Thursday, July 22, 2010

Computer Laboratory technical reports

The Computer Laboratory has published a Technical Report series (ISSN 1476-2986) since 1974. Technical reports are intended primarily for the long-term archival of results and descriptions that are not suitable for publication elsewhere, due to their length or nature. Technical reports are also the most common way to make a Computer Laboratory PhD thesis widely available. Most newer technical reports, in particular all published since 2002, are available online in PDF.

Tuesday, July 20, 2010

live cricket

Saturday, July 17, 2010

Antivirus software

 

Antivirus software

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware for which no signature exists yet. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack. In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period
.

Data Recovery Software

Data recovery

Data Recovery basically means the process of acquiring back usable data from the damaged, corrupt media or storage device. The loss of important data can cause fall down of businesses, leaving you and your company in the most evil situation to face.

Chily Softech, the technologically advanced data recovery software company helps you to recover your lost data from the inaccessible, downed, damaged or corrupted media and storage device(s) with the help of RecoveryFIXTM data recovery software range. Our experienced data recovery engineers have the expertise, knowledge and have developed the newest and result-oriented data recovery software and disk recovery software tools to recover lost data from the inaccessible drives, storage media(s) and from the most critical situations when the hope of getting back lost data gets lessened.

The most common causes for data loss are due to virus attacks, human errors, software / hardware failures, technical problems and many more which results in confidential data loss, business data loss, project delays, loss of personal collections like music, photographs, files etc.

RecoveryFIXTM data recovery Software range includes tools for email recovery, backup recovery and Office file recovery software. you can easily buy online our best selling RecoveryFIXTM range of hard drive data recovery software tools. RecoveryFIXTM hard drive recovery software are cost effective and result oriented data recovery software.

GO TO THIS LINK AND DOWNLOAD

Computer software

Computer software

Computer software, or just software, is the collection of computer programs and related data that provide the instructions telling a computer what to do. The term was coined to contrast to the old term hardware  (meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be touched". Software is also sometimes used in a more narrow sense, meaning application software only. Sometimes the term includes data that has not traditionally been associated with computers, such as film, tapes and records.

Friday, July 16, 2010

TYPES OF MOTHERBOARD AND ALL COMPONENTS

ASUS M4A88TD-V EVO/USB3 Motherboard

The AMD 880G Northbridge and SB850 Southbridge are two of the latest bits of chipset silicon designed to bolster AMD's position in the mainstream PC market. They were released about a month apart this Spring, as part of a full line of 800-series chips, and ASUS wasted no time putting them into production. Key items that help make the M4A88TD-V EVO/USB3 motherboard stand out are native support for SATA 6Gb/s, USB 3.0, and AMD's latest game changer, the Phenom II X6 CPU.  With both Core Unlocker and Turbo Unlocker functionality built right into the board, this combination could be the magic ticket to dynamic-clocked, quad core processing on the cheap.  Benchmark Reviews is pleased to review one of the latest ASUS motherboards, using the latest entries from AMD's new 800-series chipset.

ASUS_M4A88TD-V_EVO_USB3_Motherboard_.jpg 


PEN DRIVE

What is a Pen Drive?

Pen  drives are classified as NAND style data storage  devices. Equipped with a large amount of memory capacity, the pen drive is considered to be an improvement on both the older floppy drive  disks and the more modern compact disks that are often used to copy data and reload the files on a different hard drive. Even a pen drive with a relatively low storage capacity tends to provide plenty of space for a number of files. The types of files that can be loaded onto a pen drive are all the common types that can be housed on any hard drive. This makes it possible for persons to copy photos, spreadsheets, word processing documents, movie clips, music tracks, and just about any other type of file.

Utilizing a pen drive is a simple task. One end of the drive is equipped with a USB connector at one end. The connector is inserted into the USB port on a desktop or laptop and activated. Once the pen drive is in place, it is possible to drop and drag files into the memory of the drive, or forward the files to the drive. The process is no more difficult than attaching files to an email or copying files onto a disk.

 Because there are several different operating systems in common use today, there are various types of levels of the pen drive that are configured to work with each system. Even persons who are using an older operating system can usually find a pen drive that is compatible. As long as the desktop or laptop is constructed with a USB port, and the pen drive is compatible with the operating system, the pen drive will provide practical and easy transmission of data from one hard drive to another one in a matter of minutes.