Tuesday, 17 March 2015

Team Roles Test

I have conducted a Team Roles test to see where do I belong within a team with my own personality. There are 36 options that we need to choose based on our own personality.
The result of my test is as in picture below.

Result of Team Roles Test
The result that I got is that I am an Expert. The expert has the skills and expertise required for the specific task at hand. He or she has a strong focus on the task and may get defensive when others interfere with his or her work. The expert prefers to work alone and team members often have a great deal of trust and confidence in him or her.

Link to the Team Roles test - https://www.123test.com/team-roles-test/

What is the Trojan Horse virus?

We always hear about a virus call Trojan or Trojan Horse in our computer. Why is this virus been called Trojan or Trojan Horse, how it got in the computer and what it can do?

Why it's name is Trojan Horse?

The origin of Trojan Horse is from Greek tale which is the tale about the Trojan War. In Greek mythology, the Trojan War was waged against the city of Troy by the Achaean (Greeks) after Paris of Troy took Helen from her husband Menelaus, King of Sparta. The war between city of Troy and Achaean goes around 10 years.

On the tenth years, the Achaean create a strategy that will help them win the war. Their strategy is create a large wooden horse at the beach and hide one platoon of men in it and the rest of the men will sail away to a safe distant. This strategy is been done at night. When the people of Troy wake up in the morning, they saw a big wooden horse at the beach and there is no Achaean people there. People of Troy were happy that they thought they have won the war and they bring the wooden horse into their city as a trophy.

During the night after the people of Troy has asleep, the men that hide in the wooden horse came out and the rest of the men that sail away return with night as their cover. The men that was hide in the wooden horse open the gate to the city from the inside so that the rest of the forces can barge in and conquer the city. The people of Achaean have won the war by using this strategy and so the wooden horse been name Trojan Horse.

Pic 1: Trojan Horse from the tale of Trojan War


How it got in the computer?

The Trojan virus will looks like the things that we want it. For example, the file that we download from the Internet. The reason why we accept to download this file is because that it has the similar name of the things that we want to download. For example, we would like to download an applications such as calculator. Because of the same name, we will have no suspicion to the application and run it. Once we have run the application, then it will start its works.

What the virus can do?

Trojan virus will attack the computer will become the cause of loss of data, possible system harm and others. While the Trojan virus is doing its attack, the performance of the computer will be slow and easily to overheat. Once the virus has got to the system file, the computer will no longer be able to be use by us which is the user. It is because that the operating system software will lose the data that they need to run the Windows. When this has occur, the computer will be needed to be formatted and reinstall the operating system software such as Windows.

The symptoms of computers that has been infected with Trojan Horse virus:
  • Easily to crash, Blue Screen of Death (BSoD)
  • Data Corruption
What the hackers can do with the computers that infected with Trojan Horse virus:
  • Formatting disks
  • Electronic money theft
  • Infects entire Network and other connected devices
  • Data theft, including confidential files, sometimes for industrial espionage, and information with financial implications such as passwords and payment card information
  • Modification or deletion of files
  • Downloading or uploading of files for various purposes
  • Downloading and installing software, including third-party malware
  • Keystroke logging
  • Watching the user's screen
  • Viewing the user's webcam
  • Controlling the computer system remotely
  • Encrypting files; a ransom payment may be demanded for decryption, as with the CryptoLocker ransomware
  • System registry modification
  • Using computer resources for mining cryptocurrencies
  • Linking computer to botnet
  • Using the infected computer as proxy for illegal activities and/or attacks on other computers.
Pic 2: How the virus got in


This Trojan Horse virus can be detected with anti-virus that has been updated. If the anti-virus still at old version, the virus definition is still the old one and it will not found the Trojan Horse virus, so it is crucial to update the anti-virus regularly.

 

Sunday, 1 March 2015

Laptop's Problem - Overheat

Did your laptop recently got plenty of blue screen of death? slow performance? overheat?

That might be because of the internal part of your laptop is dirty and full of dust. The dust in the internal part of your laptop can cause the laptop to overheat and cause slow in performance and resulting to blue screen of death.

What is the blue screen of death? Here is an example of blue screen of death:-
Pic 1: Blue Screen Of Death

Since dust have the property of blocking air flow and causing an increase of the level of temperature, it can cause the laptop to go overheat. The dust usually will be collected in the fan since fan is used to push out the hot air inside the laptop. When the dust cover it, the air flow will be block.

How the dust can block the air flow from inside the laptop? The Pic 2 below will explain how the dust block the air flow.
Pic 2: Dust collected in fan
The solution to this problem is that have your laptop's internal part been clean. To get better performance, do clean your laptop's internal part for one time per year but it is recommended to clean it twice per year.

Didn't know how to clean it up? Just send it to people that know how provide service that clean the internal part of laptop.

Image Source - http://goo.gl/WyWZmC
                         http://goo.gl/7Cwcsi

Update (15 Mac 2015) - There is one more thing that I forgot to mention which is about replacing thermal paste. It is better to change the thermal paste once per year to ensure that laptop performance is in good shape. What is the Thermal Paste? Its a paste that been use to transfer heat from processor to heat pipe efficiently and make the processor much more cooler.

Pic 3 : Thermal Paste
 Pic 3 above is the Thermal Paste that I use on my own processor.

Image Source - My own belongings.