Now you can create your own text to speech converter software to make your computer speak whatever you type. I found this script on some Vietnamese site. It's pretty cool. Just run this script and make it read any funny sentence.Copy the code given below in notepad and save it as anyname.vbs. Make sure that you save it as .vbs file.
Dim message, sapi message=InputBox(“What do you want me to say?”,”Speak to Me”) Set sapi=CreateObject(“sapi.spvoice”) sapi.Speak message
After making a vbs file just double click on that file and type anything you want in the textbox.
FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard.
Traditionally, when communications speeds were low (ranging from the then-standard 9.8 kbps to the "fast" 16.8 Kbps unlike today's broadband 1 Mbps standard) FTP was the method of choice for downloading large files from various websites. Although the FTP programs have been improved and updated over time, the basic concepts and definitions remain the same and are still in use today.
FTP Concepts and Definitions
The key definition to remember is the term "protocol," which means a set of rules or standards that govern the interactions between computers. It is a key component in many terms that are now taken for granted: Transmission Control Protocol / Internet Protocol or TCP/IP, the governing standards for Internet communications; Hyper Text Transfer Protocol or HTTP, which established the benchmarks for Internet addresses and communications between two computers in the internet; and File Transfer Protocol (FTP) which, as has been said, sets the rules for transferring files between computers.
The primary objective in the formulation of File Transfer Protocols was to make file transfers uncomplicated and to relieve the user of the burden of learning the details on how the transfer is actually accomplished. The result of all these standards and rules can be seen in today's web interactions, where pointing-and-clicking (with a mouse) initiates a series of actions that the typical Internet user does not see or even remotely understand.
Differences between FTP and HTTP
The major difference between FTP and HTTP is that FTP is a two-way system – it can be used to copy or move files from a server to a client computer as well as upload or transfer files from a client to a server. HTTP, on the other hand, is strictly one-way: "transferring" text, pictures and other data (formulated into a web page) from the "server" to a client computer which uses a web browser to view the data.
Another point to bear in mind is that File Transfer in FTP means exactly that: files are automatically copied or moved from a file server to a client computer's hard drive, and vice versa. On the other hand, files in an HTTP transfer are viewed and can 'disappear' when the browser is turned off unless the user executes commands to move the data to the computer's memory.
Another major difference between the two systems lies in the manner in which the data is encoded and transmitted. FTP systems generally encode and transmit their data in binary sets which allow for faster data transfer; HTTP systems encode their data in MIME format which is larger and more complex. Note that when attaching files to emails, the size of the file is usually larger than the original because of the additional encoding involved.
Types of Trojan Horse Viruses Trojan Horses have developed to a remarkable level of cleverness, which makes each one radically different from each other. For an inclusive understanding, we have classified them into the following:
Remote Access Trojans are the most frequently available trojans. These give an attacker absolute control over the victim's computers. The attacker can go through the files and access any personal information about the user that may be stored in the files, such as credit card numbers, passwords, and vital financial documents.
Password Sending Trojans
The intention of a Password Sending Trojan is to copy all the cached passwords and look for other passwords as you key them into your computer, and send them to particular email addresses. These actions are performed without the awareness of the users. Passwords for restricted websites, messaging services, FTP services and email services come under direct threat with this kind of trojan.
Key Loggers type of Trojans logs victims' keystrokes and then send the log files to the attacker. It then searches for passwords or other sensitive data in the log files. Most of the Key Loggers come with two functions, such as online and offline recording. Of course, they can be configured to send the log file to a specific email address on a daily basis.
The only purpose of Destructive Trojans is to destroy and delete files from the victims' computers. They can automatically delete all the core system files of the computer. The destructive trojan could be controlled by the attacker or could be programmed to strike like a logic bomb, starting on a particular day or at specific time.
Denial of Service (DoS) Attack Trojans
The core design intention behind Denial of Service (DoS) Attack Trojan is to produce a lot of Internet traffic on the victim's computer or server, to the point that the Internet connection becomes too congested to let anyone visit a website or download something. An additional variation of DoS Trojan is the Mail-Bomb Trojan, whose key plan is to infect as many computers as possible, concurrently attacking numerous email addresses with haphazard subjects and contents that cannot be filtered.
Proxy/Wingate Trojans convert the victim's computer into a Proxy/Wingate server. That way, the infected computer is accessible to the entire globe to be used for anonymous access to a variety of unsafe Internet services. The attacker can register domains or access pornographic websites with stolen credit cards or do related illegal activities without being traced.
FTP Trojans are possibly the most simple, and are outdated. The only action they perform is, open a port numbered 21 – the port for FTP transfers – and let anyone connect to your computer via FTP protocol. Advance versions are password-protected, so only the attacker can connect to your computer.
Software Detection Killers
Software Detection Killers kill popular antivirus/firewall programs that guard your computer to give the attacker access to the victim's machine.
Note: A Trojan could have any one or a combination of the above mentioned functionalities. Some might also come on USB drives, usually as “Autorun.inf” viruses.
The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.
Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer. This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Keyand name it as StorageDevicePolicies.
4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it asWriteProtect.
5. Double-click on WriteProtect and set the Value data to 1. Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect(Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link: [c=rgb(204,0,0)]USBWriteProtect