Tuesday, February 9, 2010

Power Consumption - Intel and AMD




Power Consumption
Intel and AMD

Difference between intel core i3 processor & core 2 duo?

The difference?
i3
-32nm
-integrated graphics
-PCI-e 2.0 controller, couple of em come with 2X8 along with da 1X16 support
-2channel integrated memory controller
-hyper threading

core 2 duo
-65,45nm (needs more power n generates more heat)
-of course no concept of integrated graphics
-no PCI-E controller
-no memory controller
-no Hyper Threading

What is the difference between AMD and Intel processors?

They are competitors.

The main difference between AMD and Intel processors are that AMD processors have a 10 step execution process which doesn't allow as fast of a clock but AMD's counter that by being able to do more operations per clock cycle. Intls on the other hand have a 20 step execution proccess which allows much higher clock speeds but they have fewer operations per clock. Thats why a 2.08 Ghz AMD barton can perform at levels like a 2.8 GHz Pentium 4. Another difference between the processors are the sockets they use. AMD's generally use Socket A (462 pins) while Intel generally uses Socket 478 (478 pins). Other differences include supported chip sets, AMD motherboards generally use SIS, VIA, or N force chip sets while Intel motherboards use Intel, SIS, and most recently ATI chip sets. AMD is a favorite for over clockers because with minor modifications the FSB multiplier can be unlocked while Intel multipliers cannot be unlocked (Not to say that AMD is used exclusively by over clockers, because it is not, but this ability to be unlocked is a plus). Also as of now Intel processors have the largest L3 cache at 2mb while the largest for AMD is 1mb

INTEL processors: Intel was the first major brand for desktop CPUs, they survived a lot of competitors. The CPUs they manufacture are always a bit more expensive than AMDs. Because of their market shares, Intel was able to force some "gadgets" onto the market. Until 2002, all CPUs were classified by the speed (for example 2GHz - so 2000MHz). Intel lost some influence on the desktops CPU market because of AMDs techniques - they used not only pure speed but a more specific command kernel. By that the CPUs (i.E. AMD Athlon XP) were slower, but provided the same results as a faster Intel CPU (remember? AMD at 1.666GHz was the same as a INTEL on 1,8GHz). Intel provides most of the "normal" server CPUs today. Private users often choose AMDs for their machines to save costs. Intel supports the classification by the pure speed of a CPU no more. The introduced new numbers for the CPUs which represent the speed, the advanced features, the cache etc. for a certain CPU.


AMD: AMD concentrated on the PC and consumer market and cut the costs for their CPUs in order to be more competitive. Nowadays the AMD CPUs are hotter than Intel CPUs, therefore you will need a better cooling and your system will be a bit louder. AMD provides a dual core CPU for PCs longer than Intel and guess they have more experience with these features.

What is the difference between a hub, switch, and router?

A hub forwards packets it receives through one port to every other port on the device.

A switch will read packet headers and identify which machines are connected to which port based on the information they send. Any packets addressed to those machines will only get sent to that port of the switch.

A router looks at packet headers to determine which port it needs to forward a packet through, and also will translate packets between different protocols if needed. A router can also define subnets and will filter traffic as needed. Routers usually include DHCP, port forwarding capabilities and a whole host of other things usually controlled by software and therefore user customizable.

What is a runt, Giant, and collision?

When used in reference to networks, a runt is a packet that is too small to traverse the network. Network protocols such as Ethernet often require that packets be a minimum
number of bytes in order to travel the network. Runts are often the result of packet collisions along a busy network or can result from faulty hardware that is forming the
packets or from corrupted data being sent across the network. giant is a packet that is too large to traverse the network. Network protocols such as Ethernet often require
that packets can not be over a specific number of bytes in order to travel the network.

What is 3G?

3G is a family of standards for mobile telecommunications defined by the International Telecommunication Union, which includes GSM EDGE, UMTS, and CDMA2000 as well as DECT and WiMAX. Services include wide-area wireless voice telephone, video calls, and wireless data, all in a mobile environment. 3G allows simultaneous use of speech and data services and higher data rates (up to 14.0 Mbit/s on the downlink and 5.8 Mbit/s on the uplink with HSPA+). Thus, 3G networks enable network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency.

Tuesday, February 2, 2010

Computer & Virus

Computer Virus

Acronym Definition
VIRUS Very Important Resource Under Siege (slang)
VIRUS Vital Information Resources Under Siege (slang)


Computer Virus

Computer virus, rogue computer program, typically a short program designed to disperse copies of itself to other computers and disrupt those computers' normal operations. A computer virus usually attaches or inserts itself to or in an executable file or the boot sector (the area that contains the first instructions executed by a computer when it is started or restarted) of a disk; those that infect both files and boot records are called bimodal viruses. Although some viruses are merely disruptive, others can destroy or corrupt data or cause an operating system or applications program to malfunction. Computer viruses are spread via floppy disks, networks, or on-line services. Several thousand computer viruses are known, and on average three to five new strains are discovered every day. Virus programs can also infect advanced cellular telephones.


Main Types of Viruses

Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk.
Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers.

Examples: DMV, Nuclear, Word Concept.

Active X: ActiveX and Java controls will soon be the scourge of computing. Most people do not know how to control there web browser to enable or disable the various functions like playing sound or video and so, by default, leave a nice big hole in the security by allowing applets free run into there machine. There has been a lot of commotion behind this and with the amount of power that JAVA imparts, things from the security angle seem a bit gloom.

These are just few broad categories. There are many more specialized types. But let us not go into that. We are here to learn to protect our self, not write a thesis on computer virus specification.

Why people create computer viruses?
Unlike biological viruses, computer viruses do not simply evolve by themselves. Computer viruses do not come into existence spontaneously, nor are they likely to be created by bugs in regular programs. They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do.
Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, vandalism, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines. Many writers consider the systems they attack an intellectual challenge or a logical problem to be solved; this multiplies when a cat-and-mouse game is anticipated against anti-virus software. Some viruses were intended as "good viruses". They spread improvements to the programs they infect, or delete other viruses. These viruses are, however, quite rare, still consume system resources, may accidentally damage systems they infect, and, on occasion, have become infected and acted as vectors for malicious viruses. A poorly written "good virus" can also inadvertently become a virus in and of itself (for example, such a 'good virus' may misidentify its target file and delete an innocent system file by mistake). Moreover, they normally operate without asking for the permission of the computer owner. Since self-replicating code causes many complications, it is questionable if a well-intentioned virus can ever solve a problem in a way that is superior to a regular program that does not replicate itself. In short, no single answer is likely to cover the broad demographic of virus writers.

Anti-virus software and other preventative countermeasures

There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms’ have yet to create a signature for.

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. There have been attempts to do this but adoption of such anti-virus solutions can void the warranty for the host software. Users must therefore update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats.
One may also prevent the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like cd and dvd is closed, it becomes read-only and can no longer be affected by a virus. Likewise, an Operating System on a live cd can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different Operating Systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition (and preferably only for that reason), the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like ext3, so if one normally uses MS Windows, the backups can be made on an ext3 partition using a Linux installation.

Recovery Methods

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

Followers

Contributors