Search This Blog

Top Ten Antivirus Ranking

Here is the list of the best antivirus and security software of all times. Among the top are BitDefender, ESET, Norton, F-Secure, Kaspersky, TrendMicro, AVG, Avira, Zonealarm, Panda security and more. We will be running comparisons between different versions of the same security software, for eg., 2011 version vs 2012 version. We will be also comparing between the capabilities of different security software, for eg., BitDefender vs Norton. Based on the performance of various different antivirus security software, we will give them scoring. The factors on which we will score antivirus software: Speed, stealth, detection, link scanning, removing virus, updates, blocking bad websites, blocking phishing attempts, technical support and lots more factors. These are the antivirus programs we will be testing to come up with our top ten antivirus list:
Top Ten Antivirus 2012

1. BitDefender Antivirus 2012
2. McAfee Antivirus 2012
3. Kaspersky Antivirus 2012
4. ESET Antivirus 2012
5. Norton Antivirus 2012
6. F-Secure Antivirus 2012
7. Vipre Antivirus 2012
8. TrendMicro Antivirus 2012
9. ZoneAlarm Antivirus 2012
10. Panda Antivirus 2012

Other Antivirus Programs

Avira Antivirus 2012
Avast Antivirus 2012
Avanquest Antivirus 2012
G Data Antivirus 2012
Webroot Antivirus 2012
PC Tools Antivirus 2012
Comodo Antivirus 2012
CA Antivirus 2012
Norman Antivirus 2012
AVG Antivirus 2012
Sophos Endpoint Security 2012
Quick Heal Antivirus 2012
Microsoft Security Essentials 2012

Top Ten Antivirus Ratings

Most of these antivirus software have been tested extensively for their performance. The old versions have received ratings based on the performance to quickly detect viruses from infected systems and stop new viruses from infecting the computers. There is a very strong criteria that will be used to provide points to various antivirus software 2012. Another interesting factor that we are considering is the antivirus coupons, we will give scores to antivirus software companies that offer discount coupons from time to time. Although this is not a major factor, but many users value coupons because it is a good way to save money on security software. Although this factor will not inflate the original ratings, we are including it only to help people save money. These are the factors that will contribute to the scoring:

Speed: When it comes to computing, speed is an important aspect that we can't neglect. It has been reported that some antivirus software are much slower in comparison to other antivirus software. Which means, some antivirus programs slow down a computer. Computer users (specially gamers) like using antivirus software that does not degrade the performance of a computer system. They enjoy using the fastest antivirus software.
Stealth: Many viruses and spyware are designed to deactivate antivirus programs so that they are not detected. Antivirus software should quickly detect such a threat and stop the virus from harming the system files. Those antivirus software will receive higher score that can not only defend against known viruses but also protect a computer system from new and unknown virus and spyware.
Detection: A good antivirus program will quickly detect infection and will take the necessary steps to quarantine the infected files in order to stop the virus from spreading to other system files. Only if security software has the capabilities of detecting infection, it can stop a virus/spyware. So this is a major aspect of security software. Many poorly designed security software cannot detect all forms of threat. However, only those antivirus software will be included in our top ten antivirus 2012 list that are capable of detecting all sorts of threats.
Technical Support: We will also provide scores depending upon the type of technical support and customer service provided by the antivirus software manufacturer. Only those programs will receive higher ratings that are bundled with quality support. We will also count on the type of support available: phone, chat, email, etc. When your computer system is infected with virus, spyware or other forms of malware, you need quick assistance. That's when you need to contact someone who is technically equipped to assist you. Based on the quality of technical support, scores will be provided to various security software and hence will win a rank in our top ten antivirus 2012 list.
Price: Antivirus software should not be too costly, it should be reasonably priced. We will be comparing the price of antivirus software and will be providing scores based upon how cheap is the antivirus software. The cheapest and the best antivirus 2012 will receive higher rankings. People love saving money, so the cheapest antivirus software will receive higher scores.

These are some of the major factors we will be using to rate the best antivirus software of 2012. We will also include other factors like real-time scanning, frequency of updates, blocking phishing attempts, link scanning, IM protection, parental lock and lots more factors. However, we will majorly focus on the 5 key-points mentioned above. Based on these factors, we will provide our lab test reports that will show you which antivirus software is best for your computer in the year 2012. Most antivirus manufacturers will release their 2012 antivirus software sometime in May or June this year. If you have any questions or suggestions about this report of top ten antivirus 2012, please leave your review below by leaving a comment.

Information Technology

Definition of Information Technology: the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information

How to Reset Your Forgotten Windows Password the Easy Way


Forgetting your password is never any fun, but luckily there’s a really easy way to reset the password. All you need is a copy of the Windows installation disk and one simple command line trick.

Resetting Your Forgotten Windows Password
Boot off the Windows disk and select the “Repair your computer” option from the lower left-hand corner.


Follow through until you get to the option to open the Command Prompt, which you’ll want to select.

First you’ll want to type in the following command to backup the original sticky keys file:

copy c:\windows\system32\sethc.exe c:\

Then you’ll copy the command prompt executable (cmd.exe) over top of the sticky keys executable:

copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Now you can reboot the PC.

Resetting the Password
Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt.


Now to reset the password—just type the following command, replacing the username and password with the combination you want:

net user geek MyNewPassword


That’s all there is to it. Now you can login.

Of course, you’ll probably want to put the original sethc.exe file back, which you can do by rebooting into the installation CD, opening the command prompt, and copying the c:\sethc.exe file back to 

c:\windows\system32\sethc.exe.


How to Remove Shortcut Arrow on Icons in Windows (Include Desktop Items)

All shortcut icons in Windows operating system, including Windows XP, Windows Vista and Windows 7, has a small arrow overlay on the icons. The arrow is used to different between a shortcut from an actual physical file itself. The shortcut arrow is presented on all desktop icons, and icons in Windows Explorer, and it can be easily remove or hide.

from Desktop Icons and Other Icons

Run Registry Editor (RegEdit).
Navigate to the following registry key:
HKEY_CLASSES_ROOT\lnkfile


Delete the IsShortcut registry value in the right pane.
Tip: It’s also workable to just rename the IsShortcut registry entry to another name, such as IsNotShortcut.

Some other type of documents and files may be shortcut arrow on their icons too. To remove the shortcut arrow overlay image on these icons, navigate to each of the following registry keys, and then repeat step 2 and step 3 above to deactivate the shortcut arrow:
HKEY_CLASSES_ROOT\piffile
HKEY_CLASSES_ROOT\ConferenceLink
HKEY_CLASSES_ROOT\DocShortCut
HKEY_CLASSES_ROOT\InternetShortcut
HKEY_CLASSES_ROOT\WSHFile


Exit from Registry Editor.
Logout and login again or restart Explorer for the change to take effect.
Note that removing the shortcut arrow with hack

Note : Please note that in some cases deactivating the arrow for *.LNK files might lead to duplicate items in the Explorer context menu, as in essence, removing the “IsShortcut” effectively forces Windows to treat the shortcut as real hard file. In Windows 7, it may also cause error such as unable to pin shortcut to Taskbar or Start Menu. To avoid these issue, use another workaround to remove shortcut arrow.

Best OS (Operating System)

Windows 8 is The Best Operating System at This Time. Windows 8 is an upcoming version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. According to unofficial sources, the release date for Windows 8 has been set for October 2012, three years after the release of its predecessor, Windows 7. Windows 8's server counterpart, Windows Server 2012, is in development concurrently with Windows 8. The most recent official pre-release version of Windows 8 is the Consumer Preview, which was released on February 29, 2012. An almost-complete Release Preview is scheduled for the first week of June 2012.

Windows In Under 5 Seconds

If you work on windows , you know that shutting it down can be really a hassle and time taking , especially when a lot of programs are running . Most of us tend to avoid shut down due to this reason but we know that shut down is always safer and also considered good for the pc .

There are a lot of shut down tricks and tools available , which help you to achieve a smooth and fast shut down of windows without negatively affecting your pc . However this trick , which was suggested to me by a friend , is probably the simplest one and also the fastest way to shut down your pc .

Here are the steps :-

1: Press Ctrl+Alt+Delete to go to the Task Manager .

2: Click on Shut Down on the Top .

3: Highlight ‘ Turn Off ‘ and while holding down the Ctrl key , click on it .

And thats it ! Just count 1 , 2 , 3…5 and there you go…your pc is off !

I have tried this trick on my XP system and it has worked everytime and hasn’t negatively affected my pc . I haven’t tried this on any other version of Windows but I think it’ll work .

However I advise you to use this trick only when you are in a rush and you need a speedy shut down of your pc .

What is Computer Network?


Two or more computers connected together through a communication media form a computer network.
 The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

 Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

 These are written rules used for communications. They are the languages that computers use to talk to each other on a network

Need and Importance of Information Technology in Education


Need
Education is a life long process therefore anytime anywhere access to it is the need
Information explosion is an ever increasing phenomena therefore there is need to get access to this information
Education should meet the needs of variety of learners and therefore IT is important in meeting this need
It is a requirement of the society that the individuals should posses technological literacy
We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer


Importance
access to variety of learning resources
immediacy to information
anytime learning
anywhere learning
collaborative learning
multimedia approach to education
authentic and up to date information
access to online libraries
teaching of different subjects made interesting
educational data storage
distance education
access to the source of information
multiple communication channels-e-mail,chat,forum,blogs,etc.
access to open courseware
better accesses to children with disabilities
reduces time on many routine tasks


Information Technology in Education

INTRODUCTION Information Technology in Education, effects of the continuing developments in information technology (IT) on education.

The pace of change brought about by new technologies has had a significant effect on the way people live, work, and play worldwide. New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Information technology, while an important area of study in its own right, is having a major impact across all curriculum areas. Easy worldwide communication provides instant access to a vast array of data, challenging assimilation and assessment skills. Rapid communication, plus increased access to IT in the home, at work, and in educational establishments, could mean that learning becomes a truly lifelong activity—an activity in which the pace of technological change forces constant evaluation of the learning process itself.

Significance of IT in education

Access to variety of learning resources

In the era of technology. IT aids plenty of resources to enhance the teaching skills and learning ability. With the help of IT now it is easy to provide audio visual education. The learning resources are being widens and widen. Now with this vivid and vast technique as part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work.

Immediacy to information

IT has provided immediacy to education. Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated anywhere at any time. New IT has often been introduced into well-established patterns of working and living without radically altering them. For example, the traditional office, with secretaries working at keyboards and notes being written on paper and manually exchanged, has remained remarkably stable, even if personal computers have replaced typewriters.

Any time learning

Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated .One can study whenever he wills irrespective of whether it is day or night and irrespective of being in India or in US because of the boom in IT.

Collaborative learning

Now IT has made it easy to study as well as teach in groups or in clusters. With online we can be unite together to do the desired task. Efficient postal systems, the telephone (fixed and mobile), and various recording and playback systems based on computer technology all have a part to play in educational broadcasting in the new millennium. The Internet and its Web sites are now familiar to many children in developed countries and among educational elites elsewhere, but it remains of little significance to very many more, who lack the most basic means for subsistence.

Multimedia approach to education

Audio-Visual Education, planning, preparation, and use of devices and materials that involve sight, sound, or both, for educational purposes. Among the devices used are still and motion pictures, filmstrips, television, transparencies, audiotapes, records, teaching machines, computers, and videodiscs. The growth of audio-visual education has reflected developments in both technology and learning theory.

Studies in the psychology of learning suggest that the use of audio-visuals in education has several advantages. All learning is based on perception, the process by which the senses gain information from the environment. The higher processes of memory and concept formation cannot occur without prior perception. People can attend to only a limited amount of information at a time; their selection and perception of information is influenced by past experiences. Researchers have found that, other conditions being equal, more information is taken in if it is received simultaneously in two modalities (vision and hearing, for example) rather than in a single modality. Furthermore, learning is enhanced when material is organized and that organization is evident to the student.

These findings suggest the value of audio-visuals in the educational process. They can facilitate perception of the most important features, can be carefully organized, and can require the student to use more than one modality.

Authentic and up to date information

The information and data which are available on the net is purely correct and up to date.

Internet, a collection of computer networks that operate to common standards and enable the computers and the programs they run to communicate directly provides true and correct information.

Online library

Internets support thousands of different kinds of operational and experimental services one of which is online library. We can get plenty of data on this online library.

As part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work. This requires them to select the medium best suited to conveying their message, to structure information in a hierarchical manner, and to link together information to produce a multidimensional document.

Distance learning

Distance Learning, method of learning at a distance rather than in a classroom. Late 20th-century communications technologies, in their most recent phases multimedia and interactive, open up new possibilities, both individual and institutional, for an unprecedented expansion of home-based learning, much of it part-time. The term distance learning was coined within the context of a continuing communications revolution, largely replacing a hitherto confusing mixed nomenclature—home study, independent study, external study, and, most common, though restricted in pedagogic means, correspondence study. The convergence of increased demand for access to educational facilities and innovative communications technology has been increasingly exploited in face of criticisms that distance learning is an inadequate substitute for learning alongside others in formal institutions. A powerful incentive has been reduced costs per student. At the same time, students studying at home themselves save on travel time and other costs.

Whatever the reasoning, distance learning widens access for students unable for whatever reason (course availability, geographical remoteness, family circumstances, individual disability) to study alongside others. At the same time, it appeals to students who prefer learning at home. In addition, it appeals to organizers of professional and business education, providing an incentive to rethink the most effective way of communicating vital information.

Better accesses to children with disabilities

Information technology has brought drastic changes in the life of disabled children. IT provides various software and technique to educate these poor peoples. Unless provided early with special training, people profoundly deaf from birth are incapable of learning to speak. Deafness from birth causes severe sensory deprivation, which can seriously affect a person's intellectual capacity or ability to learn. A child who sustains a hearing loss early in life may lack the language stimulation experienced by children who can hear. The critical period for neurological plasticity is up to age seven. Failure of acoustic sensory input during this period results in failure of formation of synaptic connections and, possibly, an irremediable situation for the child. A delay in learning language may cause a deaf child's academic progress to be slower than that of hearing children. The academic lag tends to be cumulative, so that a deaf adolescent may be four or more academic years behind his or her hearing peers. Deaf children who receive early language stimulation through sign language, however, generally achieve academically alongside their hearing peers.

The integration of information technology in teaching is a central matter in ensuring quality in the educational system. There are two equally important reasons for integrating information technology in teaching. Pupils must become familiar with the use of information technology, since all jobs in the society of the future will be dependent on it, and information technology must be used in teaching in order to improve its quality and make it more effective.


INTRODUCTION

The information society challenges the education system. In recent years, the speedy, effective and global communication of knowledge has created a new foundation for co-operation and teamwork, both nationally and internationally. The increasing role played by information technology in the development of society calls for an active reaction to the challenges of the information society.

Already, new and greater demands are being made as to the core qualifications of individuals, as well as to their understanding and knowledge of the consequences of the introduction of information technology for the work and organisation of a company. Companies are no longer forced to gather all their functions in one place. The knowledge-intensive functions such as development and marketing can be sited in countries where the labour market can supply highly educated employees, whilst production itself can be moved to low wage countries. The result is the efficient handling, processing, co-ordination and administration of company resources, which is decisive for the competitiveness of the company.In a society which is becoming increasingly dependent on information and the processing of knowledge, great demands are therefore made that the individual should have a solid and broad educational foundation on which to build. Educational policy in the information society must ensure that:
 IT qualifications are developed by means of their integration in all activities in the education sector and
 The individual citizen must have an active and critical attitude to developments and not passively allow technological development to set the pace.


IT educational policy must ensure:
Up-to-date qualifications in the information society
Up-to-date qualifications gained against the background of a high general level of education in the population will be decisive if Denmark is to maintain competitiveness and its share of the global labour market in the information society. IT skills and IT understanding are thus central prerequisites for the individual, both now and especially in the future.

The advantage of using information technology is that time-consuming work routines can increasingly be performed by means of this technology and time can thus be devoted instead to communicating and informing, to the processing of information and the production of knowledge.

PC Troubleshooting Tips Why is My PC Crashing?


Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files

Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files

Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software

Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory

When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating

If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!

As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

What is Computer Network?


Two or more computers connected together through a communication media form a computer network.
The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

These are written rules used for communications. They are the languages that computers use to talk to each other on a network