-->
Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu
Showing posts with label IT Application. Show all posts
Showing posts with label IT Application. Show all posts

Friday, November 30, 2012

Computer Virus Could be Rampant in Medical Equipment

Computer experts from the UK found that there are more than 8,000 types of viruses ready to attack computers and medical equipment health. They revealed that viral infection may be so severe that patients may ultimately died of a computer system in a medical analysis can not be changed, because the virus attacked software section.

Computer experts at one of the leading hospitals in the United States revealed that the experts managed to remove a virus attack in a week on two machines computer center. This warning has been given as part of a panel discussion in Washington DC, as reported by Technology Review of the Massachusetts Institute of Technology.

Mark Olsen, chief security officer at Beth Israel Deaconess Medical Center in Boston, said the hospital has 664 medical devices that operate on older versions of the Windows operating system. This means that medical devices have drawbacks because it can be attacked by a virus on its Windows system.

Experts say it can be difficult to upgrade 
old software on medical devices due
to regulatory restrictions. (Picture from:
http://www.bbc.co.uk/)
Professor Kevin Fu, a leading expert in medical technology from UK explained that when the machine is infected with the virus do not always have updated equipment because of fears the threat. However, if left unchecked, it means breaking the rules imposed by the U.S. Food and Drug Administration (FDA). Where is the FDA approved the use of technology for security testing, the software against cyber threats needs to be improved. Imagine if we had a medical monitors that run with Windows systems that have been infected by a computer virus, it will slow down operations.

"Conventional malware rampant in hospitals because of medical equipment using un-patched operating system. There is little way to the hospital when the producers refused to allow the (operating system) update or security patch," said Prof. Fu. There are also concerns, medical devices could even end up being part of a botnet (a huge network of hijacked computers that are often used to send spam email).

Medical devices can be affected by the slow performance when infected, Prof. Fu told the BBC. "Imagine if you had a heart monitor device that runs Windows system and infected by a virus, the computer slows oprasional. Slowing computer course can lead to death. Sensor readings, and even analysis can be chaotic."

He said that there was no evidence of malware attacks on medical machines as a result of being targeted by hackers. Instead, he said it was more likely due to "collateral damage" of conventional malware designed to infect normal PC. "What we found is that the medical computer software has brought tremendous benefits for treatment. However, we forget that there are other threats that attack the risk of software," he said. *** [BBC | DEDI RISKOMAR | PIKIRAN RAKYAT 22112012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Wednesday, November 28, 2012

Anti-Theft Alarm for iPhone

The owners of the iPhone is certainly a little more worried if their expensive gadgets was stolen. Well, Apple has now patented anti-theft mechanism that will sound an alarm if the smartphone is stolen.

Explanations related technology patents filed with the Patent and Trademark Office of the United States last week (11/11) revealed that the anti-theft system that Apple works by detecting motion patterns of smartphones.

The title of the patent is "Acceleration-based theft detection system for portable electronic devices" or based theft detection system motion speed ​​for portable electronic devices. According to sources in the patent office, the alarm will be active once the smartphone is concerned detected a "condition of theft". These conditions are determined by the built-in accelerometer, combined with software that will decide whether a condition fit the "profile characteristic of theft" or not. Of explanation, imagine that the iPhone will be equipped with this technology "scream" when taken from their owners by violence, such mugged.
Apple is looking for a patent on a automatic alarm for the Apple iPhone. (Picture from: http://www.phonearena.com/)
Accelerometer itself used to detect how users holding his smartphone, so it can be used to detect join other matters related to the movement of the phone. Why did Apple feel necessary to patent this technology? The reason, according to Apple, is that miniaturization electronic device trend. "Rightful owners become increasingly easier to bring the device to all places, as well as thieves," wrote Apple in patent filings.

"An acceleration sensor detects the acceleration of a portable electronic device, and a controller analyzes this acceleration to determine whether a theft condition is present," Apple explains in its patent application. "If so, an alarm can be initiated. The theft prevention system can include a filter for attenuating irrelevant acceleration frequencies and isolating those representative of theft, and comparison hardware/software for determining whether the detected acceleration matches a known acceleration profile characteristic of theft. Various parameters of the theft prevention system can also be set by a user through mechanisms such as a graphical user interface."

In order to prevent or reduce false alarms, the security mechanism would filter out acceleration signals corresponding to shock or impact, which would occur if you drop your device. There's a special signal filter and theft detection circuitry to address false alarms. If a possible theft is detected, the user has a set amount of time to enter an alphanumeric passcode before the alarm sounds and/or the user is locked out of the device.

In the last two weeks, Apple has been granted the rights to at least 34 patents, including 3D video applications on mobile devices, how to play the content on the Apple TV, and the background changes to Apple's iChat video conferencing applications. However, a patent will not necessarily be realized in the finished product. *** [EKA | FROM VARIOUS SOURCES | TRIBUN JABAR 18112012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Sunday, November 25, 2012

Guest Post: iPhone5 Financial Applications

iPhone 5 has finally officially announced by Apple in San Francisco, United States. Today iPhone 5 are not for fun and entertainment, these gadgets can also be used for your business and tracking your a personal accounts. Finance applications for iPhone 5, can be used for tracking the expenditures and revenues without any prior knowledge on accounting.

Some of the apps are free to download and some of them need to be purchased. These apps are mainly used for tracking accounts like when an online transaction is made out of your account and to view your accounts balance, these types are applications are very user friendly.

Almost all of the application can be downloaded from iTunes, there are tons of finance applications you can get. Some of the financial applications for iPhone 5 are:

Toshl Finance
This is a mobile expense tracking application with a twist. It offers extremely user friendly interface for tracking your financial expenses. With Toshl usage, users know where their money is going and can therefore change their spending habits and save some money on the long run.

Toshl provides the tools for tracking expenses, in multiple currencies (with automatic exchange ratio), syncs with cloud (so your data is backed-up constantly), allows users to tag their expenses, set up budgets and export data via Microsoft Excel, CSV, Google docs and PDF.

This applications delivers a clean iPhone expense tracking feature it is a built in application with the iPhone.  By using this application you can know where your cash is going and you can add and edit the expenses and incomes. You can also sync with the Toshl cloud. You can use either service or you can go for the paid version.

Mint.com
It is one of the earliest applications for the iPhone which can be used for tracking your business accounts or your personal finance accounts. It can be also used to connect to bank accounts for using the online transactions which pull all the data together in one place. You can download it from the mint.com website.

Fastest, easiest way of checking your account balances on the fly. It automatically itemizes all your transactions and geo-tags where you spend your money.


Mint.com's iPhone app lets you check your account balances on the fly, as long as you're connected to the Internet. When paired with a Mint.com Web account, it's the best way for financial noobs to take control of their personal finances.

Bloomberg
For experiencing the high quality features of the iPhone you must install this kind of app on your phone. It can also be used to get news and price quotes. It gives you the accurate and timely information on financial markets. It can also be downloaded from the iTunes.  It can be used to get company descriptions, market trends and analysis and much more. You can get customised results from the list of stocks that you want to follow from the market analysts.

Whether you invest in the stock market or not, it’s good to know the state of the market and the economy.
Bloomberg is much better than iPhone’s native stocks app. You get up to date reports on all the major markets- Dow Jones Industrial Average, NASDAQ, Nikkei, and many more- from all around the world.

You can also look at detailed reports of individual stocks, and you can select your own portfolio to quickly monitor the state of your favored stocks. Even better, the Bloomberg app comes with a terrific news section so you can stay informed on the state of the economy. The app also looks slick, is easy to use, and loads quickly, making it the easy choice for tracking the financial world.

moneyStrands
moneyStrands is free online personal finance software with money management tips and anonymous comparisons of your spending with others who share a similar lifestyle. There's also a handy moneyStrands iPhone app.

It shows all the account balances at one place, and also transaction information can be viewed. It is a personal finance iPhone application with good money managing features. With this app you can add or delete the budgets and it can also be used to track the accounts expenditures.

People with very simple budgets will like moneyStrands. While moneyStrands could use more variety of reports and navigation could improve, the new Cash account, support for multiple currencies and data export features bumps the review score to nearly to just over 4 out of 5 points.

SplashMoney
This application made by SplashData is the iPhone and iPod touch version of the popular financial software for desktop PCs, Palm OS, Pocket PC, and BlackBerry. Unlike many of the more simple finance applications covered in this article, SplashMoney aims to be something more akin to a desktop application, offering syncing, downloading of the user’s latest account information directly from his or her bank, and more.

With the help of SplashMoney user can effectively manage their money at anytime and from anywhere. Using your mobile device or your desktop computer you must connect to the online bank of yours and from there you can easily download transactions directly into SplashMoney.

The technique of navigation is extremely easy and the interface provided by the desktop software is pretty old-fashioned and rudimentary in comparison to website of Mint.com. Several automation can be used by this one. For syncing the credit card account of yours It is required to “approve” each and every transaction when you only require a list of several activities. Your routing as well as your account number must be entered by you and all by yourself.

Bill Assistant - Bill Tracker & Reminder
If you want to avoid paying penalties for not paying the bills on time, with this app you will not have to again. With this app you get alarms when your bill is pending.  These types of apps can also be used for tracking your accounts, expenditures and revenues when you have taken any payday loans from the money lender or from the banks.

You can see which bills are due soon, see how much you are due to pay, keep a record of your payments and have the application remind you when your bills are due. This application made you feel have an on-line assistant when making a payment with easily look up the payment information you need to pay your bill, can call your supplier quickly & easily from within the application, and record payment of your bills with a few taps - log when it was paid, which payment method was used, record confirmation numbers.

Bill Assistant has the flexibility you need such as optionally record multiple payments for a single bill, record bills where the amount due is Unknown. This application is highly configurable allowing you to personalise it for your own circumstances. *** [By: JENNIE JILL | FROM VARIOUS SOURCES | EDITOR: EKA]
Note: This blog can be accessed via your smart phone.

About the author:
Jennie Jill, a specialist in financial blogging from Manchester at payday loansAnd catch her @financeport.
Enhanced by Zemanta

Wednesday, October 31, 2012

Windows 8 Revolution

Windows 8 officially launched simultaneously around the world on Friday, October 26, 2012. Microsoft's latest operating system is touted as the second major revolution in the family of Windows after Windows 95, which maximally exploit free interface.

There are three operating systems are launched, namely Windows 8, Windows 8 Pro, and Windows RT. Windows 8 is the most basic version intended for general users, Windows 8 Pro is intended for professionals, and Windows RT is Windows 8 specifically for ARM-based mobile devices.

Computers with Windows 8 operating system can run on any older versions Windows Office application. While Windows-based devices RT can only run applications designed specifically from the Windows Store.

Windows 8 Installation takes about 10 minutes. If the upgrade is performed on a Windows 7-based devices, personal files and settings to an earlier application can still be used.
Windows 8 screenshot. (Picture from: http://www.howtogeek.com/)
Windows 8 interface using the new pattern. Icons that had changed little boxy rectangular box that continues to date. This is similar to the view outside the widget function continues to change with it.

On the right side of the screen there is a Charm feature. Contents of a setting, search, move the display screen, and share content. Its function is to facilitate navigation from one view to another view.

Although designed specifically for a touch screen, Windows 8 can still be operated on a computer with a mouse and keyboard shortcuts. The goal is transition to the new system is not too surprising.

Here's music video of Windows 8 commercial song, Everything At Once by Lenka.
If you want to install Windows 8. First, you’ll want to make sure that your PC can run Windows 8, and thankfully the Windows 8 system requirements are basically the same as Windows 7. You can probably get away with installing this on a PC with lousy specs, but obviously you’ll have a better experience on a faster machine. Here’s the specs:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver
  • Taking advantage of touch input requires a screen that supports multi-touch
Just head to dev.windows.com and download the ISO images from the page. Then head to the Microsoft Store page and download the USB/DVD Download Tool, which can put the ISO image onto a bootable flash drive for installation—all you have to do is choose the ISO, choose the drive, and wait for it to finish copying.

The setup process is nearly identical to Windows 7, so we’re not going to go into detail about it here. We’ll assume if you’re installing Windows 8 that you’re not a newb, and as such you shouldn’t need any help clicking through a couple of installer screens. *** [BUDI RIZA | FROM VARIOUS SOURCES | KORAN TEMPO 4040]
Note: This blog can be accessed via your smart phone.
Enhanced by Zemanta

Wednesday, September 26, 2012

Dangerous Loopholes of Samsung Galaxy

A dangerous bug was found in the Samsung Galaxy line of mobile phones. Cracks can deleted all data on the phone with just one click.

Cracks were discovered by researchers from the Technical University Berlin, Ravi Borgaonkar. He showed the results of his research at an Internet security conference in Argentina.
Ravi Borgaonkar demonstrating Galaxy handset flaws. (Picture from: http://betabeat.com/)
Borgaonkar explained that the TouchWiz interface used on the Samsung Galaxy variant has holes that can be exploited by hackers HTML code.
Samsung Galaxy Android. (Picture from: http://www.engadget.com/)
The way it works is very simple. Hackers only need to insert the HTML code into a web page, and while Samsung Galaxy users accessing the site, as it is also a code for the full wipe or reset is active.

When examined the code does contain a code to reset the Samsung Galaxy, and the hackers simply enter the code in a web page to activate the code reset automatically.
Samsung Galaxy S III, Galaxy S II and Galaxy S. (Picture from: http://www.engadget.com/)
As quoted from Slashgear, Wednesday (09/23/2012), the code can erase all data on the Galaxy S II, Galaxy S Advance, Galaxy Beam, Galaxy Ace. However, when the authors tried, the code can also be used on the Galaxy S III.

Mr. Borgaonkar, who reportedly wondered aloud what Samsung’s engineers were smoking when they created the vulnerable system, demonstrates how it works in the video below.
Viewers may need headphones to hear Mr. Borgaonkar clearly, but the shocked audience reaction at 2:10, when he uses a link from a tweet to demonstrate how quickly a malicious web page can reset the phone, is unmistakable.

Well, for those users who are curious about the Galaxy series, do not try typing that shortcut. Because it will reset your phone without any confirmation (option 'yes' or 'no') before! Beware...!!!! *** [SLASHGEAR | BETABEAT | DIGITAL SPY]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, September 20, 2012

1AVStreamer, Stream Your Video onto the Internet

Who knows if you are full of talent human being, whether it's singing talent, sharp wit, insight or commentary on current events. However, no one outside of your house are aware of this, and the rest of the world is missing out. There must be a way to convey your greatness to others, and you suspect that somehow the Internet should be part of the solution. Suddenly it hits you! Your webcam! You can broadcast yourself across the world wide web! So it's the idea of ​​writing on a napkin, now how do you pull it off?

PCWinSoft is a reputable software publishing company from Brazil has launched one of their leading products, namely 1AVStreamer. With 1AVStreamer the perceived obstacles to show your talent can overcome. Now the whole world can know and enjoy the talent that you have. Absolutely superb..!

Of course by using 1AVStreamer was very helpful! 1AVStreamer lets you broadcast yourself on the internet in one click, appeared in high-resolution video and excellent audio quality via a special web pages that are part of your own website. You can choose to stream your webcam, your desktop computer, even a DV camcorder connected to your system. 1AVStreamer even lets you save a copy of your broadcast recording for later playback and review!

1AVStreamer comes with other important features like the capability to totally hide itself even from Windows task manager so that even advanced users will not be able to know the software is running. This important feature will allow you to spy on your room, office, or on your desktop, over the web and without ever being noticed. How great is that?
Screenshots of 1AVStreamer. (PIcture from: http://www.pc-windows-software.com/)
People can access the video/audio streaming using the internet browser without the need to install any special software. You can save your stream as open as you want, or locking it with a password to restrict access. Plus, with 1AVStreamer, you will always have a log of all network connections and requests in real-time! As an administrator, you will have total control over the maximum number of connections, the quality of transmission, even broadcast schedule!
Screenshots of 1AVStreamer. (PIcture from: http://www.pc-windows-software.com/)
1AVStreamer is also perfect for trainning sessions and seminars because the content can be broadcasted to all PCs in the room and at the same time recorded for posterior web publishing. The software is also fit for your home entertainment system because you can broadcast video from one point to the entire house. 1AVStreamer is also perfect If you what you need is to publish live video from your stablishment directly to your website.

The minimum requirements to run 1AVStreamer software:
  • 1.3GHz processor.
  • 120MB HD.
  • 256MB RAM.
  • Windows 2000/XP/2003/Media Center/Vista/Windows 7/Windows 8.
  • 800x600 of screen resolution.
When it comes to streaming video right from your PC over the Internet reliably and in high resolution, 1AVStreamer is definitely the product you are looking for. Grab your free copy of 1AVStreamer by clicking this giveaway page:
give-away
Do not waste any more time and get your copy of 1AVStreamer right now with only U.S. $59.99. *** [ALESSANDRO FERRI | PCWINSOFT]
Note: This blog can be accessed via your smart phone.

Thursday, September 13, 2012

Secure Your Mobile Media

It is the human nature that likes to use something new and sophisticated but perhaps this is not true for gadget users in a remote telecommunications, disaster areas and war areas.

Not long ago, a nonprofit group MobileActive released a program called SaferMobile intended for activists and journalists who were in the area with a repressive regime. Through the program, the agency provides a guide on how to use encryption techniques and the use of handheld mobile devices that are not tracked.

The agency warned of the risks of using a communication device for activists and journalists working in conflict-prone areas. Many now prefer the international media news sources of the local population in conflict-prone areas, to reduce the risk of security for journalists working in the region.

But it was also create new problems. Rami al-Sayed, for example, video bloggers who are sending video material from the conflict in Syria, was killed after the download of video clips on the internet, used by Al Jazeera, the BBC and Sky News.

Through the agency SafferMobile program provides guidance on how the use of a number of communication tools can be dangerous device users. Through safermobile.org site, the agency released a Twitter user, YouTube service, e-mail, and downloading of pictures taken from a camera mobile phone. The Institute also provides satellite phone user is often so turned improve security risks in its operation.

The site invites users device communication tools to realize the risks of using communication tools to protect themselves.

Who does not know the sophistication of satellite phone, which is able to provide communication access in almost all locations in this hemisphere. Satellite phone, despite high operating costs, often a choice available when it comes to device communication tools in one location are minimal telecommunications infrastructure, from natural disasters to war conflict situations.

The agency expose a number of security-related risks users. Among other things, relatively easily intercepted satellite telephone, data sent via satellite could hardly be encrypted, and the device is also often sends the user's location in the form of data the GPS satellite coordinates.

In areas of conflict, particularly the war zone, the use of satellite phone can be dangerous. Frequently humanitarian activists and journalists became targets of the regime who feel aggrieved by their activity. The agency provides a number of tips that can be used to reduce risk. *** [AHMAD F | MOBILEACTIVE | PIKIRAN RAKYAT 13092012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Friday, August 31, 2012

The Unique Application on iPhone

Has not this blog does not display info about the gadget. On this occasion I try to display info derived from uniknya.com site.

Now iPhone is more familiar to the world community, especially the young people and businessesman. Young people who love the world of multimedia, iPhone will feature a complete delight. Businessman optimize the features of his office. But, besides all that, there are several iPhone apps that are unique and strange, here's an example:

1. Fart Mobile (Farting Sound Application)
This unique application for you who like to joke with friends. This application turn your iPhone into a virtual fart machine. Thus, it can be adjusted in the menu by simply moving the iPhone alone, it would be a real fart sound.

Also included is a variety of "types" farting noise. Can be used as a tool to joke around with comrades.

2. Baby Shaker (Lull Baby Application)
Baby Shaker application is a strange and controversial because it makes the baby as a toy object. How, you have a duty to lull baby with shaking the iPhone. If fine, the baby will fall asleep. If rough, the baby will cry and appear cross sign in his eyes.

Now, Baby Shaker apps was removed just a few days after its release.

3. iResus (Virtual Medical Applications)
iResus actually not so strange, but many people are worried because of the medical process is hung entirely on the iPhone. Dr Daniel Low at Hospital Seattle, simulating the operation with a view all the instructions step by step on iResus.

Although not a doctor, you can act as a medical expert.

4. Dog Whistler (Dogs Training Application)
Dog Whistler next unique applications. It's quite popular among iPhone users who have a dog in their home.

The application is easy to operate, you simply press a whistle symbol on the phone screen so that later appeared low frequency whistle that only dogs can hear at once will train them.

5. Hold On (Challenging How Long Grasping iPhone Application)
The latter is called Hold On. The application is to test how long you can press the button right in the middle of the screen. However, on second thought, this application eliminates boredom or create boredom?

It's good you play against other people to be more exciting. *** [MUHAMMAD SUFYAN | PIKIRAN RAKYAT 30082012]
This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, July 12, 2012

Taking Lessons From Internet Doomsday

Earlier this week, July 9, 2012, internet citizen aka netizen to be wary of Internet doomsday. Although not fully proven, we can always take lessons from any incident that occurs.

It all began with the act of six Estonians and one Russian citizen last year. The group is led by Vladimir Tsastsin (31), a computer specialist malware (malicious software) maker.

Vladimir is the owner of several internet companies that have been attachment to the malware community. Other suspects are Timur Gerassimenko (31), Dmitri Jegorov (33), Valeri Aleksejev (31), Konstantin Poltev (28), and Anton Ivanvov (26).

The majority of them have captured the United States federal agents (FBI), yet one person still at large. They've been making since 2007. Because of the knowledge-based, virus threats that are made are still threatened even though their bodies are locked up in jail.

Malicious actions of DNS Changer virus allegedly infecting four million computers in the world, 50 thousand in Indonesia. DNS (Domain Name Server), is a means to address the human translator in the form of internet protocol number.

As an illustration, we are certainly easier to remember www.facebook.com than an actual computer system identifies the address of a computer with internet protocol numbers and addresses.

Through a number of engineering programming, Tsastsin group can control the victim computer's DNS server and redirect to a fraudulent DNS server that has been prepared in advance. More crazy, antivirus programs can disable them.

With all these threats, the Minister of Communications and Informatics of Indonesia Mr. Tifatul Sembiring said in various interviews, internet doomsday discourse quite exaggerated, but all parties should be aware of internet security.

Similar delivered Rolly Awangga, founder of Saung IT (information technology dissemination organizations from Bandung). According to him, the internet doomsday are increasingly confirming the Indonesian Community to improving computer security.

"We can take the lesson is always update your anti virus. Or if you want to be more fundamental, use a proven antivirus operating system such as Linux-based. Or UNIX base operating system," said the man from Bojongsari, Indramayu.

On the other hand, institutions that serve the public such as banks should always be aware and the public interest. He exemplifies the core banking services in the United States is willing to turn itself off when the internet doomsday. "That is not turned off because the malware has infected. However, rather than one client visit a site that has transferred control of his, they would prefer safe to turn off the first service. This should be followed," he said.

As a result, we can learn a lot from the July 9 Internet Doomsday. Even if we look at pattern threats of internet attacks on the public before, we can study the patterns of threat:

1. Melissa Virus (March 26, 1999)
Created by David L Smith, Melissa virus was first known on March 26, 1999. The virus is crippling client e-mail that can not be used, because the full electronic mail sent and received double the infected computer. Although it is marred not too big, but the giant companies like Microsoft when it shut down its e-mail while.

2. Y2K (Desember 31, 1999)
The second is the Y2K disaster, this is a calculation error caused by a computer storage system on which only provides two digits for the year, assuming that the first two digits are "19".

This is done in the 60's when the first computer designed to save on storage media. But when the new year 2000 arrives, the computer may indicate that the date change from December 31, 1999 to January 1, 1900.

This error will cause a major disaster is feared because the computer is also used to manage critical facilities such as nuclear power plants and aircraft. As a result, many companies around the world held a renewal in the field of computers, both software and hardware.

3. 'I Love U' Virus (May 4, 2000)
With the name of 'I Love U', this attack made netizens headache in 2000. Why not. This 'Romantic' virus has infected 55 million computers and causing losses of billions of dollars.

According to security software firm Symantec, the incident made the CIA and the British Parliament was forced to shut down their e-mail system in order to anticipate the threat. Its name is derived from the subject of e-mails that users receive.

Peak of the damage occurred on May 4, 2000. E-mail containing this virus consists of an attachment that says "LOVE-LETTER-FOR-YOU.TXT.vbs". When activated, the computer worm overwrites all files on the host as well as attacking a copy of itself to every file.

4. April Fool's Day (April 1, 2009)
There's also April Fool's Day conficket virus that spreads from April 1, 2009. This attack could infect up to 9 to 15 million computers at that time.

April Fool Conficker Virus is exploiting vulnerability the RPC DCOM MS 08-067, thus significantly succeeded in creating fear in the world of computer users.

5. 'Here You Have' Virus (September 9, 2010)
It became one of the darkest day for Internet users, especially in shipment proximity to the memorial of Black September. Because the users get e-mail subject 'Here You Have', which apparently contains a virus in it.

E-mail spread around the world at the time and managed to 'beat' network of major organizations such as Disney, NASA, Comcast, AIG, and Proctor & Gamble.

The virus is relatively harmless, is actually just a form of spam in the inbox, which in turn makes the user can not send e-mail anymore. But look at anyone who is a victim, obviously this is not a virus at random. *** [MUHAMMAD SUFYAN | ILHAM SANTOSO | TIM CERKAS | PIKIRAN RAKYAT 12072012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta