Tuesday, July 19, 2011

:: New Hard Drive with 4000 GB (4 Terabytes) storage capacity ::

Hitachi develops new hard drive head technology that will increase storage capacity to 4TB by 2011

Hitachi recently announced that it has achieved a breakthrough in hard drive read-head design.

This breakthrough has produced read-heads in the 30-50 nanometer range, approximately 2,000 times smaller than the width of an average human hair. This new technology is called current perpendicular-to-the-plane giant magnetoresistive heads.

Giant magnetoresistance principles won scientists Albert Fert and Peter Grunberg the 2007 Nobel Prize for Physics.

These new heads will allow Hitachi to expand storage capacity in standard 3.5-inch desktop hard drives to 4TB and extend 2.5-inch laptop hard drives to 1TB of capacity. Hitachi says that it plans to integrate these new heads into hard drives starting in 2009 and that the technology will reach maturity in 2011.

The first products to reach market in 2009 will use recording heads of 50nm and products with recording heads of 30nm will hit market in 2011. Hitachi representatives believe the new heads will allow for storage densities of up to 500GB per square inch. The current highest capacity drives from Hitachi can only pack in 200GB per square inch.

Another benefit of the significantly smaller heads is that the hard drives will product less noise. Test products using 50nm heads produced 40dB of sound while the 30nm heads produced 30dB. Large capacity hard drives that produce less noise will be a welcome addition to digital video recorders.

Sunday, May 15, 2011

::: What is a Trojan? :::

What is a Trojan?

A Trojan is small, malicious programme that is installed along with a more attractive one. For example, that great freeware programme you got from that dodgy website? It may well be the programme you wanted. But someone (usually a 3rd party) may well have attached a Trojan to it. The Trojan will be installed as well as the software you wanted.

Trojans are not viruses, in the sense that they don’t replicate or send copies of themselves to others. They are just another programme that can be installed on your computer, albeit a nasty one!
What do Trojans do?

A Trojan can be very malicious indeed. Most of them are intent on controlling your PC. These are called Remote Access Trojans, or RATs for short. If someone has placed a Trojan on your computer, they’ll be able to see everything that you can. Some of them can even controll your webcam. That means the attacker can see you! If you have speakers attached to the PC, they can even hear you!

If that weren’t bad enough, the attacker will have access to your computer, enabling him to upload nasty things to your PC. After all, why should he store these things on his computer when he has access to yours?

Most Trojans these days, though, are placed on your computer by criminals. If you type your credit card details in to a website, for example, then the attacker can record what you type. If a criminal has controll of a lot of computer, he could also launch something called a Denial of Service attack. A DoS attack is when a lot of malicious computers attack a particular network or website. The network has so many request that it can’t cope, so has to shut down. The criminals then blackmail the owner (“We’ll let you have your site back if you give us money”.) Many gambling sites have been hit by this type of attack.

A Trojan can also disable your security software, leaving you wide open on the internet.
How do trojans get on My Computer?

If you have an unpatched version of a Windows operating sytem (XP, ME, W98, etc) that is allowed on the internet then you have a very high chance of becoming infected. Install Service pack 2 as matter of urgency. And get all the other Windows updates. If you browse using Internet Explorer then be aware that it is notorius for being unsecure. (At one stage, it was known as the Swiss Cheese browser because it had so many holes in it!) even with all the latest patches, someone is always trying to find a new hole in Internet Explorer. If an attacker can guide you to a particular website, then your browser’s security holes can be a way for them to load programmes onto your PC. A lot of people have switched to using a browser other than Internet Explorer, the most popular choice being Firefox.

But Trojans can get on to your PC many other ways: email attachments, software/music downloads, unsafe Instant Mesaage clients, IRC, Peer 2 peer downloads, open ports not protected by a firewall – the list is long!
If I have Anti-Virus software, does that mean I am protected?

You are not necassirly protected from Trojans, just because you have Anti-Virus software on your computer. If you have Norton or Mcafee please remember this: Most popular does NOT mean best! (See our Anti-Virus section for more details.) The problem faced by the makers of Anti-Virus software is that Trojans are easily adapted, and new versions come out all the time. Anti-Virus software makers are constantly playing catch-up. That’s why it’s important to update your Anti-Virus software on a regular basis. Besides, a really good trojan can disable your Anti-Virus.
(copyright @ internet)

::: Basics Of Dual-Core Process Computer :::

The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip).
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.
(for the copyright internet)