The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.
II. Viruses --> Wreak Havoc On Your Files. The term computer virus is often used interchangeably
with malware, though the two don’t actually have thesame meaning. In the strictest sense, a virus is a programthat copies itself and infects a PC, spreading from one fileto another, and then from one PC to another when the files are copied or shared.Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PCcompletely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff. You can protect yourself from viruses by making certain
your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you’re dealing with a virus.
III. Spyware --> Steals Your Information Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your expense, it doesn’t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you’ve got that many pieces of software spying on you, your PC is going to become slow. What many people don’t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.
IV. Trojan Horses --> Install a Backdoor Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don’t replicate themselves—they must be installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don’t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that’s one of malware authors’ favorite spots to hide a trojan.
V. Worms --> Infect Through the Network Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down.
1.) If we line up the entire blood vessel in human body, the length
will be approximately 62,000 miles! Which means it’s about 2.5 times
longer than circumference of planet earth.
2.) ‘The Great Barrier Reef’, world’s longest coral reef located in
Australia. Also owns the record of world’s largest organism structure
with the length of 2000 kilometer.
3.) Probability that earth will be attacked by meteors: 9300 times/year.
4.) One giant hurricane generates energy at the same level of 8000 1-megaton sized bombs.
5.) Approximately, 700 millions of world population is now having hookworm, kind of blood-eating creature, in their bodies.
6.) Fred Rompelberg owns the record of world’s fastest cycler with the speed of 166.94 miles/hour.
7.) 65% of autistics patient are lefty.
8.) The roots of Finnish pine tree can be so long up to 30 miles.
9.) The amount of salt in the ocean can cover ever area on earth with 500 feet thick.
10.) The gas among the stars in Sagittarius contains more than 10,000 millions liter of alcoholic substances.
11.) The speed of Polar bear is up to 25 miles/hour and they can jump up to 6 feet high.
12.) Because of the qualification of its hair, Polar bear is very difficult to detect with infrared camera.
13.) The roots of rye, types of rice used in drinking alcohol
production, can be spread under the ground for more than 400 miles.
14.) Temperature of Mercury is 430c during daytime and decrease down to -180c during night time.
15.) Approximately, people will unintentionally eat up to 4300 small type of bugs, such as gnat and tick, in a year.
The Cold Spot area resides in the constellation Eridanus in the
southern galactic hemisphere. The insets show the environment of this
anomalous patch of the sky as mapped by Szapudi's team using PS1 and
WISE data and as observed in the cosmic
In 2004, astronomers examining a map of the radiation leftover
from the Big Bang (the cosmic microwave background, or CMB) discovered
the Cold Spot, a larger-than-expected unusually cold area of the sky.
The physics surrounding the Big Bang theory predicts warmer and cooler
spots of various sizes in the infant universe, but a spot this large and
this cold was unexpected.
Now, a team of astronomers led by Dr. Istvan Szapudi of the
Institute for Astronomy at the University of Hawaii at Manoa may have
found an explanation for the existence of the Cold Spot, which Szapudi
says may be "the largest individual structure ever identified by
humanity."
If the Cold Spot originated from the Big Bang itself, it could be a
rare sign of exotic physics that the standard cosmology (basically, the
Big Bang theory and related physics) does not explain. If, however, it
is caused by a foreground structure between us and the CMB, it would be a
sign that there is an extremely rare large-scale structure in the mass
distribution of the universe.
Using data from Hawaii's Pan-STARRS1 (PS1) telescope located on
Haleakala, Maui, and NASA's Wide Field Survey Explorer (WISE) satellite,
Szapudi's team discovered a large supervoid, a vast region 1.8 billion
light-years across, in which the density of galaxies is much lower than
usual in the known universe. This void was found by combining
observations taken by PS1 at optical wavelengths with observations taken
by WISE at infrared wavelengths to estimate the distance to and
position of each galaxy in that part of the sky.
Earlier studies, also done in Hawaii, observed a much smaller area in
the direction of the Cold Spot, but they could establish only that no
very distant structure is in that part of the sky. Paradoxically,
identifying nearby large structures is harder than finding distant ones,
since we must map larger portions of the sky to see the closer
structures. The large three-dimensional sky maps created from PS1 and
WISE by Dr. Andrรกs Kovรกcs (Eรถtvรถs Lorรกnd University, Budapest, Hungary)
were thus essential for this study. The supervoid is only about 3
billion light-years away from us, a relatively short distance in the
cosmic scheme of things.
Imagine there is a huge void with very little matter between you (the
observer) and the CMB. Now think of the void as a hill. As the light
enters the void, it must climb this hill. If the universe were not
undergoing accelerating expansion, then the void would not evolve
significantly, and light would descend the hill and regain the energy it
lost as it exits the void. But with the accelerating expansion, the
hill is measurably stretched as the light is traveling over it. By the
time the light descends the hill, the hill has gotten flatter than when
the light entered, so the light cannot pick up all the energy it lost
upon entering the void. The light exits the void with less energy, and
therefore at a longer wavelength, which corresponds to a colder
temperature.
Getting through a supervoid can take millions of years, even at the speed of light,
so this measurable effect, known as the Integrated Sachs-Wolfe (ISW)
effect, might provide the first explanation one of the most significant
anomalies found to date in the CMB, first by a NASA satellite called the
Wilkinson Microwave Anisotropy Probe (WMAP), and more recently, by
Planck, a satellite launched by the European Space Agency.
While the existence of the supervoid and its expected effect on the
CMB do not fully explain the Cold Spot, it is very unlikely that the
supervoid and the Cold Spot at the same location are a coincidence. The
team will continue its work using improved data from PS1 and from the
Dark Energy Survey being conducted with a telescope in Chile to study
the Cold Spot and supervoid, as well as another large void located near
the constellation Draco.
The study is being published online on April 20 in Monthly Notices of the Royal Astronomical Society
by the Oxford University Press. In addition to Szapudi and Kovรกcs,
researchers who contributed to this study include UH Manoa alumnus
Benjamin Granett (now at the National Institute for Astrophysics,
Italy), Zsolt Frei (Eรถtvรถs Lorรกnd), and Joseph Silk (Johns Hopkins).
from :-
phys.org
Microscopic image of limped teeth. Via University of Portsmouth
We use nature as a guide for producing a lot of different technologies. We watch birds fly, and we dream of ways that we can soar across the skies with wing-like structures. We turn to the ocean, we see the way that fish glide through the waters, and then we use these principles to develop fins for our feet, allowing us to travel through the sea at increased speeds. Now, we may be turning to a new part of nature in order to develop ways to create stronger materials. Where will we be looking? Apparently, at the teeth of tiny snail-like creatures.
In a study that will be coming out this month from the Journal of the Royal Society Interface, British researchers announce that they have discovered the strongest natural material known to man. It was found in the teeth of shelled, aquatic creatures that are known as limpets. Ultimately, the teeth take the place of the previous strongest biological material on Earth—spider silk.
Lead authorAsa Barber said that this new find could help us adapt the material into technologies to build better planes, boats, dental fillings, and a host of other devices. Since this is the strongest known “natural” material, some may think that the material that makes up the teeth are only strong when compared to other natural materials. However, they also beat many of our more impressive man-made materials. For example, the teeth surpass Kevlar, which is a synthetic fiber that we use to make bulletproof vests and puncture-proof tires.
To give you a better understanding of just how strong this material is, it can be compared to a strand of spaghetti that is able to hold up more than 3,300 pounds (1,300 kg).
In order to test the strength of this material, Barber looked at the teeth fibers for tensile strength (tensile strength is the amount of force that a material can withstand without breaking). To do this, he attached each end of the fiber to a lever and pulled on the sample with an atomic force microscope. He found that the material had a strength of 5 gigapascals, which is a staggeringfive timesthe strength of most spider silks (which, as was mentioned, was the previous contender for the strongest known material).
The teeth are composed of very thin fibers that contain a hard mineral called “goethite.” Limpets use them to scrape food off of rocks, and the key to their strength is their size. They are so small they must be examined with a microscope. and are just 1/100th the diameter of a human hair. The ultra-thin filaments are so little that they are able to avoid the holes and defects that we commonly find in larger materials.
Although they are very small, they can be put together in order to make larger materials that are similarly flawless—they do no weaken like most materials when constructed in such a manner.
“Generally a big structure has lots of flaws and can break more easily than a smaller structure, which has fewer flaws and is stronger,” Barber said in a university press release. “The problem is that most structures have to be fairly big so they’re weaker than we would like. Limpet teeth break this rule as their strength is the same no matter what the size.”
Barber asserts that we should continue to look to nature, as we never know what new resources we may find there: “All the things we observe around us, such as trees, the shells of sea creatures and the limpet teeth studied in this work, have evolved to be effective at what they do. Nature is a wonderful source of inspiration for structures that have excellent mechanical properties.”