Pages

bin

Monday, May 16, 2011

Web Browser

A Web Browser is a software on your computer that is designed to download files and webpages from servers as well as read the coding of the webpage and then graphically display them as it’s specified in the coding. There are various different Web Browsers out there and you are actually using one to access this webpage right now. Some popular Web Browsers today would be Internet Explorer.
Mozilla Firefox, and Google Chrome. Although some Web Browsers generally work better and faster than others, you’re bound to run into Browser Compatibility Issues regardless of the Web Browser you’re using.

Browser Compatibility : A browser compatibility issue is typically when webpages work fine in some Web Browsers but are either broken or look different when being accessed with others. In some cases, screen resolution can have something to do with the way the coding is displayed within your Web Browser and can be seen as being a Browser Compatibility Issue.

Web Browsers are all designed to read coding differently. So there may be certain coding used on your webpage that are either deprecated and not supported by the Web Browser, or displays the webpage differently. In some cases these issues can be caused by browser version updates.

TIPS : Don’t expect to wait for a version update for a particular Web Browser. My recommendation would be to ensure that you are not using deprecated coding. Typically you will still have issues even if you’re using the most up-to-date globally compatible coding, however the trick to preventing Web Browsers from having compatibility issues is to use IF statements within the CSS (Cascading Style Sheets) of your site. This way you can basically have your website built mutliple times (and differently) and can be redone to look properly within each Web Browser.

Friday, May 6, 2011

Computer virus

"Virus" is an umbrella term used to describe malicious programs that unwantedly install themselves onto your computer .


Stinger Virus Scan.

Stinger is a stand-alone program provided for free by the famous McAfee company, and its purpose is to scan for and remove infections such as viruses. While it isn't robust enough to be a fullblown substitute for purchased and regularly maintained anti-virus software, it is a good supplement program to run alongside stronger protection. In addition, since it was made to counter various specific infections, if you know that the infection is one of those which Stinger removes, you can download Stinger and use it as a removal tool.

The scanning interface used by Stinger is simple enough for even computer novices to understand it. After launching the program, you can further narrow or broaden the specifications for the scan. It will scan the C drive automatically, but you can add other drives or folders, or remove them, through the add, browse, and remove buttons. Once you've selected all the areas of your computer you want to be scanned, clicking the Scan Now button will initiate a scan. Unless you select otherwise, Stinger will remove all infections it finds and repair all files. If a file is unrepairable or an infection is unremovable, then it is most likely that the operating system considers it protected. When in Windows, the easiest way to get around this is to reboot into Safe Mode before running Stinger. If that fails, stronger methods than Stinger may be necessary.

Stinger also has a number of further options, despite its simplicity and ease of use. Its behavior towards infections can be altered to only report the presence of infection, to rename the infected files, or to delete infected files entirely. Both processes and boot sectors can be selected or deselected for scanning, and the interface can show, or not show, a complete list of what it scans in the final tally. For more advanced users, such options as a heuristic network check and a check for MIME or UUEncoded content are also available, amongst other more involved settings. It's recommended to be careful about Stinger's infection behavior settings when the sensitivity of the program is set to high, as overly high sensitivity combined with drastic infection tactics could result in needless loss of files.
AUTHOR: STEPHEN MACKEY