Search This Blog


The mechanism to simulate a regular mail into an e-mail, gave us a very fast and much cheaper medium to communicate (not a simulation anymore). Same way, using computers we can simulate other things over which we do not have any control, for example weather, behaviour of atomic bomb, behaviour of a deadly virus, Earthquake, a innovative design for a new auto, airplane, machine, etc.

Any computer has five parts Input, Output, CPU, Memory, disk (storage) . Input is things like mouse, keyboard, modem. Output is computer screen, printer. CPU or central processing is brain of the computer which controls and execute all calculations, manipulations and output. Memory (RAM)is a temporary storage to be used by CPU when doing calculations, etc. Think of it as a scratch pad for CPU. Disk is permanent storage, on which all the software and data is stored.

When you turn on your computer, BIOS (or basic input output system) which resides on CMOS (complimentary Metal Oxide semiconductor,a type of chip) has small coded software written on it which tells CPU to read the next instruction from sector n of disk x. This next instruction loads the operating system.


A database is a software which lets user to organize their data in an orderly fashion. For example consider a company which sells cookies, they have a database of which has tables (or records) of customers, types of cookies and orders. So when customer x orders n number of x type of cookies his orders is placed in table orders. There are several type of databases. Some which are simply text files with records, others which are complex with tables of information. A table of information means "an array of one type of records", for example "an array of customer names, addresses, phone numbers". A Relational database is in which there are relations among the tables, for example consider three tables with customer info, inventory info and orders info. The relations between these three tables define the relational database. So when a customer X from customer table orders Item Y from Inventory info it is put in Orders table, there are links in these tables (through primary keys, secondary and foreign keys such Social Security number, product number, order number, etc) which lets us do that and thus making it a relational database. Popular type of relational databases are Access for PCs on windows 95, Oracle, Sybase, Informix, for huge business environment (running Unix operating systems).


Internet is a bunch of computers connected to each other. It started out when about 10 computers running Unix operating systems serving US military were connected to each other and named ARPANET. Initially, users could only send an e-mail to each other, deploying UUCP (unix to unix copy using modems) method. Then more computers from universities were added to ARPANET and research individuals started sharing their notes over e-mail. Later came Usenet which was more or less a discussion forum. Then after tremendous innovations in hardware (networking), in 1992 came Web, or the software called web browser which could display pictures and text. REST is history. Some terms

  • HTML : is Hypertext markup language. All pages in Internet use HTML.
  • Browser is piece of software to browse internet, i.e Netscape, Internet explorer.
  • Router is a piece of hardware which connects LAN to Internet.
  • Bridge is a piece of hardware which connects two LANs.

Programming languages are designed to aid humans to write code for computers. Since computers only understand the language of o's and 1's, and we humans a common english like languages, several computer languages were developed which translate code to computer language. Programming languages like C/C++,Visual Basic, Java using these a person writes a code and then compiles it and creates an executable file which is understood by machine. All .exe and .class files are executable files translated into language understood by computer.


Networking constitutes of connecting PCs and other machines with each other. If you have bunch of computers in same building connected to servers through several hubs it is a Local Area Network, like in an office building. If you have many buildings with many computers connected to each other it is a WAN or wide area network, like Universities. Going by same terminology Internet is probably Global Area Network. Servers are those computers which control user access to files, and are running all the time. All of the computers which are connected to Internet are servers since Internet demands access to information round the clock. When you use modem to connect to Internet on your Personal computer, you are connecting to a computer which is connected to Internet.


Operating systems are that piece of software which communicate with computer and converts all user commands back and forth. Operating systems have four parts which are Process manager, Memory manager, I/O manager and . Popular operating systems are Windows 95, Windows 98, Windows NT, Mac, SunOs, Digital, HP-UX, Solaris, Aix, etc.


Applications are the end user products which user run on a computer. i.e. Games, Word processing, excel, word, are all applications.


Personal computers are those machines that sit on your desk at home or at office, usually running Windows 95, MacOs, windows 3.1, windows 98, windows NT workstation, and other operating systems designed for PCs. Servers usually run more robust Operating systems like Unix, Windows NT, etc.


History The history of computing began with an analog machine. In 1623 German scientist Wilhelm Schikard invented a machine that used 11 complete and 6 incomplete sprocketed wheels that could add and, with the aid of logarithm tables, multiply and divide.In the early 19th century French inventor Joseph-Marie Jacquard devised a specialized type of computer: a loom. Jacquard's loom used punched cards to program patterns that were output as woven fabrics by the loom. Herman Hollerith, an American inventor, used an idea similar to Jacquard's loom when he combined the use of punched cards with devices that created and electronically read the cards. Hollerith's tabulator was used for the 1890 U.S. census, and it made the computational time three to four times shorter than the time previously needed for hand counts. Hollerith's Tabulating Machine Company eventually merged with other companies in 1924 to become IBM.

What is spyware?
Spyware is software that is capable of performing certain operations on your computer without your consent, such as displaying advertisements, collecting your personal information, or changing the configuration of your computer.

Other types of unwanted software can alter to your computer with results ranging from minor annoyances to causing your computer to slow down or crash. These programs have the ability to change your Web browser's home page or search page, or add additional components to your browser you may not need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them. These types of unwanted programs are often labeled as spyware.

What is adware?
Adware is software that displays advertisements. This does not mean that any software that provides advertisements or tracks your on-line activities is adware. For example, you may install a free ad-supported version of software, and you "pay" for the service by agreeing to receive targeted advertisements. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You may also have agreed to let the company track your online activities to determine which advertisements to show you. To avoid installing adware if you do not wish to "pay" for the service by receiving targeted advertisements, we recommend that you carefully read the software's Terms of Use and End User License Agreement.

What is malware?
Malware, or malicious software, is designed specifically to damage your machine or interrupt the normal computing environment. A trojan horse, worm or virus could be classified as malware. Some advertising software can be malicious by trying to re-install itself after you have removed it.

What is parasiteware?
Parasiteware is the term for any adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, popular makers of adware applications. These companies release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user, parasiteware represents little in the way of a security threat.

What is a page hijacker?
Hijacker is an application that attempts to take control of the user's homepage and replace it with one that the hijacker chooses. It is a low security threat, but is annoying. Most hijackers use stealth techniques or trick dialog boxes to perform installation.

Browser hijackers commonly do one or more of the following:

Changes your "search" page and passes all searches to a pay-per-search site
Changes your default home page to the company page. Sometimes the software changes them to a portal featuring porn sites
May transmit URLs viewed toward the company server

What is a dialer?
A dialer is a type of software used by pornographic vendors. Once dialer software is downloaded, the user is disconnected from his/her modem's usual Internet service provider, is connected to another phone number and is then billed. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to the victim.

What is a browser plugin?
A plugin is a software program that extends the capabilities of your Internet browser in a specific way. Not all browser plugins are harmful and some may be helpful. This category contains mostly dubious browser plugins such as "Search Assistant", toolbars, etc. that have been known to transmit user data to their creators or have been installed using covert means.

What is a commercial keylogger?
Commercial keylogger is a program designed to monitor user activity. It may be used with or without consent. Since it is sold commercially, most anti-virus vendors do not detect it.

What is a commercial network management tool?
A commercial network management tool is mostly used in (large) corporations. It can log the network traffic passively (sniffing) or examine the logs of proxies, etc. Nothing is installed on the individual computers, the software runs on a central server. They can only log items that pass through the network, but not local items such as the entered passwords, keystrokes or screenshots.

What is a data miner?
A data miner's primary function is to gather data about an end user. Some adware applications may employ data mining abilities.

What is a loyaltyware?
Loyaltyware is a sub-form of adware. Loyaltyware is a type of software that works around the concept of user loyalty by providing incentives in the form of cash, points, airline miles, or other type of goods while shopping.

What is a remote administration tool?
A remote administration tool is a tool designed to be used by network administrators to remotely control a computer on the network, usually for support or inventory purposes. It may be used for spying purposes.

What is a worm?
A worm is a virus-like program that spreads automatically to other computers by distributing itself via email or other means. A worm spreads itself by attacking other machines and copying itself to the affected machine. Both worms and viruses are self-replicating codes that travel from machine to machine by various means. Both worms and viruses have, as their first objective, merely propagation. Both can be destructive, depending on what payload, if any, they have been given. There are some differences in that worms may replace files, but do not insert themselves into files, while viruses insert themselves into files, but do not replace them.

How can I tell that I have spyware on my computer?
You may have spyware installed on your computer if:

You see pop-up advertisements even when you're not on a website.
Your homepage or your browser search settings have changed without your knowledge.
You have a new toolbar in your browser that you didn't want, and find it difficult to get rid of.
Your computer takes longer than usual to complete certain tasks.
You experience a sudden rise in computer crashes.

How does spyware get on my computer?
There are several ways spyware or other unwanted software can intrude your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program. Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

What is the difference between spyware and viruses?
The average Internet user has difficulty distinguishing viruses from spyware. However there are slight differences. Both are malicious software, both have the capacity to capture and destroy information, ruin performance, and disrupt business processes.

A virus seeks to infect a computer; to replicate; and to infect as many computers as possible, as quickly as possible. For example, an email-delivered virus (a worm) may search your computer's file system for your Outlook address book and send infected email messages to contacts it finds in the address book. A virus relies on email for propagation, but tries many attack vectors such as file sharing, telnet, FTP, IMs, or any services and programs on your computer that communicate with other computers.

Viruses seek to spread, but spyware tries to stay put as a parasite. Spyware disguises itself as a legitimate application or secretly resides as one more data link library (DLL) or registry setting the average user knows nothing about, so that it can collect information about you, your messaging, browsing behavior and your online preferences. Spyware will embed itself deeply into critical components of your operating system and bloat your memory with its monitoring and collection processing executables. So where virus activities are overt and sufficiently extensive in their impact to attract attention quickly, spyware activities are typically covert and their infestations are often long lasting.

Spyware will exploit your computer of anything it can use for monetary gain, for as long as it can remain attached to the host. Spyware is content to sit on a single computer, to monitor what the user does, as is the case with tracking adware; or influence where the user visits, as is the case with targeting advertisers who use browser helper objects that pop-up ads, substitute search engines, and hijack home pages.

Viruses can be intentionally destructive and have been known to erase or corrupt file systems or abet denial of service attacks. Spyware is more interested in having the host remain healthy: a non-functional computer has neither advertising value nor revenue potential to spyware. So spyware typically remains non-destructive, unless you try to remove it. But many spyware packages are removal resistant: you may uninstall them only to find they reappear when you reboot your computer. Others modify many critical components of a computer operating system and incomplete removal often renders the computer inoperable.

How to keep spyware off of my computer?
Here are few useful tips on how to avoid spyware infection:

Use anti-spyware programs such as Spyware Terminator.
Keep your anti-spyware programs current by downloading updates.
If using Microsoft's Internet Explorer, turn off its ability to run scripts without your permission.
Prevent spyware from transmitting data off the system by using a firewall.
Do not click on links within pop-ups. By clicking on a pop-up link you may install spyware on your computer. Close the popup with the "X" on the title bar, do not use the "close" link, if there are any available within the window.
Do not download programs from websites you are not familiar with.
Be careful of unexpected dialog boxes asking whether you want to perform an action. If you are not sure about the impact of the action, better click "NO" or close the dialog box by clicking the "X" icon in the title bar.
Do not follow email links offering anti-spyware software. These links may actually install the spyware they claim to be keeping off your system.

Is there any legal protection against spyware?
Although the Can-Spam law that has been in effect for a year, it hasn't had much success against unsolicited email. Legal experts and business technology professionals remain hopeful that laws aimed at reducing adware and spyware will fare somewhat better.

States are moving forward in crafting anti-spyware legislation. Last March, then Utah Gov. Olene Walker signed into law the Spyware Control Act that bans the installation of spyware without the user's consent. Earlier of this year, a similar law went into effect in California enforcing a $1,000 penalty per violation. As the 109th Congress recently convened Rep. Mary Bono, R-Calif., reintroduced her anti-spyware bill that includes civil fines up to $3 million for violators.

Still, Michael Overly, a technology attorney with the law firm of Foley & Lardner, says that the new laws aren't entirely necessary because the federal Computer Fraud and Abuse Act already makes it illegal for unauthorized system intrusions. Other legal experts point out that Title 5 of the Federal Trade Commission Act enables the FTC to track down anyone conducting deceptive trade practices, and the Electronic Communications Privacy Act also could be used against those who send out spyware.





Microboards Ink Cartridges

Microboards Ink Cartridges


Burning CDs, DVDs, and Blu-ray discs are great for backing up data or distributing it to other people. But once you have multiple blank discs with different data, you need to take some time in labeling them. This kind of labeling isn't very appealing especially on a professional level so a better approach would be to print on disc labels and stick them directly on the discs. However, this process can take a while since you need to acquire special labeling software and matching disc labels that you need to perfectly align with your in order to get a quality output. Microboards products are more reliable because they are fully dedicated for disc publication and duplication. Their printer products even have their own dedicated Microboards which have plenty of advantages over the standard ink cartridges that ordinary printers make use of.Longer Lasting

Microboards ink cartridges are pretty much like standard where there are dedicated black cartridges as well as well as cyan, yellow, and magenta cartridges. Since every color has its own cartridge, you will only need to replace a single cartridge once that particular color runs out of ink. Once you made a replacement, you can still use the other colors until those cartridges drain. If all the colors are combined into one cartridge, you will need to replace the whole thing once a single color runs out which significantly reduces the overall lifespan. These ink cartridges will also be dedicated for disc so you should be able to print a lot more discs than standard printers which have multiple uses.

Optimized Quality

Since the Microboards ink cartridges are specially made for Microboards printers, you can achieve much higher quality outputs where the color graphics are more vibrant. You have better freedom in designing your disc labels because you know that they will look good and professionally made. You can also try out all kinds of fonts and text designs because the black prints appear sharper than usual. This is important when printing clear text on discs especially if you use smaller fonts. When mixing these text designs with multi-colored designs, the print quality really shines as it puts these every ink cartridge to maximum use.

Minimal Cost per Print

The actual cost per print fluctuates depending on what color combinations you use. But when you use the Microboards ink cartridges on standard Microboards disc printers, you know that you are saving heavily on costs because of the limited space that discs provide. Printing full colors on discs can cost about $0.12 per disc and nothing is wasted compared to printing on CD paper. You also have more options where you can minimize the use of colors to lower the cost per print to just $0.05 a disc. Considering the quality outputs of these ink cartridges, the low costs serve as a fantastic bonus.

Microboards ink cartridges are great to use and their Microboards printing products are just as impressive if you plan on printing large amounts of disc labels. These printers are easy to setup and easy to do mass operations with quality in mind.