There are many reasons that someone would want to build their own pc. Among those reasons are saving money, and putting together a pc which contains exactly what you want. If you are willing to put your own pc together, then you could save quite a bit of money. Not only on the initial purchase, but also in the long run when it comes to the warranties. Most computer resellers offer a one year warrantee on the entire pc. However when purchasing your pc in component form, each individual component will have different lengths of guarantee. An example is your hard disk drive which usually comes with a five year guarantee, and your memory may give you a lifetime guarantee. Each individual brand may give you different warrantees as well so it helps to shop around. I also believe that some resellers may use the cheapest parts they can find to build your pc so that they can maximize their profits.
The second reason mentioned allows you to research each individual part that you are considering putting into your new pc and putting in the best that you can find. This allows you to get the best combination of components so that you can put together that killer pc that you have always wanted. The bonus of choosing your own components, is also that you will know whether a certain component is compatible with the other components and you will get good brand name components which have a good driver support from the manufacturer.
Talking about support, you may find that getting your pc working may be a bit difficult if you have never built your own pc before, (This would be the main downside to building your own pc), however there are several helpful websites where everyday people just like you and I are building their own computers and offer help and advice to anyone willing to listen. Check at the end of this article for a few ideas of helpful websites. A really big benefit of building your own pc is that when one of your components get old you could possibly replace or upgrade just that one part. Pre-built resellers will generally not recommend upgrading parts as they make more profit on selling you an entire new system. Several the pre-build computers are built in a proprietary fashion as well which means that newer technology might not be compatible with your current pc. So what do you need in a computer to make it work? Well there are very many things that you can add to a computer but I am going to cover only enough to get your computer from an empty space on your desk to something you can write letters with. Here is a list of items you require to have a functional pc:
1. A pc monitor
2. A mouse
3. A keyboard
4. A computer case
5. A mainboard or motherboard
6. A CPU (Central Processing Unit)
7. Memory
8. An optical drive, like a CD-ROM or DVD
9. A Hard Disk Drive
10. A screen card (If it is not included on the motherboard)
All this is called your hardware, and with these ten things you will have a computer. However you will not be able to write letters yet, to do that you will need to get some software to add to the above hardware. The most important software you need is an Operating system. This controls the whole computer and without it your new creation will simply sit there looking pretty. The most popular operating system on the market today is probably Microsoft Windows. The only other real option you have for an operating system is one of the Linux flavors. These will save you money but will require some learning curve if you are used to using Windows.
Once you have all these things then building your new pc is as easy as plugging everything together, doing some basic configuration and then installing the operating system. I am not going to go into all the detail of how to do all this as there is plenty of information out on the internet already, but I hope this article whet your appetite and persuaded you that you should be building your next computer yourself.
Some handy web resources:
http://www.pcmech.com/byopc/step-1-materials-required/ - Step by step on how to build http://www.tomshardware.com/ - Reviews and benchmarks on components http://www.buildyourown.org.uk/pc-building/ - Building how to with help forums http://www.youtube.com/watch?v=lVJ5ZEbf6F4 - Building a computer video http://www.tigerdirect.com/static/html/pcbuildingtips.html - Some tips and techniques
Friday, February 15, 2008
Protecting Your Computer Online and Off
Increasingly sophisticated software, faster networks and online communication have brought many technological advances and benefits. However, with it have come increased security risks including many previously unknown ones as the bad guys harness this very same technology to further their evil ends.
Some of the more common threats and ways of overcoming them are:
Viruses - These are malicious software codes that cause undesirable effects on your computer. A virus is designed to spread itself without the knowledge of the computer user. A computer may become infected through downloads from the internet using CD's or disks with infected programs or from other computers on the network. Another extremely common way viruses spread is through infected email attachments. Given the many modes of transmission viruses are clearly a threat online as well as offline. The old adage "Prevention is better than the cure" is particularly true in the case of computer viruses. You can save yourself a whole heap of trouble and countless hours of misery by avoiding infection in the first place rather than trying to repair the effects of viral infection.
Some simple rules can help you achieve this:
1. Install a reliable and reputable anti virus software and run regular scans. Preferably have the scan run on boot up.
2. New computer viruses are created everyday. Ensure that your anti-virus software is kept up to date with the latest virus definitions.
3. Do not download software from questionable or unknown sources. Always scan software using your anti-virus software before executing or installing on your computer.
4. Do not open email attachments from unknown senders. It is best to use an anti-virus software that automatically scans your email and can warn you if any threats are detected.
Worms - These are a type of virus which replicates itself and takes control of computer resources. The main distinction between a worm and other viruses is that a worm does not necessarily have to live within a host program and can run itself.
Trojans - these are malicious programs that masquerade as something useful thereby enticing the computer user to execute them and unleash their nasty payload.
Spyware - these are programs usually installed secretly along with other software whose purpose is to capture information about the computer user, the computer installation and other sensitive information about computer usage. This information may then be transmitted to a third party either by email or through the software "calling home" to transmit information to a remote website. Depending on the nature of information collected and transmitted this could pose a serious security risk.
Adware - propagated in a manner similar to spyware, these programs serve to pop up advertisements on the user's internet browser or desktop. These programs too may capture information about the user's browsing or purchasing habits so that advertisements may be tailored to suit.
Keyloggers - These are programs that record keystrokes entered through the keyboard and then secretly transmit this information to a third party. Naturally this can expose passwords, credit card details and other important information.
Control of worms, trojans, keyloggers, spyware and adware is achieved using similar strategies to those adopted for viruses, namely using appropriate anti-virus software including spyware and adware scanners and avoiding executing programs obtained from unknown sources.
Hackers accessing and taking control of a computer is another serious risk especially today with the widespread use of "always on" broadband internet. Hackers may exploit vulnerabilities in legitimate software or use trojans or viruses they have implanted to gain control of a computer which they can then use for sending unsolicited commercial emails (spam) or for other illegal activities. The idea here is to shield the perpetrator from detection as the illegal activity appears to originate from the computer they have taken control of.
In order to minimize risk of hacking attacks it is important to ensure that software used including the operating system is kept up to date by installing all vendor supplied updates and upgrades especially critical and security related updates. An effective firewall is another vital defence against unauthorized access by third parties. A firewall could be installed on the modem used to connect to the internet or as a software program that runs on the computer. The firewall serves to control who and what programs are allowed to accept or make connections with the internet. A firewall can also be useful in detecting and controlling programs like keyloggers which attempt to call home.
Phishing is another security phenomenon that has seen an alarming increase in recent years. Criminals are employing increasingly convincing and sophisticated means of sending emails which appear to originate from legitimate websites. However, links in these emails actually lead to websites controlled by them where they can capture valuable personal information such as logins and passwords. This is commonly used to cheat unsuspecting users by tricking them into revealing online bank login details etc. The golden rule in dealing with phishing attempts is to treat all emails which request personal information with at least skepticism if not suspicion. Never click a link in an email and enter login information or other personal information as the ultimate destination of that link may be cleverly concealed. When logging into online banking sites for instance always type the address in the browsers address bar. It is also important to pay attention to security features on webpages where sensitive information is input. A webpage address that starts with https: and shows a padlock symbol is secure. This means that any information transmitted from that website is encrypted and is therefore not at risk if intercepted.
There are offline risks to your computer as well. For instance it is important to select strong passwords which cannot easily be guessed. Ideally they should be at least 8 characters long and not consist of a regular word or name and comprise a combination of numeric and non-numeric characters. The strongest password would serve no purpose however, if a hacker is able to get you to disclose it to him. It is important to always be on the look out for social engineering attempts which aim to get you to unknowingly or knowingly reveal sensitive information such as passwords.
Needless to say physical security of your computer is also vital. The best antivirus software and firewall will not protect a laptop left in full view in an unlocked car! Maintenance and adequate care of hardware should not be neglected either. Regular backups stored in a location away from your principal computer and uninterruptable power supplies are good ideas to protect the integrity of your hardware and data stored thereon.
Perhaps the only way that comes close to completely eliminating every possible risk to your computer is to never turn it on and store it in a locked vault! However, even that may not work one hundred percent of the time. Nevertheless, it is possible to minimize your risk to an acceptable level by following common sense and adopting some of the simple rules discussed above.
Some of the more common threats and ways of overcoming them are:
Viruses - These are malicious software codes that cause undesirable effects on your computer. A virus is designed to spread itself without the knowledge of the computer user. A computer may become infected through downloads from the internet using CD's or disks with infected programs or from other computers on the network. Another extremely common way viruses spread is through infected email attachments. Given the many modes of transmission viruses are clearly a threat online as well as offline. The old adage "Prevention is better than the cure" is particularly true in the case of computer viruses. You can save yourself a whole heap of trouble and countless hours of misery by avoiding infection in the first place rather than trying to repair the effects of viral infection.
Some simple rules can help you achieve this:
1. Install a reliable and reputable anti virus software and run regular scans. Preferably have the scan run on boot up.
2. New computer viruses are created everyday. Ensure that your anti-virus software is kept up to date with the latest virus definitions.
3. Do not download software from questionable or unknown sources. Always scan software using your anti-virus software before executing or installing on your computer.
4. Do not open email attachments from unknown senders. It is best to use an anti-virus software that automatically scans your email and can warn you if any threats are detected.
Worms - These are a type of virus which replicates itself and takes control of computer resources. The main distinction between a worm and other viruses is that a worm does not necessarily have to live within a host program and can run itself.
Trojans - these are malicious programs that masquerade as something useful thereby enticing the computer user to execute them and unleash their nasty payload.
Spyware - these are programs usually installed secretly along with other software whose purpose is to capture information about the computer user, the computer installation and other sensitive information about computer usage. This information may then be transmitted to a third party either by email or through the software "calling home" to transmit information to a remote website. Depending on the nature of information collected and transmitted this could pose a serious security risk.
Adware - propagated in a manner similar to spyware, these programs serve to pop up advertisements on the user's internet browser or desktop. These programs too may capture information about the user's browsing or purchasing habits so that advertisements may be tailored to suit.
Keyloggers - These are programs that record keystrokes entered through the keyboard and then secretly transmit this information to a third party. Naturally this can expose passwords, credit card details and other important information.
Control of worms, trojans, keyloggers, spyware and adware is achieved using similar strategies to those adopted for viruses, namely using appropriate anti-virus software including spyware and adware scanners and avoiding executing programs obtained from unknown sources.
Hackers accessing and taking control of a computer is another serious risk especially today with the widespread use of "always on" broadband internet. Hackers may exploit vulnerabilities in legitimate software or use trojans or viruses they have implanted to gain control of a computer which they can then use for sending unsolicited commercial emails (spam) or for other illegal activities. The idea here is to shield the perpetrator from detection as the illegal activity appears to originate from the computer they have taken control of.
In order to minimize risk of hacking attacks it is important to ensure that software used including the operating system is kept up to date by installing all vendor supplied updates and upgrades especially critical and security related updates. An effective firewall is another vital defence against unauthorized access by third parties. A firewall could be installed on the modem used to connect to the internet or as a software program that runs on the computer. The firewall serves to control who and what programs are allowed to accept or make connections with the internet. A firewall can also be useful in detecting and controlling programs like keyloggers which attempt to call home.
Phishing is another security phenomenon that has seen an alarming increase in recent years. Criminals are employing increasingly convincing and sophisticated means of sending emails which appear to originate from legitimate websites. However, links in these emails actually lead to websites controlled by them where they can capture valuable personal information such as logins and passwords. This is commonly used to cheat unsuspecting users by tricking them into revealing online bank login details etc. The golden rule in dealing with phishing attempts is to treat all emails which request personal information with at least skepticism if not suspicion. Never click a link in an email and enter login information or other personal information as the ultimate destination of that link may be cleverly concealed. When logging into online banking sites for instance always type the address in the browsers address bar. It is also important to pay attention to security features on webpages where sensitive information is input. A webpage address that starts with https: and shows a padlock symbol is secure. This means that any information transmitted from that website is encrypted and is therefore not at risk if intercepted.
There are offline risks to your computer as well. For instance it is important to select strong passwords which cannot easily be guessed. Ideally they should be at least 8 characters long and not consist of a regular word or name and comprise a combination of numeric and non-numeric characters. The strongest password would serve no purpose however, if a hacker is able to get you to disclose it to him. It is important to always be on the look out for social engineering attempts which aim to get you to unknowingly or knowingly reveal sensitive information such as passwords.
Needless to say physical security of your computer is also vital. The best antivirus software and firewall will not protect a laptop left in full view in an unlocked car! Maintenance and adequate care of hardware should not be neglected either. Regular backups stored in a location away from your principal computer and uninterruptable power supplies are good ideas to protect the integrity of your hardware and data stored thereon.
Perhaps the only way that comes close to completely eliminating every possible risk to your computer is to never turn it on and store it in a locked vault! However, even that may not work one hundred percent of the time. Nevertheless, it is possible to minimize your risk to an acceptable level by following common sense and adopting some of the simple rules discussed above.
Subscribe to:
Posts (Atom)