General Questions
The cloud is a friendly way of describing web-based computing services. Information storage, computation, and software are located and managed remotely on off premise servers. Because this infrastructure is located online, you can access it virtually anywhere from a desktop, laptop, or mobile phone.
Do Not Track (DNT) is a step toward putting you in control of the way your information is collected and used online. Do Not Track (DNT) is a feature in your web browser (e.g. Internet Explorer, Firefox, Chrome, etc.) that allows you to let a website know you would like to opt-out of third-party tracking for purposes including behavioral advertising. It does this by transmitting a Do Not Track (DNT) HTTP header every time your data is requested from the Web.
Do Not Track (DNT) may interfere with some personalized services you enjoy. For example, a Do Not Track (DNT) request might mean you would have to type in your zip code each time you want to view a weather report, rather than seeing the weather automatically displayed. Personalization on websites can save you time and repetitive typing, but it requires data.
A firewall is a program or hardware designed to protect your computer against unauthorized intrusion. Many firewalls bar known trojans and viruses, but even the best firewalls can allow those sneaky programs onto your computer. Most firewalls are focused on anti-hacking or other malicious actions that can crash or commandeer your computer, whether via a remote program or manual intervention by someone on the Internet.
An antivirus program has no influence against hackers and other actions. It pertains only to viruses, trojans or, in some cases, anti-spyware or anti-adware programs that track your computer and browsing history. Viruses, et al, are malicious programs that can damage or even destroy all the programs on your computer.
Keeping both your firewall and your antivirus programs current is imperative for safe and “healthy” computer use and Internet surfing.
“Malware” is short for malicious software and used as a single term to refer to virus, spyware, worm etc. Malware is designed to cause damage to a stand alone computer or a networked computer. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.
Virus:- Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. A computer Virus is more dangerous than a computer worm as it makes changes or deletes your files while worms only replicates itself with out making changes to your files/data.
Viruses can enter to your computer as an attachment of images, greeting, or audio / video files. Viruses also enters through downloads on the Internet. They can be hidden in a free/trial softwares or other files that you download.
So before you download anything from internet be sure about it first. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, such as running an infected program to keep it going.
Worms:- Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again. It doesn’t harm any data/file on the computer. Unlike a virus, it does not need to attach itself to an existing program. Worms spread by exploiting vulnerabilities in operating systems.
Due to its replication nature it takes a lot of space in the hard drive and consumes more cpu uses which in turn makes the pc too slow also consumes more network bandwidth.
Trojans: – A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.
Trojan horses are broken down in classification based on how they infect the systems and the damage caused by them. The seven main types of Trojan horses are: • Remote Access Trojans • Data Sending Trojans • Destructive Trojans • Proxy Trojans • FTP Trojans • security software disabler Trojans • denial-of-service attack Trojans
Adware: – Generically adware is a software application in which advertising banners are displayed while any program is running. Adware can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on a computer screen automatically. Adwares are used by companies for marketing purpose.
Spyware: – Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. It also can download other malicious programs from internet and install it on the computer. Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application.
RAM stands for Random Access Memory and can be considered your “use right now” computer memory, much like a briefcase or purse holds things you will expect to need or use “right now” or in the near future. Suitcases and filing cabinets, on the other hand, store things for retrieval later and figuratively represents the total storage capacity of your hard drive.
ROM or Read-Only Memory, on the other hand, pertains to files you or your computer system can read for instructions or operating parameters, but you cannot change any of the data. ROM is included in the total hard drive capacity but does not influence how much of the “right now” memory or RAM your system provides.
Office is productivity software (including Word, PowerPoint, Excel, Outlook, and OneNote) that is installed on your desktop or laptop computer. Office 365 is an online subscription service that provides email, shared calendars, the ability to create and edit documents online, instant messaging, web conferencing, a public website for your business, and internal team sites—all accessible anywhere from nearly any device.
Customers with Office 2010 installed on their computer can quickly configure their software to work with Office 365. These users can easily retrieve, edit and save Office docs in the Office 365 cloud, co-author docs in real-time with others, quickly initiate PC-to-PC calls, instant messages and web conferences with others.
Office 365 is also compatible with Office 2007 and newer editions of Office and select Office 365 plans include Office Professional Plus.