Saturday, November 27, 2010

Website Design

Designing a web site can be a crucial step in your business' exposure; however, designing a site that attracts future clients and customers can be a difficult task. If you are not familiar with website design language and are unable to build your own site, which is the case most of the time - most would believe your only other option is to hire a web designer, this is not the case.

There are numerous sites that can allow you to be the web designer yourself, using various templates and pre-set options. However using this method can be limiting depending on the site you are trying to build, is your business a small, or large one?

If you are planning on hiring a web designer there are certain things you need to look for in your future employee. How many web sites has this person completed before? are they reputable, do they have any feedback on their own site reviewing customer experience? Will this person give you contact information of the employers of previous jobs so that you can speak directly with them.

All of these questions will need to be answered fully and completely to your satisfaction before you set your eyes on the person who will design your site. Be sure to do enough research about the web designer you're choosing, get quotes from many designers to gauge a price range so as not to be over charged.

Hiring a web designer can be quite expensive depending on the job, this is the main con to this approach in building your site. However, as technology and software progresses this may not be something you need to resort to. There is software on the internet, based at a monthly rate that will provide you with access to templates and settings for your own design that can sometimes surpass the quality of hiring a website designer.

Dedicated Server

In your office you will see one reserved computer running all the time. That is the master computer and the foundation through which the rest of the systems ion the office works. In technical terms, it is called the dedicated server. Since most of the systems work on windows platform, you have a separate windows dedicated server.

In the business of web hosting and data, a dedicated server is a must and generally outsourced from a service provided. This is easy for the companies because managing windows dedicated server is again a very tedious job and needs monitoring 24x7. Therefore hiring a third party for the services is an intelligent idea.

The function of a dedicated windows server is to connect all the computers in the network and act like the mother computer. This dedicated windows server could also be the master computer that manages printer resources and other equipment like fax machines and scan machines. However, all the servers are not always dedicated. It can also act as an independent system sometimes, but generally this is the case when there are not many computers attached to the windows dedicated.

When you go to outsource windows server, look out for experts. In such a way, you could be empaneled with a team of experts trained with cutting edge technology. They would be able to give you innovative ideas and also suggest you the right way to network and make the most of the connection. Go for a cost effective package because this is a running investment and you will have to bear this throughout the year, so be careful with your budget.

Windows Server should be on a high bandwidth because the speed of your business will depend upon the pace at which your server would be running. After sale services is another important factor to consider because someone must be available 24x7 to solve any problem and in case of emergencies. Look for a windows dedicated server service provider who will provide immediate & easy installation with the latest web tools.

Launcher Error

Are you facing Sims 3 late night launcher error in your system? Obviously, it is a clueless issue that most game players are facing from day one. Almost all users are thinking that what could be causing such errors in system. Well, it has been tested that to resolve games related issues you need little tweaks combined with system maintenance tasks.

In this article you will learn the steps required to fix Sims 3 late night launcher error in your computer. However, follow the sequence while performing steps.

1. First of all you have to clean and repair window registry using reliable registry cleaner and PC optimizer, follow these steps:

a. Download registry cleaner or PC optimizer software.
b. After downloading, install it on your computer.
c. Finish using simple instructions.

2. Also it is very important to check whether you have.Net framework working properly on your system or not. If it is not present then you can download it form the official site of Microsoft.

3. Keep your system active while downloading the game on your system. In simple you have to stay logged into the the EA download manager.

4. Download manager is better option to choose when you prepare to download.

5. If there is Sims 3 late night launcher error then go to your neighborhood and go into edit town mode. Find the grey empty lot and bulldoze that lot.

6. You can also download game patches from the game forums.

7. Start your system after sometime when you finished with downloading.

Most of the game related problems are because of missing DLL files and other registry entries.

To fix this issue you have to use RegInOut scan and update Microsoft Direct -X.

Wednesday, June 9, 2010

ERP Comparison

Being competitive on the market nowadays means having the capability to react fast and efficient to the customer's needs and to the changes on the market. Business solutions are in great demand lately because all business owners are looking to improve their activity and to simplify it. This being the case, ERP software producers needs to come up with adaptable and flexible products in order to meet the constantly growing demands of the customers. Many people compare two or more different products before deciding which one is most suitable for their company. This is why an ERP comparison on Ramco/SAP B1 might be useful, if you are interested in such an acquisition.

When making an ERP comparison on Ramco/SAP B1 or on other two similar products we need to consider all the advantages one might have over another. Their features and their options, as well as their purchasing price and operational costs need to be discussed. Although they are both designed for small and midsized companies, there is a difference between them. SAP B1 is a great choice for a company that has expanded and is looking for a comprehensive business solution capable of integrating all the aspects of the business. Ramco, on the other hand, is very accessible because it is available as ERP on demand. This makes it particularly suitable for small enterprises that can't afford to invest a lot of money or which don't have the necessary IT infrastructure. However, Ramco solutions are not only available in the SaaS form. The traditional software can also be purchased and it comes with options that cover all the necessities of a business, from financial management, accounts receivable and accounts payable to management of the inventories or human resources management.

The ERP comparison on Ramco/SAP B1 also needs to mention the fact that SAP B1 is suitable for mid size companies while Ramco on demand can be scaled to any company, regardless its size. SAP B1 is nothing less than Ramco if we refer to the solutions it offers. It comes with 14 modules and with a separate report module that makes information analysis easier, more accurate and more precise. It is also suitable for companies performing e-commerce and it is very innovative when it comes to CRM. It allows employees to access their customer database through a web browser. This improves their reaction in what concerns the customers' demands and helps them have a quick respond to various requirements.

Once an ERP comparison on Ramco/SAP B1 is made, the decision needs to be taken considering the size of the company, the costs that it can afford and the availability and other requirements it has from ERP software.

The Bluebird Project

The objective for Zandi Digital is to make available clever programs to end-users that want and need something more diverse. Bluebird is the current application being developed by Zandi Digital. Bluebird will have the ability to compress multimedia(image, audio, or video) and text into one single file and later opened for reading or editing with Bluebird on Microsoft Windows® operating systems. A illustration is at http://www.videonotepad.net

The ongoing design of the Bluebird file format has given insight and future perspective on what can be achieved with xml. Different approaches to features not purposed during the pre-stage of development have welcomed the magic of true interactive documentation. For example. Oil rig workers need to learn about a new seal design for a pump that needs upgrading. A flat 2D drawing and engineer scribble is enough to cause panic on where to start. With Bluebird, any animated or 3D static rendered model saved in any of the supported movie formats can be compressed with any rich or plain type document. Then this training document can be edited to provide an interactive experience. Interactive experience pertaining to underlying script text control, script media control, speak text, network integration, link focusing, doc switching, and other editing capabilities not seen yet for interactive docs.

For the documentation beginners and experts out there this will be a change of angle on how they go about illustrating their presentations and tutorials. What started as simple program has now become complex, demands detail, and focus on the beauty of electronic education it can simplify. The release of this application is still not known and the design revolves around existing file format support that are common to windows® users. The main focus is to point out specific design related issues that are open and gladly welcomed to any other company or current reader wishing to support and push the next generation of integrated file formats.

Types of Revision Control Software

Revision Control software are used for implement Revision Control on single or multiple sites by organizations. Revision Control, also known as Software Configuration Management (SCM) or Source Control or Version Control, is the management or control of changes to programs, documents and other sorts of information data. This type of setup or mechanism is more often used in software development where a set of people may alter the contents of the same file. The changes made are generally identified by a letter code or number which is called as a revision number or simply revision. For instance, an initial revision for a file is "revision 1". If this file is altered by any developer, its revision becomes "revision 2", and so on. A developer can perform many operations on these revisions. These revisions of files or directories can be merged, restored or compared. Software tools for revision management are crucial for the organization where development is simultaneously in progress on multi-developer sites.

Types of Revision Control Software
The various possible approaches for revision control software are:

Local Only: In this approach, it is necessary for all the developers to use the same computer system. Examples:

a. Revision Control System (RCS)
b. Source Code Control System (SCCS)

Distributed Model: In this approach, each of the developer has his/her own setup or local repository. And at some predefined time, all of the changes from various developers are shared or synced between repositories as a different step. Examples:
Open Source:
i. Aegis
ii. Codeville
iii. DCVS
iv. GIT
Proprietary:
i. Sun WorkShop Team Ware
ii. BitKeeper

Client-Server Model: In this approach, all the developers have to share a single repository. Examples:
Open Source:
i. Concurrent Versions System (CVS)
ii. CVSNT
iii. OpenCVS
Proprietary:
i. Perforce
ii. Clearcase
iii. Visual SourceSafe

Example of revision control software are as below...

GIT

This distributed revision control system has an emphasis on speed. It was originally designed and developed by Linus Torvalds for the development of Linux kernel. Every working directory of Git is a full-fledged repository with full revision tracking capabilities and complete history, not dependent on a central server or network access. GIT is a free software which is distributed under the terms of version 2 of the GNU General Public License.

Perforce

This is a proprietary and commercial revision control system developed by Perforce Software Inc. Perforce follows a client/server system. Here the server has the responsibility of managing a central database and a main repository of file versions. Developers can work on files in their local client workspace. After altering the changes, they can submit the changes to the main server. Client and server communicate via TCP/IP.

Clearcase

Rational ClearCase is a tool for configuration management of source code and other software assets. This tool is developed by IBM (Rational Software Division). ClearCase is the basis of version control for many mid size businesses, and has the potential to handle projects with thousands of developers.

CVS

This is a free revision control system. This system was developed by Dick Grune as a series of shell scripts during July 1986. CVS turned out to be popular in the open source software space and is released under General Public License of GNU. CVS also uses Client/Server architecture. Here, the clients connect to the server and can "check out" a version of file onto their local disk. Later after modifying the contents, they can "check in" the changes.

Internet password security

“Enter your password” – today the overwhelming majority of people encounter these words every day: we have accounts on banking, shopping, social nets, and many other types of web sites. Internet password security in these terms is the matter of the most serious concern.
Today’s computer and internet technologies are developing so rapidly, that there inevitably appear not only the pleasant things like comfort and mobility, but unfortunately more and more tools for internet swindle and hacking. To protect your accounts from break-ins, you need to follow certain internet password security rules.
In case when somebody is using some software or other methods to break your password, it won’t be a big trouble for him to deal with it, if you don’t follow the simple rules below:

• Do not use your personal info or words, easily associated with you.
• Do not ever use such words! Whether it is your dog’s name, or your grandmother’s birth date, for a hacker it’s an easy plunder.
• Do not using words that are in a dictionary.
• Nowadays there are software ways to try all dictionary words and find out your password.
• Do use special characters and letters of both upper and lower case.
• It’s much more secure than just letters and numbers.
• Do not make your password short.
• Take at least 8 symbols for a password.
• Do not use the same passwords for many accounts.
• And here is why: since one is broken – all the rest are broken too.
Other problem concerning internet password security is key loggers. A key logger is software or hardware that is tracking all the keys struck on the keyboard. You can never be sure that the keyboard you use in a public place doesn’t have a key logger. Some ways to avoid troublesome consequences of the encounter with a key logger are:


• Not using any keyboard except your own.
• Taking a laptop everywhere you go.

You can solve the both problems above and many other by using a security password manager. It is special software designed to make your password management easier and much more secure.

First of all, your internet password security level is never higher than with random passwords. And such software usually has tools for generating strong random passwords, without making you memorize them.
You can install a manager on a flash drive, and have it with you anywhere (much more convenient than carrying a laptop, isn’t it?). With such a program you won’t have to type your passwords – it will do it automatically. Here’s a way to defend against key loggers.
Internet password security suggests following the tips above, along with frequent changing of passwords. Whether you decide to manage your passwords yourself, or to rely on a password manager – do not forget to change passwords at least every two months.

Web Development Services in India

» Category Sponsors
Get Your Link Here - Limited Time Bargain at only $11/month!

Home » Computers » Software » Web Development Services in India

manoj sharma
Article written by manoj sharma

View Full Profile

Get Html Code
PDF | Print View | Post to your Site
Web Development Services in India
Submitted by manoj sharma
Fri, 5 Dec 2008


India in the recent time has become the hottest destination for web design and development services. Website development is becoming a major service in India. This is because of the cheap labor cost, quality solutions and effective services. Though a developing country, India has become the hub of IT outsourcing in the recent years.

Websites is a most effective way to communicate with potential customers, employees and suppliers. India offers the best quality web solutions and web design activities to fulfill the needs and requirements of global business operations. If you had a website and you are unable to get the traffic then consult with web development companies they will optimize your site and try to get more traffic for your site. If you are unable to find suitable company that fulfill your dreams then simply search and you will get thousands of companies that provide web solutions.

You will find suitable results on the search engines then select a company according to your needs and it should be cost effective also because you can spend according to your budget. The objective of web development companies to neat operational costs, free internal resources and improve quality for other functions. Truworth Infotech is one of the popular web development companies in India offering simplistic solutions in the fields of Mobile Computing, Enterprise Solutions in Microsoft Technologies, and on the Open Source Platforms, technology migration, re-engineering services. It is the cost effective software development company in India that helps you in promoting your business.

Now a day’s Indian companies are well known and famous for their quality work and their commitment to deliver projects on time. India is not only famous for software development but also for web design, web development, multimedia and animation and SEO services. If you looking for any services related software just try Software development India I can assure you for quality work because Indian are famous for their work.

Anti Virus Software

Anti-virus software is used to find, remove or fix files that are infected with computer viruses. Most anti-virus companies release weekly updates of their databases to help keep you safe. Your anti-virus software uses these weekly updates (also known as virus signatures or definitions file) to identify newly discovered viruses.

The most basic anti-virus programs normally have several features to it, the memory resident scan, the system or file scan, and an automated updater. Many more sophisticated programs have many other integration tools that loan in to your instant messengers, your e-mail software and many other programs.

It's very important when you configure your anti-virus software to always make sure you can download new updates every week, if you scan your system for viruses, and your definitions file is out of date it may not even find a problem with your system. Additionally, you should make sure you do in fact scan your system on a regular basis. I personally set my computer to scan around 4 AM so it doesn't bother me.

When you download software, e-mail attachments, or introduce new media (diskettes, cd's, jump drives) in to your system you should scan them before running or viewing them inside another application.

Deciding on which program to use often causes people a lot of head aches. Some anti-virus programs require you to pay each year for a subscription to their virus databases so you can keep your system up to date, others are just expensive out of the box. Additionally, which tends to be the biggest factor in my decision making, is how much resources does the program use.

My favorite anti-virus program for the past couple of years is AVG Anti-Virus, by GriSoft. It's totally free for the personal edition and the updates as well. It has all the major features expected out of an anti-virus suite and is really simple to use and setup.

In the end, it doesn't really matter all that much which program you prefer, but it's very important that you do at least run one!

Common Causes of a Slow Vista Computer

Your registry is one of the most vital systems of your Vista computer. In fact, you could go as far as to say that it is the MOST vital system of your computer. This is due to the fact that without the registry, your PC would not be able to function correctly. Having said that, if your computer has a faulty Vista registry, don't expect it to be fast and efficient.

It's quite easy to find out whether or not your PC has a faulty Windows registry. The easiest way is to simply use Vista repair software in order to check and actually find out whether or not the registry is corrupted. However, if you don't have Vista repair software yet, the next best way is to check the computer and see if it is has the symptoms of a faulty Windows registry.

Below Are a Few of the Symptoms of a Dirty, Error Filled Registry:

• Random computer crashes -- No error messages, no blue screen of death, nothing; just a sudden reboot.

• "Blue screen of death" -- You will often get the Vista bluescreen of death numerous times during the day. Sometimes it happen during a specific action, other times it will happen for no apparent reason at all.

• Extremely slow start-up and shut down -- What once took only a few minutes (2-3), now takes a minimum of 10-20.

• Random errors -- You don't know what they mean or what they're referring to. All you know is that you keep getting them and they won't go away no matter what you do.

• Extremely slow reaction time -- The simplest of actions, which took milliseconds, now take 10-20 seconds to complete. This includes, but is not limited to: opening files, documents, folders, games, software, as well as opening your Internet browser.

• Failure to launch programs/applications -- Your favorite programs/application aren't just slow, they won't open or load at all. Sometimes they may even cause the computer to reboot instantaneously.

• Frequent stalling -- Several times during your session, the computer seems to freeze completely and then it suddenly returns to normal after a few seconds. A PC stall can last anywhere from 5 seconds to 10 seconds or more.

• No more installing or removing programs -- You can no longer properly install or uninstall programs/applications. Sometimes it's due to errors, sometimes it's not; whatever the reason may be, though, you simply can't add/remove programs any longer.

If any, or all, of these symptoms are plaguing your computer, there is a very strong chance that your PC has a faulty Windows registry. If that is indeed the case, you need to run Vista repair software as soon as humanly possible. If you don't, you're risking even further damage and PC instability. It is your choice as to whether or not you want to deal with a slow Vista computer any longer.

Face Recognition Software

Face recognition software is a computer application used to verify person from digital image present in data. Face recognition software technology allow developers to create biometric authentication systems which enables touch less login by just looking into camera. Biometric authentication is most convenient, secure and fastest method for computer users. This method of identification is purely based on images of human face it allows instant identification.

Face recognition software functions are based on accuracy to identify and measure various features of face. Facial recognition software recognizes faces by distinguishable feature, different peaks and valley which form features. This software analyzes position, shape and size of various features. On general basis every human face has 80 nodal points like depth of eyes, distance between eyes, shape of cheekbones, length of jaw line, width of nose etc. These nodal points are measured creating a numerical code called face print by face recognition software, and are then compared with preciously stored digital images or data for authentication.

Recognition algorithm is basically divided into two methods photometric and geometric. Geometric method targets on distinguished landmarks where as photometric method is a statistical approach which analyze image into value and then compares value with templates to remove variances. Mostly all recognition software include elastic bunch graph matching, linear discriminate analysis, principal component, hidden markov model and dynamic link matching.

While enrolling in facial recognition programs various snap shots are taken from different angles to avoid any confusion. Some security measures are also followed to prevent use of picture or mask. User is asked to smile, blink or nod head number of times. Feature called thermography is also used to record heat in face. Another new technique of facial recognition targets on skin texture, it analysis lines, patterns, spots etc. These advanced technique and norms are generally used for high security areas.

Earlier facial recognition programs use to rely on 2d images only but now three- dimensional facial recognition is also available in market its uses sensors to capture information regarding face.

There are various uses of face recognition tools like it is used for surveillance purpose for searching missing persons. Face recognition software is most widely and popularly used in personal computer these days it has become one of the future trends. Face recognition technology helps you to make your face as your password; it gives touch less and fast login to your PC. Face recognition software takes away the hassle of memorizing password.

Ukraine IT Myths Dispersed

This myth has seen its rise in November-December 2004 during the events around the presidential elections that led to the Orange Revolution. However, presently there are no grounds for concerns. During the Orange Revolution, the Ukrainian people have shown their devotion to the democratic ideals and prevented the worst scenario from happening, bringing the legitimately elected president to the power. The new Ukrainian government has clearly voiced its intentions to move towards the goal of joining the EU and is making logical steps in that direction. The overall political situation in the country is stable and predictable. Unlike some popular Asian outsourcing destinations, there have never been any threats of terrorist acts in Ukraine.

But even during the most critical events in November and December, no threat existed for the clients of the Ukrainian outsourcing services providers. There were no power shortages, Internet and telephone lines functioned as usual, and no danger was posed to the outsourced project. Many companies did join the national strike that was going on, but the most urgent tasks could still be done uninterrupted. Ukraine has proved that it is a civilized 21-century European nation.

Myth No. 2 – Ukraine’s IT infrastructure is poorly developed

Ukraine’s IT infrastructure is rapidly developing. As the recent research conducted by the Ukrainian Democratic Initiatives Fund and Kiev International Sociology Institute has shown, 13.1% of Ukrainians have a computer. 14% use Internet and/or email either at home or at work. Internet connectivity, being one of the primary concerns, is also developing rapidly. Telecom is one of the fastest growing markets in Ukraine, and fibre optics are continually being laid and new companies are continually opening new connectivity services, which continually lowers cost. For example, monthly fees for a DSL connection are lower in Ukraine than in India. It is considered indispensable for an IT company to have a broadband Internet connection and several telephone lines. Furthermore, there is no shortage in high quality hardware, and IT companies provide their development teams with powerful, modern computers and servers.

Myth No. 3 – Ukraine is software pirates’ paradise

WTO ascension is a top 2005 priority for Ukraine’s government. As Ukraine moves towards this, its intellectual property laws are being revised to comply with WTO standards. While a lot of private users may still be using the cheap pirated copies of the most popular software products on their home computers, companies specialized in software development are under severe control, and to avoid problems with law, switching or have switched to licensed products. Those companies who can’t afford the price of more expensive software products choose Open Source solutions, but the problem is being tackled in one way or another anyway. Ukrainian companies are looking to work legally and don’t want to risk their good reputation.

Moreover, a large part of professional software aimed specifically at software developers has never been available as pirated copies in Ukraine, hence it has always been used in its legal, licensed form (take IBM RationalTM products as an example, as well as many others).

Myth No. 4 – Ukraine is not secure when it comes to sensitive information

Special measures must be taken to protect sensitive information no matter where your project is developed. However, according to the recent reports, India is much more dangerous than Ukraine when it comes to sensitive information leaks or theft. While it is reported that it is difficult to run background checks on employees in India, it is not that problematic in Ukraine. It has become a common practice in Ukraine for the outsourcing customers to sign NDAs with every member of the development team. Additional security policies can also be implemented to protect your sensitive data.

Myth No. 5 – Ukraine’s IT sector lacks support from the government

The new Ukrainian government is showing its extreme interest and support to foreign investments into the country's economy and international cooperation. While Ukraine moves towards joining the EU and WTO, the laws, including those covering the IP issues, are being revised to create better environment for the economy’s development and growth. This applies to the software development as well, IT being the most rapidly developing sphere of the Ukrainian economics.

According to the reports, the volume of export of Ukrainian IT services and products rose by US$ 40 million or 57% to US$ 110 million in 2004. The export of the IT sector of the Ukrainian economy is the most dynamically developing. At the same time, the total number of IT specialists operating on the market reached 15,000 toward the end of 2004. This was an increase of 50%, compared with 2003.

Myth No. 6 – Ukraine’s IT workforce is cheap

Ukraine’s IT salaries level used to be low, but as the country’s economy develops and integrates into the European and world market, it is growing, even though it is still lower than the salaries of EU and US IT specialists. The Ukrainian programmers possess high level of education and skills, as the IT sphere of the Ukrainian economy develops the demand for them increases, hence their highly intellectual labour cannot be cheap. However, outsourcing customers need to realize that cheap workforce is not a good reason to choose an outsourcing provider, as it is likely to cause problems in the long run that will lead to an increase in expenses instead of savings. The reason behind many outsourcing failures is actually the customers going for cheap workforce and overseeing the quality and efficiency issues.

Outsourcing is seen as a way to cut down the development costs, but this should not be done at the expense of the developers’ salaries and therefore, quality. There are better and more effective ways to save. If a company employs methodology allowing for faster development, better quality source code, automated code generation, less developers involved, etc., this actually does reduce the development costs while still providing a satisfactory software solution.

Myth No. 7 – The language and cultural barrier

It is certainly important to be able to communicate with your outsourcing development team on a level allowing for a smooth development process, and the language and culture differences can be an obstacle.

However, Ukraine is a European nation, and the mentality of people does not differ greatly from that of your country, be it anywhere in Western Europe or the US. There is no striking difference as you would encounter in some Asian countries. Besides, before outsourcing software development came to Ukraine on a large scale, many Ukrainian IT specialists used to go to the Western Europe and USA and work for IT companies there, which means they are familiar with the approach traditional for Europe and America and the procedures used for software development in those companies. Moreover, different international agencies are now offering courses in management providing necessary management skills to the Ukrainian specialists. Thus, all the business processes in a development team can be organized according to the international standards.

While English is not the native language to the Ukrainian developers, this issue is also being actively dealt with. English is the language of choice in the universities and in the schools it is now required from an early age. Several universities are conducting their entire programs in English. Oral and written comprehension is high among software engineers, given the amount of text they have to read for their degree and work programs and the amount of English language programming available in the country. Communicating with the Ukrainian developers through online chats, instant messaging and e-mail in English should not be a problem. While not all the development team members might be completely fluent in English, those who communicate directly with the international customers will speak, read and write in English at the proper level. Many companies conduct in-house English language training programs to improve the language skills of their personnel. Specialists speaking other languages, such as French or German, can also be found, though these languages are not as popular as English.

Virus- A Brief Introduction

The most common reason for system break down is virus, invading your system
. Viruses are software made with the intention of troubling others. There are various ways through these virus trouble people by troubling people. Let us understand the mechanism of how a virus works.

Let us know few facts about Boot infectors. All the disks that is CD, DVD, hard disk have an area that decides, whether the CD or disk is bootable. As you turn the computer on, it starts reading the boot information. The computer then uses the boot information to start in a proper manner. If the boot information is infected, then the computer cannot read the information properly and this is how the virus spreads to the drive of the computer. Once, the code of the boot is on, the hard drive is affected with the virus. Then, it spreads to every disk put on to the computer and infects it with this. Thus, the infection of virus spreads.


Most of the time, these boot virus stay dormant without causing any harm to the system. They are just there. These viruses are designed often to start their work on specific date. These are some dangerous boot virus, which would disturb the boot information or enforce the complete formatting of the hard drive, as soon as they start activation.

The other type of virus is program infectors. When there is any application infected with virus loaded or run on the computer the virus is transferred to the computer. It affects the memory of the computer. While it is in the memory, any application or new program that is run gets infected with this. These commonly cause multiple infections. It means that the system may crash any time, as there are many programs on your computer.

These programs are dormant for some time, but soon start infecting the programs and then multiple programs and soon they can bring the system to crash. The symptom of this is the program saves the file without any name or improper date or name. These are designed, especially for getting the information out of the shared programs like email, macros, documents, or the compressed files.


The major mode of transfer for these threats or virus is through mails. These are sent as an attachment. In most of the cases, infected computer user without the knowledge attaches an infected file to an email, and sends the email to his relatives and friends. After receiving the email, the virus starts on, when the file attachment is opened, thus infecting a new computer. You need to be extra careful while opening emails with animations, programmed greeting cards, jokes, photographs, spreadsheet and files. There are known weapons recognized to contain virus files. It is always advisable to be very careful while sending or receiving any attachments to your friends or relatives.