Welcome to TechProceed

An ever growing website consists of top quality article collections pertaining to Latest Technology, Cool gadgets, Computers, Mobiles, Software, Guides, How-Tos, Downloads, Tips and Tricks, Virus removals, Troubleshooting, Entertainment, etc

If you use the Internet, your computer is at risk of infection from viruses.  Much like biological viruses, some are harmless, some are merely annoying and some can make your life hell. Even if you only occasionally use your home computer, it is important that you understand the risks and know how to protect yourself.

What is a virus?

In the 1990s the public's impression of what a virus is came from the media. Newspapers reported how  programs such as Michaelangelo[1]  would could cause a financial appocalypse by infecting computers around the world and deleting vital data. If a virus announces its presence in such a melodramatic way as shutting down your PC or deleting your data, although you might find it infuriating, at least you know that you have a problem. Far more dangerous are the new breed of crimeware viruses, unwelcome programs that run unnoticed while you continue to use your computer, blissfully unaware that you are at risk.
 
A virus is a form of malware (malicious software)Malware is software on your computer that you didn't intentionally install, that is running against your wishes and against your interests. Precisely defining the distinction between a virus and other types of malware can get confusing and the definitions are constantly evolving. For now just rememeber that a virus is a form of malware and that malware is bad news for you and your computer.
 

Why do people make viruses and other malware?

Some eccentric people make viruses for fun or as a personal challenge, but these are generally harmless or annoying at worst. A lot of malware is now written with truly criminal intent and is designed to acheive financial gain for their creator at your expense. Don't assume that the target is only big business because home users are equally at risk. Here are some common motives for creating malware.

Stealing your bank details

Your bank will have warned you that shopping on the Internet involves a risk of people stealing your financial details. This can result either from inadequate security considerations by the online seller or because you have some form of malware on your computer.  This is a scary thought when you consider that certain transactions can take money from your account immediately if the criminal has access to the right details.

Stealing your identity

Even if you don't shop online, you could potentially end up in a lot of difficulty if someone steals your identity. Many websites request that you provide them with personal details that may seem innocuous enough, but to criminals can provide the first step to identity theft. A gradual accumulation of your personal details collected by malware could be sufficient to enable someone to build up a profile of your identity and, for example, apply for credit in your name. You might not find out about this until the credit company has started hassling you for the repayments.

Using your computer for illegal activity

Have you ever wondered where all those spam e-mails come from offering investment tips, cheap viagra and breast enlargemnts?  One way that spammers get junk mail delivered is to send it using software, known as bots,  running secretly on other people's computers.  With millions of computers connected to the Internet, malware that uses innocent home users' equipment for dubious or illegal activities can put a lot of power in the hands of deviant people.

Find out if you're infected

By now you should understand that malware is a bad thing and it can affect you.  One last misconception needs to be addressed:
 
Misconception: 'You only get viruses from dodgy looking websites and emails'.
 
The reason why this isn't true will be explained later. For now, let's address the problem.
 

Antivirus software

The practical defence for home users is antivirus software. Crucially this software must be up-to-date. If your computer came with trial antivirus software that has now expired it's as good as useless. This is because there are hundreds of new threats crawling the Internet every year and if your antivirus software hasn't received its updates, it can't defend you against an attack. So, if you don't have antivirus software or if your software is out of date, you must install an antivirus program.  Here's how:

1.  Manually air gap the computer

Disconnect your computer from the Internet immediately, preferably physically (i.e. disconnect your modem or network cable).
 

2. Download antivirus software from a trusted source using a clean computer.

Use a computer that is already running up-to-date reputable antivirus software to download the latest antivirus installation software, then burn the installation files CD or DVD. If you don't want to pay for antivirus software, some antivirus companies offer free antivirus software for home use. Make sure you download from a source that has a reputation for virus free downloads such as www.download.com. Avast! Home Edition and AVG Antivirus Free Edtion are two popular antivirus products that are free for home use, easy to download and easy to install[2].
 
If downloading and burning isn't possible or seems too complicated you're probably going to have to buy some software from your local computer shop. There are many commercial antivirus products available off-the-shelf  for home use. Ask the dealer which product will suit you best. 

3. Stop suspicious software from running

Kill any processes that are running that you suspect may be malware.  To do this, bring up Task Manager (by pressing Control, Alt and Delete at the same time and then clicking on Task Manager) then look through the list of processes on the processes tab.  Make a note of the names of all the processes, then using an uninfected computer, look up the names of these processes on a reliable site If possible, manually stop any unidentified or malware processes on the infected machine using the End Process button from Task Manager.  You should also try to stop any unnecessary or suspicious applications from running using the End Task button on the Applications tab in Task Manager.  Leave your computer running in this condition as malware is likely to restart if you restart the infected computer.
 

4. Backup your data

Backup your important personal files to CD, DVD or another form of removable media. Beware that these files may contain infected material so put a warning label on the disk.  These backups are for an emergency restore only, such as if the files on your hard drive are wiped unintentionally later on in the procedure or if the antivirus installation prevents the computer from starting correctly.

5. Install antivirus sof tware and scan for viruses.

It is preferable to install the antivirus software in a diagnostic mode such as safe mode in Microsoft Windows[3].  Malware and extraneous operating system services are less likely to be running on you computer if you are in safe mode, hence it is less likely that the installation can be sabotaged or conflict with another program. Not all antivirus programs will allow you to perform an install in safe mode.  In that case, at least make sure that suspicious and unneccesary processes are not running by following the instructions in Step 3 before installing the antivirus software.
 
Follow the instructions supplied by your antivirus software providor to complete the installation.  This will usually involve restarting the computer and automatically retrieving the latest antivirus updates from the Internet.
 
Once you have completed the installation you should use the software to run a scan of your computer.  Depending on the age and type of your setup this may take hours, so have patience.  Once the scan is complete your antivirus software should present you with some reassuring information - either that the machine is clean or that malware has been detected that can now be bannished.  The exact procedure will vary depending on your antivirus software.
 
Make another backup of the now (hopefully) clean personal data files to CD or DVD.  If you are intending to or have to do a low-level reinstallation (see Advanced Techniques), use these backups to restore your personal data rather than those you made in step 1. 

6. Get advice on identity theft.

If you suspect that you may have been the victim of malware you need to prepare for the possibility that your identity has been stolen.  Advice may vary depending on your country, but a good starting point will  be contacting your bank.  You may need to renew accounts and cards or even file a police report.  In all cases you must keep a close watch on any future bank statements. 
If you are still having problems then you probably fall into one of two categories - either your operating system is not applicable to the process presented above or you are dealing with a particularly nasty virus that requires a more complex removal process.  In either case, if you're not confident or able to deal with the attack using advanced techniques (see 'Advanced malware removal') then you will probably have to get help from a trusted person more technical than yourself to help you.  If in doubt, contact your Internet Service Provider for advice.
 

Isn't there a faster detection method?

There are some common symptoms that arouse immediate suspicion including:
  • Computers mysteriously shutting down on their own. 
  • Programs running excessively slowly.
  • Unfamiliar processes running on the computer.
  • Unfamilar programs starting on their own or duplicating themselves.
  • Other unexpected computer behaviour.
 
Unfortunately, the most insidious attacks will not be apparent to the victim until it's too late, so looking out for syptoms alone is not a substitute for installing antivirus software. Ultimately there is no guarantee that your computer is not infected with malware. New attacks are becoming ever more sophisticated and many attacks will innevitable infect home systems before the antivirus updates are available, however, antivirus software is currently the most reliable and practical way for a home user to reduce the risk of a problem and to detect infection.
 

How do you get a virus?

Returning to the question of how malware is transmitted in the first place, it should be repeated that in the current age this is not limited to getting infected through contact with dubious material such as Internet porn sites, pirated games and unsolicited e-mails.  Although these traditional sources still propogate malware, many of today's attacks employs more subtle and sophisticated methods than, for example, the Anna Kournikova virus[4].

The Blaster worm

Blaster was a malicious program that spread itself over the Internet to Windows XP and Windows 2000 computers in 2003.  One of the syptoms was quite dramatic, effectively making a computer unusable by forcing it to shut down within seconds of booting up. Most of the high profile viruses in the recent years up until then had spread through email attachments and required a bit of assistance from the user themselves, but Blaster could spread over a network without the user being involved.  Computers without the latest Windows updates or the protection of a firewall were vulnerable merely by being connected to the Internet.

Phishing sites

Your bank has probably warned you about phishing (pronounced 'fishing') sites. Users are directed to the phishing site from a phishing email - a bogus but official looking electronic communication pursuading you to visit the phishing site. By presenting a web page that looks identical and could even appear to have the same URL as a familar trustworthy site, such as your online bank, the phishing site lures you into following instructions or submitting information in the belief that you are safe, when in fact you are submitting information to a criminal or assisting them with the installation of malware on your computer. 
 
A variation on this idea is that gaining the victim's trust by appearing that you are there to help them with an urgent problem. Some malicious webpages disguise themselves as a warning messages claiming that you have a virus but that it can be removed by following certain instructions.  Those instructions then acheive the exact opposite - exposing the computer to an attack and installing the malware.
 

Auto run from CDs, DVDs and pendrives

The PC's autorun or autoplay feature was once very useful as it enabled you to insert a disk, such as a data CD, and the software on the disk would start automatically.  As long as you only inserted media that came from a reputable source, you could be pretty sure that this feature wasn't going to automatically run any malware because in the old days, CDs read only for most users, so malware was not able to write itself to the disk media in the first place.
 
Today most users have CD or DVD burners and can use pen drives (also known as 'USB sticks' or 'memory sticks').  Although lots of CDs and DVDs are still read only, pen drives are almost always the opposite.  With the autorun feature still enabled on most computers, malware can easily install itself to and from pen drives that are inserted into your computer.  You can stop autorun from functioning by holding down the shift key while you insert the pen drive or CD. To disable the feature more permanently is a bit more complicated, but instructions are provided in a Microsoft knowledge base article.
 
The unprotected transfer of data with pen drives is so prolific at the moment, it is suspected malware has even managed to make its way onto the International Space Station using this method [5].

Staying protected

The battle against malicious attacks is an exercise in risk management and as always there is a trade off between risk and cost.  For example, when Blaster was spreading itselft over the Internet, the protected Windows XP/2000 users were those with either firewall software (which was less common at the time) or both the latest antivirus updates and the latest operating system updates.  Should you therefore religiously download and install the latest operating system updates?  Not necessarily.  Even the more rigorously tested and less frequently released service packs may not be suitable to install on your computer[6], although this is the exception rather than the rule.
 
So what can you do?  Whilst there's guaranteed solution to the problem, there are steps you can take that are not too complicated, time consuming or expensive and will help to keep you protected:
 
  1. Always have antivirus software installed and up to date. Check for web browser and OS updates regularly.
  2. Use 'strong' passwords and don't reveal them to anyone.
  3. Don't use an administrator account if you don't have to.  Most modern operating systems support accounts with different levels of privelege.  If you're just surfing the web, you don't need to be logged on as the system administrator and your normal user account doesn't need administrative priviledges.
  4. Verify the authenticity of websites and emails that request information.  Check that the webpages and emails come from the company they claim to be and are not a clever typographical variation on the company name. Be suspicious of any email requesting personal or financial information and ignore all spam mail.
  5. Don't download or install software from an untrusted source and hold down the shift key when inserting pen drives or other types of media.
  6. Use an e-mail service that scans emails for malware and don't open email attachments from an untrusted source, even if apparently forwarded by friends.
  7. Use a personal firewall. Most commercial home operating systems now come with a free firewall built in. If not, use a third party personal firewall product designed for your operating system.
  8. If while browsing the Internet you start to receive messages claiming that you have a virus, exit your web browser, disconnect from the Internet and restart your computer.  Once restarted, if you genuinely have a malware problem, your antivirus software will inform you after downloading the latest updates and doing a scan.
  9. Be suspicious of instuctions from unverifiable sources.  If an someone tells you to manually adjust the configuration of your computer, find out what the risks are and try to understand what your browser configurations actually do[7].  Never assume that an unverified source is an innocent source because it has plausible motives. A plausible positive motive is exactly what malicious attackers use as their disguise.  
In general you should be vigilant regarding computer security and not just where it concerns malware. If personal or financial data needs to be kept secret then it must be sent using a secure web page. This is usually signified by an address starting with 'https' instead of 'http' and a symbol presented by the web browser (not the webpage) such as a padlock.  Find out exactly what this should look like in your web browser so you don't fall for fakes and remember that this is only protecting the information in transit, you still need to be sure that the recipient is trustworthy.  Also, be aware that a standard e-mail is not a secure private communication - the data is very easy to read in transit by someone snooping with the right equipment. If you do send payment details over the Internet use a credit card.  Credit cards are less risky than debit cards as the seller does not receive immediate payment, so you may have time to cancel the transaction if you realise that you're being ripped off.

Advanced malware removal

Re-installation

This may seem like overkill, but re-installation is the most reliable way to get rid of a virus. The lower the level at which you can do this the better, because the aim of some malware is to entrench itself at as low a level as possible. So if you know how, format your hard drive, then re-install the OS with current anti-virus before restoring your applications and data.  Obviously you are in a better position to do this if you are pre-prepared.  Sometimes when you buy your computer it will come with a restoration disk that can be used to return the machine to its factory condition.  Keep this safe.  If not, find out from the manufacturers/suppliers if your computer has an alternative factory restoration method, and if not, look in to preparing your own restoration procedure.

Malware removal tools

Specific malware often needs a specific removal tool in addition to the standard antivirus software. These can often be obtained for free from antivirus companies.  Semantec, for example, provides a list of recent removal tools.
Remember: the main threat to your computer is no longer a tennager writing writing programs for kicks in his bedroom - it's organised crime. There is a growing blackmarket in malware for criminal purposes[8], and the new demand is for malware that goes undetected, so be as thorough as you can in cleaning your system.
 

Recent improvements from Microsoft

When Blaster attacked, a typical Microsoft user had no firewall, no antispyware and was using Windows XP.  From a security point of view, Microsoft's latest offerings are an improvement, but the attacks are also becoming more sophisticated.  Windows Defender (anti-spyware) and Windows Firewall are free security products that now come as standard with the Windows operating system.  Windows 7 and Windows Vista have a feature called User Account Control (UAC) that is designed to protect the user by alerting them whenever they attempt to use administrator privileges regardless of the authority of the account logged in.

Microsoft have recently entered into the free antivirus mark.  Microsoft Security Essentials is intended to be a comprehensive anti-malware package free to users who have a genuine copy of Windows. Reviews of the product have been generally positive in comparison to the other free alternatives[9].
 

Some jargon explained

The information presented here has been aimed at people who don't know whether they have an infected computer or not and are therefore more interested in the consequences of malware rather than the technical vocabulary. Some of the more common terms used in relation to home computer security are explained below to help readers with further research.
 
Worms -  Worms are a special category of virus. The most significant distinction between a normal virus and a worm is that worms travel from one computer to another without the user being involved, whereas normal viruses are introduced unintentionally by the user.
 
Trojan Horse - as the name implies, a trojan horse may not appear to be anything dangerous, but it secretly provides an enemy with a way into somewhere they shouldn't be.  A typical trojan horse program will create a 'back door' to your computer, enabling attackers to get at your private data or control your computer remotely.
 
Adware - this is software that routinely delivers unsolicited adverts to the user. Sometimes the inclusion of adware in ligitimate software packages subsidizes the cost of providing the useful software to home users, i.e. you get some free software but you have to put up with the adverts.  This is why adware is not generally considered malware, even if it is annoying, and anti-adware may not be included for free with your antivirus product.
 
Spyware - spyware is a form of malware whose purpose is to monitor your activity and report it to someone else without you knowing about it. Some spyware products are not necessarily destructive but are often objectionable and an invasion of privacy, other products are designed for just plain theft of private information.  The level of spying could be anything from monitoring which websites you go to on the Internet to keystroke logging, which is the electronic equivalent of having someone constantly looking over your shoulder as you type.
 
Firewall - think of a firewall as a monitored gateway between your computer and the network it's connected to. Any communication between your computer and the outside world is subject to the firewall allowing that communication through.  Most firewalls are not intelligent enough to understand if the communication is malicious or not, instead they restrict communication with your computer to approved applications (such as your web browser), or designated channels of communcation (known as ports).  If communication is attempted over a disallowed port or is started by a disallowed application the firewall will block the commication.
 
Phishing and Pharming - Phishing is described above.  Pharming is a very similar concept, but instead of using e-mails as the lure, pharmers use alternative ways to direct you to the spoof web page, such as by exploiting an existing vulnerability to redirect you to a spoof web page when you attempt to access your online banking website.

As part of the contest we conducted recently, I got many comments from the TechProceed.com readers who choose their favorite database.

Based on this data, the top spot goes to.. MySQL


If you are new to any of the top 5 database mentioned here, please read the rest of the article to understand more about them.





1. MySQL




MySQL is used in almost all the open source web projects that require a database in the back-end. MySQL is part of the powerful LAMP stack along with Linux, Apache and PHP.

This was originally created by a company called MySQL AB, which was acquired by Sun Microsystems, which was acquired by Oracle. Since we don’t what Oracle will do with MySQL database, open source community has created several forks of MySQL including Drizzle and MariaDB.






Following are few key features:
  • Written in C and C++.
  • MyISAM storage uses b-tree disk tables with index compression for high performance.
  • Support for partitioning and replication.
  • Support for Xpath, full text search.
  • Support for stored procedures, triggers, views etc.,
Additional Information:

2. PostgreSQL





PotgreSQL is a open source object-relational database system. It runs on most *nix flavours, Windows and Mac OS. This has full support for joins, views, triggers, stored procedures etc.,

Following are few key features:
  • MVCC – Multi-Version Concurrency Control
  • Hot backups and point-in-time recovery
  • Support for tablespaces
  • Asynchronous replication
  • Highly scalable
Additional Information:

3. Oracle





Oracle is the best database for any mission critical commercial application. Oracle has following four different editions of the database: 1) Enterprise Edition 2) Standard Edition 3) Standard Edition One 4) Express Edition

Following are few key features of the oracle database.
  • Real Application Cluster (RAC)
  • Data Guard for standby database
  • Virtual Private Database
  • Automatic Memory, Storage and Undo Management
  • OLAP, Partitioning, Data Mining
  • Advance Queuing, XML DB, Support for Spatial data
  • Flashback Database, Query, Table and Transaction
Additional Information:

4. SQLite




SQLite does not work like a traditional client-server model with standalone process. Instead, it is a self-contained, server-less SQL database engine.
Main Features of SQLite:
  • Zero configuration with no setup or admin tasks.
  • Complete database is stored in a single disk file.
  • No external dependencies
  • Supports database of several TB in size
  • Work on most *nix flavors, Mac OS X, windows. It’s also cross-platform.
  • WinCE is supported out-of-the box
Additional Information:

5. Microsoft SQL Server

This is Microsoft’s flagship Database product. If you are stuck in a company that heavily uses Microsoft products, you might end-up working on MS SQL Server.

This is the place where you will find the answers to most of your tech queries, so subscribe and stay in touch.

Geeks have to deal with one or more of the following (in no particular order). I will be posting instruction guides, How-Tos, troubleshooting tips and tricks on these categories. My focus is to write articles that will either teach you or help you resolve a problem.

Linux – Sysadmin, Scripting etc.
Databases – Oracle, mySQL etc.
Hardware
Security (Firewall, Network, Online Security etc)
Storage
Cool gadgets and websites
Productivity (Too many technologies to explore, not much time available)
Website Design
Software Development
Windows – Sysadmin, reboot etc.
And finally some Interesting and Entertaining Stuff.


Hope this will save your valuable time and possibly give you exactly what you want. Please share your views and opinions


I believe that personally accessible technology is the foundation of humanity’s future. To that end I help people to understand and safely use personal computers and related technology so that they can do more, be more, grow more and connect more than ever before, and be an active participant in that future. You could submit the article content by clicking here and it will be published within 2 business days for FREE, once its reviewed.



Company Locations : 

#53, Main Street,
Sudarshan Nagar Colony, Serilingampally,
Hyderabad, Andhra Pradesh 500 019


#84, Shri Ram Nagar
Shegaon
Maharashtra444203





Your form has been submitted successfully !

I'll get back to you as early as possible.


Stay tuned..  :)




My Background

After pursuing Engineering in Computer Science from SSGMCE (where I did nothing and only had real fun), I wanted to enter the IT field. I never thought that I would go for higher education but recession compelled me to do so. However, I think it proved better for me. I accomplished my M.Tech in IT from Central University of Hyderabad. During M.Tech, I spent a lot of my time researching the Cloud Computing stuff. It was exciting!

Present
My current role sees me working as Application Developer in prestigious JP Morgan Chase.
I joined JP Morgan Chase in August 2011 and its going good so far!

I love life, and to tell you the truth I am on a perpetual high. Well, not on alcohol but on the sheer jest for life - the positive vibes and the challenges. I let my passion take over and it's the passion for Technology!

So…Thanks for Reading!
Please, take a look around my site, keep up to date with my ramblings on my blog, have a look at some of my basic tutorials covering a range of media, or stop by my portfolio for a look at some of my latest Stuff… And don’t be a stranger!


And Welcome !

Welcome to TechProceed.com - a weblog full of geeky stuff for IT Professionals. I enjoy blogging because it not only provides a service to the people who read the blog, but it also broadens my knowledge and understanding of the Internet. Read more...

I believe that personally accessible technology is the foundation of humanity’s future. To that end I help people to understand and safely use personal computers and related technology so that they can do more, be more, grow more and connect more than ever before, and be an active participant in that future. I do that by answering questions, educating on important topics and trends, and sharing my overall passion and excitement for the possibilities.


Can you email me questions?

Of course! The best way to contact me is via e-mail at snehalmasne[at]gmail[dot]com. Feel free to shoot me a question on any topic related to computers. Sometimes I get a bunch of emails, so it may take a day or two to get back in contact with you. I’ll be incorporating technical forums into my blog eventually. You can even fill This Form !


Is there any other way to connect with me ?
Of course, otherwise I would not be a "Computer" guy! You can connect with me on Twitter, Facebook, and Google Plus. Or send me an email at Snehal@TechProceed.com




               




Are you interested to see your article on TechProceed for the benefit of IT community? 

I believe that personally accessible technology is the foundation of humanity’s future. To that end I help people to understand and safely use personal computers and related technology so that they can do more, be more, grow more and connect more than ever before, and be an active participant in that future. You could submit the article content by clicking here and it will be published within 2 business days for FREE, once its reviewed.

Considering the PR of ads free site, your article will certainly get huge response. Why still waiting?  Vent out your ideas and opinions right now!

Are you interested to add your article to this website for the benefit of IT community? 

You could submit the article content by clicking here and it will be published within 2 business days, once its reviewed.

Considering the PR of ads free site, your article will certainly get huge response. Why still waiting? Just send it right now! 


             Learn how to do just about anything, and find out what you'll need to do it. It provides a collection of professional secrets from those in the know. Browse tricks, or share your secret techniques with those in need. The list is unending, you can find rest of the entries by browsing the site. 


Automatically generated, few of the top viewed posts, are enlisted below:




What’s the best way to ask a question ?

The easiest way to contact me about any computer problems or issues is via email. You can reach me via email at snehal [at] techproceed [dot] com. I will respond to as many emails as I can, but due to the large volume of emails that I recieve every day, there is no guarantee that I will get back to you. 

If you have any other inquires, questions, comments, ideas, etc, feel free to fill the form given below and I will do my best to respond. 

Submit an article to see it on Techproceed !

You can also send me an article using below form and  that will be published on TechProceed once I am done reviewing it. 

Thanks!

Snehal Masne  :)



Please fill the form given below : 

Hello World !!

This is my first post on this exciting website that I registered today on my 20th birthday..!!
Most of the times, while surfing on the net, I always find something interesting, awesome stuff that we all are looking for. So here I am Trying to put all those things in well sorted manner, providing only the key aspects. 


Geeks have to deal with one or more of the following (in no particular order). I will be posting instruction guides, How-Tos, troubleshooting tips and tricks on these categories. My focus is to write articles that will either teach you or help you resolve a problem.

  1. Cool Gadgets and its reviews
  2. Ethical Hacking 
  3. Efficient Database/Storage
  4. Buzzing Hardware/Software
  5. Enhancing Security (Firewall, Network, Online Security etc)
  6. Magnificent Productivity (Too many technologies to explore, not much time available)
  7. Fabulous Website Design
  8. Robust Application Development (programming)
  9. Windows – Sysadmin, reboot etc.
  10. And finally some Interesting and Entertaining Stuff.

Hope this will save your valuable time and possibly give you exactly what you want. Please share your views and opinions so that I can work in better way ...

Have a fantastic time !      :)