represented with just 32 bytes. The high value keywords of 4 billion URLs could be stored in 128GB, which would cost only $100 (circa 2006). 400 billion URLs or 100 drives (for a redundancy of 100) would require only $10,000 in storage costs.

AdSense serves a very large number of pages each day. If each day around 1B people saw 10 AdSense impressions (or 100M people saw 100 AdSense impressions), then AdSense would serve around 10B requests/day, or 115,741 requests/sec. If one machine can serve 20 reqs/second (seek times to read a random 4096-byte location on a drive allow for bursts of well over 100 reqs/second), then Google would require 5,787 servers to serve these 10B reqs/day. If each of these servers were hosted at a cost of $100/month, then it would cost $579K/month to run the adservers needed.

Suppose these 10B impressions/day generated clicks at a clickthrough rate of .3% and an average CPC of $.10. Then each day Google would receive 30M clicks/day (347 clicks/sec), generating $3M/day ($34.77/sec), or 900M clicks/month, generating $90M/month.

Abuse

Some webmasters create sites tailored to lure searchers from Google and other engines onto their AdSense to make money from clicks. These "zombie" sites often contain nothing but a large amount of interconnected, automated content (e.g. a directory with content from the Open Directory Project). Possibly the most popular form of such "AdSense farms" are splogs ("spam blogs"), which are centered around known high-paying keywords. Also many sites use free content from other web sites, such as Wikipedia, to attract visitors. These and related approaches are considered to be search engine spam and can be reported to Google.

Criticism

Due to concerns about click fraud, Google AdSense has been criticized by some SEO firms as a large source of what Google calls "invalid clicks". In response, Google says that it "removes publishers from their partner network on a daily basis". Some disabled publishers have complained that the process is not transparent or accountable. [1]

To help prevent click fraud, publishers can choose from a number of click tracking programs. These programs will display detailed information about the visitors who click on the AdSense pages. Publishers can use that data to determine if they've been a victim of click fraud or not. There seems to be many such commercial scripts available. An open-source alternative is AdLogger.

Google has also come under fire for not doing enough to combat the misuse of trademarks. Since 2004, Google had stopped prohibiting advertisers from bidding on any keyword, including trademarked terms.