Home | Services | Clients | Resources | F.A.Q. | Links | Email | Call 626-247-4376

Computer Hero F.A.Q.

Welcome to the Frequently Asked Questions.
If there are questions you would like to have answered, please email us.

What is Spam?
What is Spyware?
What is a Virus?
What is Biometric Technology?
What is Phishing and Pharming?
What is an OS?
PC Vs. Mac
What is a Hacker?
What is E-Mail?
What is the Internet (WWW)?
What is a Web Browser?
What is MySpace?
What is a Blog?
What is an ISP?

What is a Firewall?
DSL Vs. Cable Broadband?
What are Cookies?
What is Wi-Fi?
What is a Trojan Horse?
Do Macs get Viruses?
What is Linux?
CD ROM, CDRW and CD-R?
DVD ROM, DVDRW and DVD-R?
What is a PDA?
What is VoIP?
What is Podcasting?
What is an RSS Feed?
What is WEP?

What is Spam?
Spam is unsolicited e-mail on the internet. Usually considered bulk mail or junk mail often sent to a list of people obtained by companies that create distribution lists.
Spam is the equivalent to unsolicited telemarketing calls.
The term Spam is said to derive from a Monty Python sketch.
Back To Top

What is Spyware?
Spyware is any technology that aids in gathering information about a person without their knowledge. Spyware is programming that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Other forms of Spyware that can be considered virus-like are Adware and Malware.
Back To Top

What is a Virus?
A Virus is a program or code that replicates by being copied or initiating its copying to another program or document. Viruses can be transmitted as attachments in an e-mail or in a downloaded file, or from a diskette or CD.
Some Viruses wreak havoc immediately, some sit dormant until circumstances cause their code to be executed on the computer. Some viruses are benign or playful and can display a non threatening message. Others can be quite harmful, erasing data or causing your hard disk to require reformatting. A Virus that replicates itself or resends itself in an e-mail or on a network is known as a worm.
Files that can be infected that might come through e-mail usually end with .com or .exe Other files may end in .prg, .mnu, .sys, .ovl, .scr or .bat.

Anti-Virus software is a program that searches your hard drive, floppy or CD for any known or potential viruses. The market has expanded in this software but the leaders in research include Symantec Norton Anti-Virus, McAfee, AVG, Panda and Trend Micro.
Back To Top

What is Biometric Technology?
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes and security.
Biometric devices, such as fingerscanners, consist of: a reader or scanning device, software that converts the scanned information into digital form and compares match points and a database that stores the biometric data for comparison.
Back To Top

What is Phishing and Pharming?
If you've ever received an email from PayPal, eBay, MSN, Yahoo, AOL, BestBuy, Citibank or another financial institution in which the sender asks you to log onto a website to confirm your online user ID and password you've witnessed phishing. Phishing is email fraud where the perpetrator sends out legitimate looking emails that appear to come from a trusted site in an attempt to gather personal information (pin#, credit card or social security#) from you. Pharming is very similar to phishing except that the malicious code is installed on your computer via an infected email and modifies the local host file on a computer. The host files convert convert URLs into the number strings that the computer uses to access websites. A computer with a compromised host file will go to the fake website even if a user types in the correct internet address or clicks on an affected bookmark entry.
Back To Top

What is an OS?
An OS (operating system) is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or apps. The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command language or a graphical user interface (GUI) (windows).
Common operating systems are Microsoft Windows DOS, 95, 98, ME, NT, 2000, XP, Vista, CE, Mac OS9, OSX, Unix, Linux Red Hat, Mandrake, Suse and Palm OS.
Back To Top

PC Vs. Mac
An age old question, which is better? It has been said that the Mac was very user friendly for schools and home users. It has also been said that the Mac was best for graphics and processing power. These statements were true until the PC market caught up and surpassed the Mac. The software availability for the PC largely out numbers the Mac 10 to 1. The processing power for both have improved greatly and run neck and neck on performance. For stability, well, that is a question of use. I have seen both good and bad on both platforms depending on their use and abuse. Technical support seems to be more readily available for the PC with more certified and trained technicians at hand than for the Mac. As for the price, the Mac is a bit high but still appeals to the true enthusiasts.
Back To Top

What is a Hacker?
Hacker is a term used by some to mean "a clever programmer" and by others, especially journalists or their editors, to mean "someone who tries to break into computer systems.
For someone who attempts to crack someone else's system or otherwise uses programming or expert knowledge to act maliciously the term "cracker" is used for this meaning.
Back To Top

What is E-Mail?
E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail was one of the first uses of the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can be distributed to lists of people as well as to individuals. Some Internet Service Providers offer email utilities in their web browsers such as AOL or Earthlink. Otherwise you can use 3rd party programs which are better at managing emails and include other functions such as calendar, contacts, to-do lists etc. These applications include Microsoft Outlook, Lotus Notes, Mozilla Thunderbird.
Back To Top

What is the Internet (WWW)?
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANET. The original aim was to create a network that would allow users of a research computer at one university to be able to "talk to" research computers at other universities. A side benefit of ARPA Net's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.
The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called "the Web").
Back To Top

What is a Web Browser?
A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. Web Browsers that allow you surf the internet include: Microsoft Internet Explorer, Netscape Navigator and Mozilla Firefox.
Back To Top

What is MySpace?
MySpace is a website for Social Networking founded in 2003 by Chris DeWolfe and Tom Anderson along the lines of the Friendster site. MySpace has 54 million user profiles as of February 2006 and the majority of users are 16 to 25 year olds. 25% of the users are registered as minors 14 to 17 but you need to be at least 14 to register. However, kids that are clearly about 12 are lying about their age because MySpace is the place to be. The reason for that is because it is free and you can post almost anything on the site except for extreme nudity and hate messages. Advertisers love MySpace because of the age demographic with one company making 30 to 40 million in ad revenue in 2005. MySpace took off as music portal for indie bands to communicate and share their music and soon turned into a social networking phenomenon. It takes about 2 minutes to sign up, then you find friends profiles and invite them into your network and it keeps building from there. Recently MySpace has been in the news because of an association with non-violent sexual assaults on minors and at least one murder. Parents beware! MySpace can be fun and a great place to keep in touch with friends but make sure you know who your kids are friends with.
Back To Top

What is a Blog? A blog is short for weblog which in most terms means a personal internet journal or diary. Many non-commercial or personal websites have a daily journal that is updated by the site owner or by users that contribute their thoughts and information to the site. Many blogs are devoted to one or several subject or themes, usually of topical interest. An author of a blog is often referred to as a blogger. Some of the more popular blog sites are blogger.com and blogspot.com.
Back To Top

What is an ISP?
An ISP (Internet service provider) is a company that provides individuals and other company’s access to the Internet and other related services such as Web site building and web hosting. An ISP has the equipment and the telecommunication line access required to have a point of presence on the Internet for the geographic area served. The larger ISP's have their own high-speed leased lines so that they are less dependent on the telecommunication providers and can provide better service to their customers. Some well known ISP's are AOL, CompuServe, Earthlink, SBC Yahoo.
Back To Top

What is a Firewall?
A firewall is a set of related programs that protects the resources of a private network from users from other networks. Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination.
Back To Top

DSL Vs. Cable Broadband?
Both DSL and cable high-speed Internet services are available to millions of residential and business consumers worldwide. In some areas, only one or the other service is available. Some of the differences between DSL and cable modem originate with the service provider. All other things being equal, factors like cost, reliability and quality of customer support can vary significantly depending on the provider. In a recent survey cable won for availability and price. DSL won for installation. And it was a tie for security and performance.
Back To Top

What are Cookies?
A cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the cookie (text file) will be sent back to the web server whenever the browser reconnects to the web site.
Cookies are commonly used to store user preference information, such as web site options. Cookies are also used to store shopping cart contents. The most security-relevant use of cookies is when they are used to store authentication data, such as user names and passwords.
Back To Top

What is Wi-Fi?
Wi-Fi is short for Wireless Fidelity. It is a term used for certain types of wireless local area networks that use a certain type of specifications known as 802.11x. Wi-Fi has gained acceptance in many businesses, agencies, schools and homes as an alternative to a wired LAN (local area network). Many hotels, airports and fast food places offer public access to Wi-Fi networks as Hot Spots. To access a hot spot you may be charged a daily or hourly rate for access, however, some are free.
Unless adequately protected, a Wi-Fi network can be susceptible to access by unauthorized users who the connection for free internet or possible malicious activity.
Back To Top

What is a Trojan Horse?
A Trojan Horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage such as ruining your hard disk.
Back To Top

Do Macs get Viruses?
In short the answer is yes. However the likely hood of an Apple Macintosh user getting a virus when compared to Microsoft is very little. Some of the reasons they are less likely to get a virus are the newer Mac OSX is built on a Unix kernel, which is one of the oldest and most secure operating systems available. Microsoft Windows is used by more users which makes them a better target than Apple users. Most of the tools and scripts used to help create viruses or other malware are designed for Microsoft Windows.
Back To Top

What is Linux?
Linux is a Unix-like operating system publicly open and extendible by contributors. It is suggested that it is an alternative to Microsoft Windows but is more popular in the business enterprise. Linux comes in different flavors or versions depending on need and usability. Some of those flavors include Red Hat, Mandrake and Suse.
Back To Top

What is the difference between CD ROM, CD-R and CDRW?
CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. The original data format standard was defined by Philips and Sony in the 1983 Yellow Book. Other standards are used in conjunction with it to define directory and file structures, including ISO 9660, HFS (Hierarchal File System, for Macintosh computers), and Hybrid HFS-ISO. Format of the CD-ROM is the same as for audio CDs: a standard CD is 120 mm (4.75 inches) in diameter and 1.2 mm (0.05 inches) thick and is composed of a poly carbonate plastic substrate (under layer - this is the main body of the disc), one or more thin reflective metal (usually aluminum) layers, and a lacquer coating.

CD-R - These are inexpensive disks that are used generally to back up data. These disks usually hold between 650MB and 700MB of information. The advantage of these disks are the low cost and reliability of the backup. CDs can become scratched and data can be corrupted, but odds are if a CD is kept in a case away from dust or other contaminants, a CD-R of reasonable quality should last approximately 50 years. These disks utilize a technology that allows the burner to sear the data into a reflective surface in the form of many zeros and ones. You can normally play CD-R disks in any CD-ROM drive.

CD-RW - disks on the other hand are more flexible than CD-R because you can write and rewrite data to the disk. The quality of these disks vary, but generally the disks are rewritable up to approximately 40 times. If you wish to have a disk for once a week backups, CD-RW's should serve you for about a year. Generally, the newer CD-ROM drives can read CD-RW disks, but you should be careful because not all CD drives can read these. If you need to trade information, you are better of creating a CD-R and closing the disk. If you want to continue writing to the disk as backup for your own computer, you can do this on a CD-RW up to the available space. As you read under "What is a Burned CD?" the difference between CDs and other rewritable media such as zip disks is that when you Finalize a session, you have completed writing to that disk. If you are writing to a CD-RW, however, you can still erase the disk. To write more information, you need to add the new files after the data. You cannot change files when writing to a CD, you only can write new versions of the file up to the space on the disk.
Back To Top

What is the difference between DVD-ROM, DVD+R RW DVD-R RW RAM?
DVD-ROM was the first DVD standard to hit the market and is a read-only format. The video or game content is burned onto the DVD once and the DVD will run on any DVD-ROM-equipped device.

DVD+R and DVD+RW formats are supported by Philips, Sony, Hewlett-Packard, Dell, Ricoh, Yamaha and others. DVD+R is a recordable DVD format similar to CD-R. A DVD+R can record data only once and then the data becomes permanent on the disc. The disc can not be recorded onto a second time. DVD+RW is a re-recordable format similar to CD-RW. The data on a DVD+RW disc can be erased and recorded over numerous times without damaging the medium.

DVD-R, DVD-RW and DVD-RAM are supported by Panasonic, Toshiba, Apple Computer, Hitachi, NEC, Pioneer, Samsung and Sharp. These formats are also supported by the DVD Forum. DVD-R is a recordable DVD format similar to CD-R and DVD+R. A DVD-R can record data only once and then the data becomes permanent on the disc. The disc cannot be recorded onto a second time. There also are two additional standards for DVD-R disks: DVD-RG for general use, and DVD-RA for authoring, which is used for mastering DVD video or data and is not typically available to the general public. DVD-RW is a re-recordable format similar to CD-RW or DVD+RW. The data on a DVD-RW disc can be erased and recorded over numerous times without damaging the medium. DVD's created by a -R/-RW device can be read by most commercial DVD-ROM players. DVD-RAM discs can be recorded and erased repeatedly but are compatible only with devices manufactured by the companies that support the DVD-RAM format. DVD-RAM discs are typically housed in cartridges.
Back To Top

What is a PDA?
PDA (personal digital assistant) is a term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedule calendars and address book information handy. The term handheld is a synonym. Many people use the name of one of the popular PDA products as a generic term. These include Hewlett-Packard's Palmtop and 3Com's Palm Pilot.
Back To Top

What is VoIP?
Voice over Internet Protocol uses your existing high speed broadband connection to convert standard telephone audio into a digital format that can be transmitted over the internet, and by converting incoming digital phone signals from the internet to standard telephone audio. A computer is not required. Companies such as Vonage, Earthlink and SBC are offering this service to home users to reduce their phone bills to one flat rate. Although there are some great features there are some concerns about this technology. Dialing 911 calls is different in that you have to setup an enhanced feature so the emergency operator can locate your address by phone number, this enhanced feature may be an extra charge. Also if you have additional phone throughout the house you might be required to purchase special VoIP phones. Otherwise you can only use one located near the VoIP modem that they provide. Also if the internet is down for any reasons (maintenance, power outage, etc.) you will not be able to make calls unless you pay for basic local service from your telephone provider.
Back To Top

What is Podcasting?
Podcasting is a compound word coined in 2004 that combined two words: iPod and Broadcasting. Podcasting is the method of distributing multimedia files, such as audio programs or music videos over the internet for playback on mobile devices and personal computers. The distribution method of a podcast uses either the RSS or Atom Syndication formats. The term podcast like radio can mean both the content and the delivery method. The host or author of a podcast is often referred to as a podcaster.
Podcasts can be downloaded or streamed and what distinguishes a podcasts is its ability to be downloaded automatically using software capable of reading RSS or Atom feeds. One of the sites I list on my resources page called This Week in Tech has daily podcasts.
Back To Top

What is an RSS Feed?
News agencies and other dynamic sites now offer a service called RSS Feeds or RSS. With RSS Feeds the website can feed or download information such as top headlines, current travel discounts, sports scores, and other timely content throughout the day to subscribers. Internet Explorer 7 now has this feature that lights up when you visit a site that offers the feeds. Simply subscribe to the feed and have it automatically sent to your computer so you no longer have to go looking for updates on your favorite things.
Back To Top

What is WEP?
Wired Equivalent Privacy (WEP) is a security protocol that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparible to a wired LAN. In short, it is data encryption that protects your wireless signal from being accessed from unauthorized users.
Back To Top