vodacom

vodacom

movie

Utalii

Tangaza Biashara Yako Nasi..


+255758061575 & umojannguvu@gmail.com

umj

katiba

katiba

bloger

bloger

Blog

Blog

slider1

slider

Taswira za Maendeleo ya ujenzi wa barabara na vituo vya mabasi yaendayo haraka jijini Dar es salaam Wezesha na MB Mobile! Kilimo ndo Mpango Mzima. Authorities allow railway to pass through national parks & Maendeleo Agricultural Technology Fund Tanesco Na Maendeleo Welcome to Maendeleo Bank PLC

umoja blog

Tuesday, January 12, 2016

what is web browser

About your web browser

A browser is software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another, visit one page from another, print, send and receive email, among many other activities. The most common browser software titles on the market are: Microsoft Internet Explorer, Google's Chrome, Mozilla Firefox, Apple's Safari, and Opera. Browser availability depends on the operating system your computer is using (for example: Microsoft Windows, Linux, Ubuntu, Mac OS, among others).

What does my browser do?

When you type a web page address such as www.allaboutcookies.org into your browser, that web page in its entirety is not actually stored on a server ready and waiting to be delivered. In fact each web page that you request is individually created in response to your request.

You are actually calling up a list of requests to get content from various resource directories or servers on which the content for that page is stored. It is rather like a recipe for a cake - you have a shopping list of ingredients (requests for content) that when combined in the correct order bakes a cake (the web page).The page maybe made up from content from different sources.Images may come from one server, text content from another, scripts such as date scripts from another and ads from another. As soon as you move to another page, the page that you have just viewed disappears. This is the dynamic nature of websites.

What is my browser, IP address and Host Name?

Your particular browser you are using now (also known as "user agent") is "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
Your Internet Protocol (IP) Address is 197.250.192.49
Your Hostname is 197.250.192.49


How do I clear my cookies?
To find out how to clear, remove or enable cookies on your browser click Stop Cookies.

Email And Spam


Introduction

According to a report from renowned marketing-research group Radicati, more than 100 billion emails were sent every day in 2013, and that number is expected to rise to more than 130 billion messages per day by the end of 2017. Of the billions of emails sent every day, experts estimate that more than 90% of the messages are SPAM, or unsolicited marketing emails.
SPAM email costs us all in the end, as it congests networks, slows down Internet connections and leads to higher bandwidth usage and charges. ISPs and mail providers do a reasonably good job at filtering SPAM messages before they reach your inbox. Nonetheless, many SPAM emails still make it through the system. SPAM emails not only congest networks, they can contain harmful attachments or links that could damage or compromise your data or computer. Therefore, if you use email regularly, it is imperative that you learn how to manage and prevent SPAM as much as possible.
Reporting SPAM
As mentioned above, ISPs and email providers filter a lot of SPAM before it ever reaches your inbox. However, the providers do not actually delete the messages, but instead send them to a "Junk" or "SPAM" folder. The providers do this so you have a chance to review the messages if you wish, and so that you can locate and save any messages marked as SPAM erroneously. Because so many SPAM messages are sent every day, though, it is impossible for providers to catch or filter them all. Therefore, you will need to remove many SPAM messages yourself and mark them so that your email software or provider recognizes them as junk mail in the future.

If you use a webmail service such as Gmail or Yahoo, marking a message as SPAM is relatively simple. Most webmail providers have a link or icon you can click to report an email as SPAM and send it to the appropriate Junk, SPAM, or Trash folder. If you use a desktop email client such as Outlook or Thunderbird, marking an email as SPAM is equally straightforward and simple. Simply click the "Send to Junk," "Mark as Spam" or another similar icon to move the message to the SPAM folder and have the email client mark and block future emails from the sender automatically.






Spoofed Email Addresses
Email spoofing has been around about as long as the Internet. Put simply, email spoofing is the acting of sending messages with forged sender addresses. This is relatively simple to do as outgoing mail servers do not perform any authentication on the address used in the "Sent By" or "Reply To" fields. Providers allow for this because many users have legitimate reasons for wanting recipients to reply to an address other than the one used to send the email. Because enforcement of sender addresses is virtually non-existent, though, spoofing remains a popular way for hackers or criminals to trick users into clicking malicious links or parting with their personal information.
In many cases, malicious users may send you email from the address of a friend, colleague or even from your own email address. If you notice irregularities in messages from friends, be careful not to click links or open attachments in the message. If you suspect someone is spoofing a friend's address, notify him/her immediately in a separate message and ask for confirmation regarding the legitimacy of the email. If someone sends you a spoofed email from your own address, report the fraudulent message to your ISP or email provider and delete it immediately.


Unconfirmed Senders

While outgoing mail servers do not perform any authentication for sender addresses, incoming mail servers are a different story. These days, most (but not all) ISPs and mail providers attempt to match the sender address with the domain name from which the message was received. If the domains in the sender address and sending domain name do not match, the server flags the messages as possibly being spoofed or from an unconfirmed sender.

If you receive a warning in your webmail or desktop email application that a message is from an unconfirmed sender, be careful not to open any images in the message or click any links it might contain. Additionally, never open or download attachments in messages from unconfirmed messages until you verify their authenticity and source. Even then, you should always scan messages and attachments with a reliable anti-virus scanner to ensure they don't contain malware, viruses or
Trojans.


Phishing Scams
Hackers and criminals frequently use phishing emails to obtain personal information by just asking for it. While this might sound a bit outrageous, the criminals are able to do this by composing email messages that appear to come from legitimate banks, financial institutions, social networks and other legitimate enterprises. After composing the phony emails, hackers send them out by the thousands with the hope that only a few misinformed users will click links in the messages and unwittingly surrender their account information, passwords or other crucial data.

Legitimate senders of important emails never ask for personal details such as your password, address, social security number or other sensitive data. Therefore, if you receive an email asking you to click a link and confirm your password or account information, report the message as a phishing email to your ISP or mail provider and then delete it immediately.

In some cases, phishing emails are identical copies of real messages from legitimate senders. Therefore, spotting the fraudulent messages may sometimes be difficult. Nevertheless, if you view the header of the message, you can view the sending domain and path traveled to deliver the message to your inbox. Look for data described as "Sent from," "Sending domain" "Origin" or something similar. If the email is authentic, it will contain the domain name of the legitimate website that sent it.
Here is an example of a real message from online pay service PayPal:



Here are some samples of typical phishing emails:



Email and Newsletter Lists
Many legitimate companies, organizations and enterprises send out newsletters, promotional emails and other correspondence to those that request them. In fact, many email users appreciate or enjoy receiving occasional correspondence from sources in certain situations. However, sometimes, you can sign up for a mailing or newsletter list inadvertently just by installing software or creating an account on a website. Consequently, you may suddenly start to receive a lot of email from a company (or its partners or affiliates) and not know why. Well, it's probably because you gave the company or website permission to do so.
Nevertheless, stopping annoying mailing or newsletter list emails is usually only slightly more difficult than signing up for them. To remove yourself from a mailing list, look for the "Unsubscribe" or "Remove" link in the email message text. In most cases, the appropriate removal link is in very small print near the bottom of the message - but it should be there. After clicking the removal link, you should no longer receive emails from that company or its affiliates. If you do continue to receive the emails, mark them as SPAM, contact the sending party and demand they remove you from their mailing list.



Reducing and Preventing SPAM
While reporting and deleting SPAM is relatively simple, it is always better not to receive it in the first place. Over time, you will receive SPAM message no matter what you do to avoid them. However, there are a few things you can do to help reduce the number of SPAM emails that reach your inbox. To help reduce your exposure to SPAM and limit the number junk emails, consider the following suggestions:

  1. Never post your email address in online forums, message boards or in signatures. Hackers have advanced software that scours the Internet for these types of sites and is able to collect any email addresses it finds on webpages.
  2. Create a secondary email address to sign-up for non-important promotions and offers. Most times, you agree to receive emails when you enter a contest, download free software or participate in many other kinds of online promotions. Creating a secondary email address enables you to avoid more clutter in your primary account.
  3. Avoid posting your email address on social network profiles. Social networking sites such as Facebook and Google+ all require you to provide your email address when creating an account. Nevertheless, you also have the option of making your email address private and not visible to other members. Take advantage of the privacy option for your email address to keep it out of the hands of data miners and hackers looking to create SPAM lists.

How to download files safely

The Lowdown On Downloading
 
How to download files safely
Everyone can benefit from the vast amount of information that can be found on the Internet, but computer owners may find online resources particularly helpful. Not only can those of us who own a computer get information off the Net whenever we want, we can also download tons of software to make our computers more productive, easier to use, and a lot more fun.



Instead of having to sort through catalogs or visit far-flung computer stores with high prices, we can now go online for the solution to most of our software needs. From utilities to web browsers, to games to icons and sounds, just about anything you might want for your computer can be found on the Internet.

However, all software is not the same. Before you download a program, you should know what you're getting:

Freeware, as its name implies, doesn't cost you a cent. There are a lot of great freeware programs out there, but most of them are small, add-on programs, plug-ins, and the like. If you want more powerful software you will have to shell out some money.
Shareware is software that has a "try before you buy" policy. Usually created by independent programmers, shareware is either fully functional once you download it, fully functional for a limited time, or partly functional. In all cases, if you like the software, the creator asks you to register and pay a nominal fee (often just $10 or $15) or delete it.
Paying the fee not only rewards people for their labor and encourages them to keep developing great software, it may also unlock certain features of the software or eliminate annoying registration reminders. The registration can usually be done online if you pay with a credit card. The software will be unlocked automatically or you will be sent a password via e-mail.

Demos are Demonstration versions of larger, more complex programs. They are often fully functional, but only contain a fraction of the whole program. Demos are often used to give you a taste of a serious game, application or utility program that will motivate you to go out and buy the full version. The line between a Demo and shareware is fuzzy (and unimportant) sometimes, but the cost for the full version of a Demo will be much higher than the typical shareware fee and you may not be able to download the full version.

Unless you have a high-speed connection you're better off buying the CD-ROM than waiting for hours to download and having your connection give out after getting only half of a 20 MB program.
Besides trying and buying new software, the Internet is the best (and sometimes the only) way to get the little pieces of software that make your computer work better: Patches, Drivers and Plug-Ins.
Patches or Updates are files that fix bugs or add certain functions to software and your operating system.

Drivers are files that allow your computer to operate additional hardware, such as printers, sound and video cards, and external drives.

Plug-Ins are files that work seamlessly with an application to improve its functionality. Most of us are familiar with browser plug-ins such as QuickTime and Java.
Before you go download crazy, however, you must have the right tools. The majority of files available for downloading are compressed and encoded in some manner. Compression reduces the file by "squishing" more data into less space, which reduces download time significantly. The type of compression can be identified by the file's suffix.

Stuffit (.sit) and Zip (.zip) are the most common. Encoded files can also have a suffix such as BinHex (.hqx), Mac Binary (.bin) and uuencoded (.uue).

Lucky for you, many of the programs you download are saved as a Self-Extracting Archive (.sea), which means the file is compressed, but it decompresses itself with a simple double-click. If you download one that's not you'll need to have a program that can decompress your files before you can use them. There are several great programs, such as Aladdin Systems' Stuffit Expander and Winzip, available on the Net.

Stuffit Expander exists as freeware so you can download it for free and decode just about anything. It can be found at http://www.aladdinsys.com/expander/index.html. Note that Mac users will have to add Expander Enhancer (about $30) to get full functionality. Winzip, probably the most popular compression utility for Windows users, can be found at http://winzip.com.

A neat feature of the latest version of Winzip 6.3 is the Internet Browser Support Add On that you can download from this site as well. This add on will automate much of the work normally associated with downloading compressed files from the Internet. When you click on a Zip file using Netscape Navigator/Communicator or Microsoft Internet Explorer, WinZip will take over when the download is completed. WinZip automatically moves the downloaded file to your download folder (initially set to c:\download) and then (optionally) opens the file.

Protecting Your Computer Because programs spread viruses, you should also use an anti-virus program, such as Symantec's Norton Anti-Virus (available at http://www.symantec.com) to check all of your downloaded software before installing it on your hard drive. (To get more information on viruses review June's Netspeak column found on TCIG&D's web site at http://www.tcigd.com.)
Now that you've got the right tools and have an inkling of what's available, it's time to hit the Net! Some of the most popular and trustworthy download sites include:

* Jumbo (http://www.jumbo.com), * Shareware Junkies (http://www.sharewarejunkies.com), * Shareware.Com (http://www.shareware.com), * TUCOWS (http://www.tucows.com) * ZDNet Software Library (http://www.hotfiles.com), and * Download.Com (http://www.download.com).
All of these sites are well organized, have links with good connections and are safe. You don't need a secure site, but you should be suspicious of any site that requests personal information before allowing you to download free software.

It's a good idea to start downloading smaller files first to get used to decoding and dealing with the inevitable broken connections. Some programs are supposed to pickup the download where it left off when your connection breaks. Oftentimes, however, you will have to start over at the beginning.
As data rates increase with cable modems and the like, it's probable that a majority of software will be transmitted over the Internet rather than sold on disks or CD-ROMs, so you'd be wise to become an expert now. By getting your practice in on files that are just a few hundred kilobytes, you'll be able to deal with issues that arise with multi-megabyte downloads in the not-too-distant future.

Best Anti-Virus And Anti-Malware Tools


 Introduction

Hackers and other unscrupulous Web users release hundreds of new malware applications and viruses on to the Internet every day. Consequently, chances are good -- unless you're extremely lucky -- that your computer will become infected with at least one bad file at some point or another. Your chances of encountering a malware or virus infection shoot to nearly 100 percent if you don't protect the computer with a quality anti-virus/malware program. While there are hundreds of applications available that offer protection against infections, some are more effective than others. To help you wade through the clutter and find the best AV and anti-malware tools available to you, we present our list of the five best applications for keeping your PC safe from viruses and malware.

1.) BullGuard Internet Security 2015

Although not nearly as well-known as other AV industry giants like Norton, McAfee and Microsoft, BullGuard is (according to our tests) the best anti-virus suite available. Add to that the fact that BullGuard offers excellent value with a $59.99 annual license for three computers, and Internet Security 2015 is hard to beat. In our testing, BullGuard Internet Security 2015 achieved perfect 100% scores in all areas including virus detection/neutralization, false positive recognition and malicious/phishing website blocking.
BullGuard Internet Security also includes a hardened firewall that helps protect your PC and network from hackers. If that's not enough, BullGuard Internet Security 2015 also ships with plenty of tools for keeping your system updated and running optimally. Finally, in our testing of anti-virus suites, BullGuard is hands down the fastest application we have seen in terms of scan speeds and low system-resource usage. With all of these features and its first-rate performance, BullGuard wins our award for Best in Class AV Suite Application. The only drawback with BullGuard Internet Security 2015 is there is no single-PC license available. Therefore, if you want to protect only a single computer, you must use the standalone BullGuard Antivirus Pro product.





2.) Avira Internet Security Suite 2015
Relatively unknown only a few years ago, Avira has crept into the list of the top ten largest anti-virus developers slowly and steadily -- according to market share reports released by AV industry watchdog OPSWAT. There is good reason why more and more users are turning to Avira, though - top-notch anti-virus and malware protection at an affordable price. For just $26.99, you can protect a single PC for a whole year, and $55.99 gets you an annual subscription for three computers.
Just like BullGuard, Avira Internet Security Suite 2015 scored perfect 100s across the board in our testing. The only thing that makes BullGuard slightly better in our opinion is its blistering speed and super-low resource usage. Nevertheless, Avira does very well in these areas also. One thing we should note about Avira is its thoroughness of scans. With the default settings intact, Avira scans more objects and file types than any other AV suite we have tested. Additionally, Avira allows you to download the entire suite with a single-PC license - unlike BullGuard, which only offers the full AV suite for users with three or more machines.


3.) Kaspersky Internet Security 2015
Kaspersky AV products often rank among the best available whether it be in professional reviews or user ratings - and Kaspersky Internet Security 2015 is no exception. At first glance, Kaspersky's $79.99 price tag for a single PC annual subscription does seem a bit expensive. However, if you consider the top-shelf protection and extra features that Kaspersky offers, the product is indeed a value.
Kaspersky scored a perfect 100 percent in our virus detection and neutralization testing and an excellent 93.75% in false positive tests. While Kaspersky, is not as effective at recognizing safe, false positive files as are Avira or BullGuard, the AV suite does not delete detected suspicious files automatically - but rather lets you decide if you wish to do so.
Kaspersky's malicious website and anti-phishing tools are first rate and scored a perfect 100 percent in our tests. Additionally, Kaspersky Internet Security 2015 offers added value with a host of added tools and features for keeping Windows updates, troubleshooting your computer and improving performance. Finally, Kaspersky Internet Security 2015's parental controls and vulnerability scanning features are among the best we have seen. One of the few negatives with Kaspersky, though, is the small type and icons used in the interface, which may make them hard to view on some computer monitors or touchscreen devices.

4.) ESET Smart Security 8
Founded in 1987, ESET is one of the oldest names in the anti-virus industry. ESET's long, proven track record of providing quality anti-virus products is well-known among users and enthusiasts who require reliable performance in an easy-to-use package. With a $59.99 annual subscription for a single PC, ESET Smart Security 8 is a bit more expensive than many other AV suites we reviewed. However, ESET provides top rate, real-time protection against viruses and added bonus tools such as Parental Controls, a hardened firewall and system optimization utilities.
In our testing, ESET Smart Security 8 scored a perfect 100 percent in virus detection and removal. In our false positive and anti-phishing tests, ESET also performed admirably achieving scores of 93.75% and 80% respectively. Scan speed with ESET is also fast and system-resource usage levels are acceptable, which means you will be able to use your PC productively during scans - albeit ESET is not as fast or system friendly as BullGuard or Avira. Nevertheless, ESET is a powerful AV product that offers excellent protection and an abundance of useful features.


5.) Panda Internet Security 2015

Founded in 1990, Panda Security has long been a well-known name for AV protection in Europe. Due to the company's impressive record of providing quality anti-virus software, Panda products are now popular all over the world. Panda's latest offering, Internet Security 2015, carries on that proud tradition and finds itself in our list of the top five AV products available because of its thorough scans and first-class virus detection and neutralization scores.
At the time of publication, Panda Internet Security 2015 is one of the best values available in an AV suite. With Panda's current promo, you can protect a single PC with Internet Security 2015 for only $29.99. Better yet, for only $41.99, you can purchase a full year subscription that allows you to use the powerful security suite on up to three computers or devices.
Panda Internet Security 2015 scored exceptionally well in our virus detection and removal tests achieving a perfect 100% score. Additionally, Panda ships with the best-looking, easiest-to-use interface we have seen during our reviews and tests. Panda's value doesn't end with the excellent UI and top-notch scanning performance, though, Internet Security 2015 also includes a slew of useful tools such as Parental Controls, a Firewall, a Process Monitor, Wi-Fi Monitor and a Data Shield. All of these features, and the program's low price, make Panda easily one of the best values in an AV suite.
In addition to scoring a perfect 100% in our virus and neutralization tests, Panda also did well in our false positive testing, attaining a very respectable 87.5% score. Panda did not do so well in the malicious and anti-phishing site-blocking test, though, and scored only a mediocre 50 percent. Still, Panda's exceptional AV engine, host of features and low price definitely make it worthy of inclusion in our list of the five best anti-virus applications.



Must Have Malware Tool - Malwarebytes Anti-Malware Premium
While not technically an anti-virus application, Malwarebytes Anti-Malware is a must-have for any system you use to connect to the Internet. For all intents and purposes, Malwarebytes Anti-Malware is primarily an anti-spyware application. However, with the program's ever-growing list of malware, spyware and virus signatures, this add-on program picks up many problem files that traditional AV suites miss.
There are two versions of Malwarebytes Anti-Malware - the free and paid versions. While the Malwarebytes Anti-Malware Free is based off the same powerful anti-malware engine as the premium revision, upgrading to the paid version is really a good investment. For only $24.95, you can purchase a license, which allows you to protect three PCs with real-time protection against malware, spyware and malicious website threats automatically. The free version of Malwarebytes Anti-Malware is certainly an excellent product. However, since the free version allows for manual scans only, the premium version offers protection that is much more reliable.


Malwarebytes Anti-Malware is also one of the few products you can install on a system infected with certain types of spyware or malware. Malwarebytes offers a stealth-mode installer, called Chameleon, that enables you install the suite on system infected with malware that can block the installation of other virus/malware cleaners.

Malwarebytes Anti-Malware comes with all sorts of advanced settings for determining how strictly the program monitors and detects rogue applications, malware and other unknown file types. You can set up the program to scan for rootkits, non-malware programs and monitor browser usage for malicious or phishing websites. In our tests, Malwarebytes Anti-Malware's anti-phishing and
 malicious website tools are among the finest we have reviewed.



Malwarebytes Anti-Malware is not meant to be an all-in-one, or standalone, anti-virus or security solution. However, when paired with a reliable security suite (such as those listed above,) the application offers excellent add-on protection from spyware, root kits and malicious websites that other AV applications just cannot match.

In conclusion, all of the above AV suites are excellent choices for protecting your computer against viruses. Nevertheless, you should always consider installing Malwarebytes Anti-Malware just for the excellent spyware and malicious website detection the program offers. Even if you don't get the premium version of Malwarebytes Anti-Malware, install the free version and be sure to do manual scans daily to protect your PC from the latest threats. 

how to be protected from computer virus

Here are some actions you can take:
  1. Install an antivirus program. ...
  2. Don't open email attachments unles s you're expecting them. ..
  3. Keep your computer updated. ...
  4. Use a firewall.‌ Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer.

Tips for protecting your computer from viruses



Protecting your computer from viruses and other threats isn't difficult, but you have to be diligent. Here are some actions you can take:
  • Install an antivirus program. Installing an antivirus program and keeping it up to date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your email, operating system, or files. New viruses appear daily, so set your antivirus software to install updates automatically.

  • Don't open email attachments unless you're expecting them. Many viruses are attached to email messages and will spread as soon as you open the email attachment. It's best not to open any attachment unless it's something you're expecting. For more information, see When to trust an email message.

  • Keep your computer updated. Microsoft releases security updates that can help protect your computer. Make sure that Windows receives these updates by turning on Windows automatic updating. For more information, see Turn automatic updating on or off.

  • Use a firewall.‌ Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.

  • Use your browser's privacy settings. Being aware of how websites might use your private information is important to help prevent fraud and identity theft. If you're using Internet Explorer, you can adjust your Privacy settings or restore the default settings whenever you want. For details, see Change Internet Explorer 9 privacy settings

  • Use a pop-up blocker with your browser. Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.
    The Pop-up Blocker feature in Internet Explorer is turned on by default. To learn more about changing its settings or turning it on and off, see Change Internet Explorer 9 privacy settings

  • Turn on User Account Control (UAC). When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes. To learn more about turning on UAC and adjusting the settings, see Turn User Account Control on or off.


Computer Viruses:
Protecting Your Computer from Unwelcome Intruders.

When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years. These program codes have gone beyond mere annoyances with the worst kinds disabling your PC, but they have become portals for remotely perpetuating more sinister activity that can clandestinely hack into sites, mount denial of services or steal confidential and personal data for fraudulent financial gain at your expense.

Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to them.

In 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.

The 2011 Norton Cybercrime Report reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware. But when you consider that roughly 4.3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection. 

What can I do to protect myself from computer viruses and Trojans?

These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.

A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.

In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.

Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.

Protect Yourself

There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.

Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.

Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.

If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.

Prevention

Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).

1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.

2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.
Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.

3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.

If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.

5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs

6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.

7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.

8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses. 

9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site: http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.

Help on the Web

The Virus Bulletin (www.virusbtn.com) offers a list of viruses that are floating through the computer world at present. The site also offers the opportunity to report viruses, should you be unfortunate enough to encounter a new one firsthand.

If your computer is not on a network, and you never, ever install new programs or download files from the Internet or open email enclosures, you don't have to worry about viruses. But that's like living in a sealed bubble. Most of us have to go out into public every day, where we're subject to the germs carried by others (though natural immunities will usually protect us from most of them.) Likewise, most people also have to update their software and are interested in communication and information from others. Luckily, there are some preventions and cures for even the nastiest of viruses.

See Anti-virus Programs 

Anti-Virus Programs
Protecting Your Computer with Anti-Virus Programs
Should I invest in a Antivirus Programs and how do they work?



You'll never regret investing in a good anti-virus utility for your system. It's like insurance—even if you never accidentally download an infected file, you'll be extremely glad you have the program when it protects you. For instance, one friend saved himself from having to reinstall his entire system because his copy of McAfee's Virus Scan identified a virus in a file a commercial artist had given him. Surprisingly, the artist knew his computer had been crashing a lot lately, but still couldn't be bothered to get an anti-virus utility for himself—he's probably still passing out infected files to his clients. Unfortunately choosing a anti virus programme is not as simple as it should be. Some programs, even well know brands can actually slow your computer down so much as to stop its effecient functioning.

Always make sure you only have one AV Program installed on your pc at one time as having two or more working simulataneously can really effect a pc's performance not to mention affect the efficacy of its AV Program.

Anti-virus Programs

The most popular anti-virus programs - whether they're free ‎or not will scan your hard drive for infected files. They look for markers, usually internal strings of code, for known viruses, and sometimes also check a file's name against a database of known trojan horses. The commercial programs also often let you update their database of known viruses and trojan horses, either for free or for a nominal fee. But since this won't catch the newest of the new viruses, the programs can also check to see if a program, or your system, is modifying itself. But though this is a good indicator of a virus, it can also mean you've added a utility to your system, or you're using a self-modifying 

program, like a database, and the many false-positives you get can be annoying. If they've identified a virus in a file, the programs can also strip the virus out of the file, but I don't recommend doing so. If you're a conscientious computer user, you back up your computer regularly—that is, every time you use it. It's best to replace an infected file with an uninfected copy. Though an anti-virus program will successfully remove a virus (or tell you if it can't), it could damage the original file, or worse yet, leave a "virus ghost" that sets off the anti-virus utility's alarm, even though it's harmless.

The very best programs can also scan a floppy disk when you insert it into your floppy disk drive, and check a downloaded file the moment it's complete on your drive—or alternately, quickly check a file when you launch it—so you're protected before a virus can even make it to your system.

Trends in malware are always changing as exploiters try to keep ahead of the anti malware products designed to stop them.Make no mistake cyber security is an increasing buzz word and your online privacy and security is at risk and cannot be taken lightly.This is why it's very important to keep whatever virus protection you use, up to date.

The Internet is a fabulous resource. You can download hard-to-find files and programs at any hour, day or night, onto your computer system. You don't have to isolate yourself to protect yourself, but you should have some insurance against the nasty, invisible viruses and trojan horses that can bring your computer to its knees.






 

Friday, December 25, 2015

Ufugaji wa kuku

Ufugaji wa kuku una faida kubwa, lakini mkulima anatakiwa kuzuia kadri awezavyo uwezekano wa kuwepo magonjwa shambulizi.




Wafugaji wengi wamekuwa wakiwekeza katika ufugaji wa kuku. Ufugaji huo unalenga kuku wa kisasa au wa kienyeji. Wanajenga mabanda, kununua chakula, pamoja na kuku, wakitarajia kupata faida kubwa kutokana na uwekezaji huo. Hata hivyo, mradi unapoanza mambo huonekana kwenda sawa, mpaka mfugaji anaposhtuliwa na mlipuko wa magonjwa ambayo hupunguza uzalishaji au kuua kuku.


Mfugaji anaweza kufanya nini kupunguza hatari hii?

Mbinu zinazotumiwa na wakulima duniani kote zinanaonesha kuwa kuweka banda katika hali ya usafi, kuwalisha kuku ipasavyo na kuwapatia maji safi, ndiyo njia ya kwanza muhimu ya kupambana na magonjwa, kama vile mharo mwekundu, kipindupindu cha kuku, na ndui. Kuwa makini katika ufugaji wa kuku ni pamoja na kutoa chanjo kwa kuku, kuzuia magonjwa kama sotoka au ndigana na ndui.


Taratibu za kufuata ili kuzuia magonjwa

Utunzaji wa banda la kuku
• Ni lazima nyumba ya kuku iwe safi na kavu muda wote
• Nyumba ya kuku iwe na nafasi za kupitisha hewa ya kutosha ili kuepuka joto na unyevunyevu
• Hakikisha unaondoa matandazo na takataka zote kwenye banda wakati wote. Matandazo na taka zinaweza kuwa mbolea nzuri ya mboji kwa mimea yako.
• Fagia banda na kuhakikisha ni safi wakati wote. Weka matandazo mapya mara kwa mara.
• Weka nafasi ya kutosha kuku kupumzikia, viota vya kutosha, na kuweka maji sehemu ambayo ni rahisi kusafisha.
• Hakikisha unaondoa wanyama kama panya na wadudu nyemelezi kwenye sehemu ya malisho ya kuku kwani wao hubeba vimelea vya magonjwa.



Utunzaji wa kuku
• Toa chanjo muhimu kwa kuku ili kuzuia magonjwa kama utakavyoshauriwa na mtaalamu wa mifugo. Chanjo huanza katika wiki ya kwanza (mfano chanjo ya kuzuia sotoka) na inaweza kurudiwa baadaye.
• Epuka kuweka kuku wengi mahali pamoja kwani ni rahisi magonjwa kuenea kwa haraka kuku wanaporundikana.
• Tenganisha vifaranga na kuku wakubwa (isipokuwa kutoka kwa mama) kwa sababu vifaranga ni rahisi na wepesi sana kushambuliwa na magonjwa.
• Weka mipaka na madaraja ya sehemu za kuku kuzunguka/kucheza.


Ulishaji

• Wapatie kuku chakula cha kutosha na chenye virutubisho vyote. Unaweza kuwaongezea majani, makombo, nafaka, mchanga laini, au maganda ya mayai.
• Wapatie kuku maji safi muda wote. Wafugaji wengi wameripoti kuwa na matokeo mazuri baada ya kuchanganya dawa ya kuua vimelea kwenye maji ya kunywa.
• Safisha vyombo vya kulishia na kunyweshea kila siku. Osha, sugua vizuri, kisha suuza kuondoa utando unaobeba bakteria.
• Nunua chakula kwa wauzaji wazuri na wanaoaminika ili kuepuka minyoo na sumu hatarishi.
• Hifadhi chakula cha kuku katika sehemu kavu isiyo na joto na isiwe kwa zaidi ya miezi mitatu ili kuepuka kuharibiwa na fangasi.
• Usiwape kuku chakula chochote kinachoonekana kuoza au kunuka uvundo. Kukabiliana na magonjwa
• Muone mtaalamu wa mifugo mara uonapo dalili zozote za kuumwa kwa mifugo wako.
• Watenge na uwapatie tiba au kuwaua na kuteketeza kabisa kuku wagonjwa kuepuka kuenea kwa magonjwa.
• Ondoa ndege waliokufa mara moja, uwafukie au kuchoma moto. Usile kuku aliyekufa. Baadhi ya magonjwa ya ndege yanaweza kuambukizwa kwa binadamu.
• Endapo kuna mlipuko wa ugonjwa katika eneo lako, usiruhusu watu kutembelea banda lako. Watu wanaweza kuleta maambukizi kwa miguu yao katika mabuti, nguo na mikono. Pia magari yanaweza kuleta madhara kwa mabanda yako kupitia matairi na upakuaji wa mizigo.


Ukaguzi wa mara kwa mara

Kila siku
• Safisha vyombo vya kulishia na kunyweshea pamoja na viota.
• Ondoa kinyesi.
• Waangalie kuku wako kwa makini ili kujua afya na maendeleo yao.

Kwa wiki
• Ondoa matandazo machafu na kuweka mapya.


Kwa mwezi
• Angalia uwepo wa wadudu na chawa, kisha utibu kama kuna ulazima.


Zingatia haya kabla ya kuleta mifugo wapya bandani
1. Ondoa matandazo yote, vyombo vya kulishia na kunyweshea.
2. Ondoa uchafu wote unaoonekana bandani.
3. Safisha banda lote kwa kutumia maji na dawa.
4. Suuza na uache likauke.
5. Puliza dawa ya kuua wadudu.
6. Weka matandazo mapya, weka viombo vya kulishia na kunyweshea.

C++ Data Structures

C/C++ arrays allow you to define variables that combine several data items of the same kind but structure is another user defined data type which allows you to combine data items of different kinds.
Structures are used to represent a record, suppose you want to keep track of your books in a library. You might want to track the following attributes about each book:
  • Title
  • Author
  • Subject
  • Book ID

Defining a Structure:

To define a structure, you must use the struct statement. The struct statement defines a new data type, with more than one member, for your program. The format of the struct statement is this:
struct [structure tag]
{
   member definition;
   member definition;
   ...
   member definition;
} [one or more structure variables];  
The structure tag is optional and each member definition is a normal variable definition, such as int i; or float f; or any other valid variable definition. At the end of the structure's definition, before the final semicolon, you can specify one or more structure variables but it is optional. Here is the way you would declare the Book structure:
struct Books
{
   char  title[50];
   char  author[50];
   char  subject[100];
   int   book_id;
}book;  

Accessing Structure Members:

To access any member of a structure, we use the member access operator (.). The member access operator is coded as a period between the structure variable name and the structure member that we wish to access. You would use struct keyword to define variables of structure type. Following is the example to explain usage of structure:
#include <iostream>
#include <cstring>
 
using namespace std;
 
struct Books
{
   char  title[50];
   char  author[50];
   char  subject[100];
   int   book_id;
};
 
int main( )
{
   struct Books Book1;        // Declare Book1 of type Book
   struct Books Book2;        // Declare Book2 of type Book
 
   // book 1 specification
   strcpy( Book1.title, "Learn C++ Programming");
   strcpy( Book1.author, "Chand Miyan"); 
   strcpy( Book1.subject, "C++ Programming");
   Book1.book_id = 6495407;

   // book 2 specification
   strcpy( Book2.title, "Telecom Billing");
   strcpy( Book2.author, "Yakit Singha");
   strcpy( Book2.subject, "Telecom");
   Book2.book_id = 6495700;
 
   // Print Book1 info
   cout << "Book 1 title : " << Book1.title <<endl;
   cout << "Book 1 author : " << Book1.author <<endl;
   cout << "Book 1 subject : " << Book1.subject <<endl;
   cout << "Book 1 id : " << Book1.book_id <<endl;

   // Print Book2 info
   cout << "Book 2 title : " << Book2.title <<endl;
   cout << "Book 2 author : " << Book2.author <<endl;
   cout << "Book 2 subject : " << Book2.subject <<endl;
   cout << "Book 2 id : " << Book2.book_id <<endl;

   return 0;
}
When the above code is compiled and executed, it produces the following result:
Book 1 title : Learn C++ Programming
Book 1 author : Chand Miyan
Book 1 subject : C++ Programming
Book 1 id : 6495407
Book 2 title : Telecom Billing
Book 2 author : Yakit Singha
Book 2 subject : Telecom
Book 2 id : 6495700

Structures as Function Arguments:

You can pass a structure as a function argument in very similar way as you pass any other variable or pointer. You would access structure variables in the similar way as you have accessed in the above example:
#include <iostream>
#include <cstring>
 
using namespace std;
void printBook( struct Books book );

struct Books
{
   char  title[50];
   char  author[50];
   char  subject[100];
   int   book_id;
};
 
int main( )
{
   struct Books Book1;        // Declare Book1 of type Book
   struct Books Book2;        // Declare Book2 of type Book
 
   // book 1 specification
   strcpy( Book1.title, "Learn C++ Programming");
   strcpy( Book1.author, "Chand Miyan"); 
   strcpy( Book1.subject, "C++ Programming");
   Book1.book_id = 6495407;

   // book 2 specification
   strcpy( Book2.title, "Telecom Billing");
   strcpy( Book2.author, "Yakit Singha");
   strcpy( Book2.subject, "Telecom");
   Book2.book_id = 6495700;
 
   // Print Book1 info
   printBook( Book1 );

   // Print Book2 info
   printBook( Book2 );

   return 0;
}
void printBook( struct Books book )
{
   cout << "Book title : " << book.title <<endl;
   cout << "Book author : " << book.author <<endl;
   cout << "Book subject : " << book.subject <<endl;
   cout << "Book id : " << book.book_id <<endl;
}
When the above code is compiled and executed, it produces the following result:
Book title : Learn C++ Programming
Book author : Chand Miyan
Book subject : C++ Programming
Book id : 6495407
Book title : Telecom Billing
Book author : Yakit Singha
Book subject : Telecom
Book id : 6495700

Pointers to Structures:

You can define pointers to structures in very similar way as you define pointer to any other variable as follows:
struct Books *struct_pointer;
Now, you can store the address of a structure variable in the above defined pointer variable. To find the address of a structure variable, place the & operator before the structure's name as follows:
struct_pointer = &Book1;
To access the members of a structure using a pointer to that structure, you must use the -> operator as follows:
struct_pointer->title;
Let us re-write above example using structure pointer, hope this will be easy for you to understand the concept:
#include <iostream>
#include <cstring>
 
using namespace std;
void printBook( struct Books *book );

struct Books
{
   char  title[50];
   char  author[50];
   char  subject[100];
   int   book_id;
};
 
int main( )
{
   struct Books Book1;        // Declare Book1 of type Book
   struct Books Book2;        // Declare Book2 of type Book
 
   // Book 1 specification
   strcpy( Book1.title, "Learn C++ Programming");
   strcpy( Book1.author, "Chand Miyan"); 
   strcpy( Book1.subject, "C++ Programming");
   Book1.book_id = 6495407;

   // Book 2 specification
   strcpy( Book2.title, "Telecom Billing");
   strcpy( Book2.author, "Yakit Singha");
   strcpy( Book2.subject, "Telecom");
   Book2.book_id = 6495700;
 
   // Print Book1 info, passing address of structure
   printBook( &Book1 );

   // Print Book1 info, passing address of structure
   printBook( &Book2 );

   return 0;
}
// This function accept pointer to structure as parameter.
void printBook( struct Books *book )
{
   cout << "Book title : " << book->title <<endl;
   cout << "Book author : " << book->author <<endl;
   cout << "Book subject : " << book->subject <<endl;
   cout << "Book id : " << book->book_id <<endl;
}
When the above code is compiled and executed, it produces the following result:
Book title : Learn C++ Programming
Book author : Chand Miyan
Book subject : C++ Programming
Book id : 6495407
Book title : Telecom Billing
Book author : Yakit Singha
Book subject : Telecom
Book id : 6495700

The typedef Keyword

There is an easier way to define structs or you could "alias" types you create. For example:
typedef struct
{
   char  title[50];
   char  author[50];
   char  subject[100];
   int   book_id;
}Books;
Now, you can use Books directly to define variables of Books type without using struct keyword. Following is the example:
Books Book1, Book2;
You can use typedef keyword for non-structs as well as follows:
typedef long int *pint32;
 
pint32 x, y, z;
x, y and z are all pointers to long ints
perPage: 7,