Much refers to computer viruses, damage caused by who designed them, or which are the real causes of their creations, seek its origins in simple idle in computer terrorists or even some minds more divagadoras associated them with aliens and other things still more absurd. The truth is that in this article we are not going to refer to the origin of the computer Virus, nor to the specific damage that they may cause, but rather to understand that it is a virus, how it works, that is an antivirus which is a VIRUS a computer virus is a program or software that does not have any interaction with the userin other words, does not create any means of they communicated with the user, therefore we don’t mind that a PC is infected, by which to review the installed programs, these viruses are not identifiable, but have the ability to auto run and spreads by inserting copies of itself into another program or document. A computer virus is attached to a program or file so it can spread, infecting computers. to measure it travels from one PC to another, some viruses only cause slightly annoying effects while others can damage your hardware, software or files. Almost all viruses bind to an executable file, which means that the virus can be in your PC but can not infect it unless you launch or open the infected program. It is important to note that a virus cannot continue its spread without human action (for example by running an infected program). People contributes to the spread of the virus, often without knowing it, by sharing infected files or to send e-mails with viruses as an attachment in the email. The inclusion of the virus in a program called infection, and code infected file (or executable is not part of a file) is called host (Host), viruses are one of the several types of Malware or malicious software.
What is NTP? Network Time Protocol is a protocol-based software on the Internet that uses an algorithm to check a computer system clocks and set them adrift with reference to a single source of time. NTP is not the only available time synchronization protocol, but is without a doubt the most popular, since has been constantly updated since its development at the end of the 80s. What is UTC? Coordinated Universal time is the world global calendar, based at Greenwich Meantime (though fits the natural slowdown of the Earth by the increase of leap seconds). UTC is governed by a constellation of watches atomicos from around the world and is used by computer networks, air traffic controls and the commercial world. What is network time synchronization? Network time synchronization is when all the computers in a network are running at the same time. Timing is essential for modern computer networks as a lack of synchronization can lead to the loss of data, system errors, failure of sensitive transactions at the time and you can even leave a network vulnerable to security threats.
Where can I receive UTC? The most common place to receive a source of UTC time is, of course, through the Internet, although users should be warned that they do not offer any guarantee of accuracy, reliability and may leave a system vulnerable to security threats since the UTC source is beyond the firewall. A safer and much more accurate method of receiving the UTC is to use either the network of GPS (Global Positioning System) or radio transmissions specialists from national broadcast provided by several laboratories of physics. What is the difference between a network time server and a NTP server? Nothing, they are really interchangeable names, most network time servers use NTP and, therefore, are NTP servers. Other names for these devices are often cited as they are: time server, Atomic, server clock time or server schedule.
Hewlett – Packard, not focusing only on the production of computers and printers, but it broadens their market to digital cameras, scanners, servers, televisions, calculators, etc. Getting to the customer in a different way; with more products on the market to choose. Information technology information technology is defined by Bakopoulos, in the following manner: the set of material resources which are used for the storage, processing and communication of information, and the way in which these resources are organized within a system, to efficiently develop the set of assigned tasks. (Bakopoulos, 17-24, 1985). In relation to the definition of Bakopoulos It can be said that information technology includes the physical components of the hardware and software, so software enables the proper functioning of hardware and therefore communication between both parties, helping to develop various assigned tasks with efficiency. Technology information as a source for competitive advantage. Referring to term competitive advantage, Porter defines it as: the capacity that companies have to produce or market their goods or services in best conditions of quality, opportunity or cost than its rivals.
(Porter, 1980, 46-64). According to a study by Porter, the most outstanding areas that use organizations to gain competitive advantages, are as follows: 1. relationships with providers. 2. Services to the client. 3. Services of product differentiation.
4. Planning of new products. 5 Costs. 6 Segmentation of markets. Value defines the information technology as an element of the competitive strategy: opportunities that technologies information provided to obtain competitive advantages through different competitive strategies – are innumerable. Any company can make use of them to drastically change the bases of jurisdiction in a given sector, to change the balance of power with suppliers or to create new products (value, et. (1993, p 187) an example of an organization that uses information technology to gain competitive advantage over its rivals is the Gillette Company; as mentioned in the work of Laudon and Laudon (1996), this company manufactures and distributes well-known machines razor Sensor, product which has been evolving in quality and gaining more market, thanks to the use of software and design computer-aided three-dimensional linked network, which Gillette designers use to develop new versions of the aforementioned machine razors.
Software and hardware providers must implement support for IPv6 in their products to ensure that they are available in standard production when necessary. Governments must give the example using the IPv6 for their own content and services and encouraging IPv6 deployment efforts in their countries. The requirements for IPv6 on public procurement policies are essential at this time. Civil society, in particular organizations and end users, should request that all the services they received from their ISPs and vendors be prepared for IPv6, in order to boost demand and ensure competitive availability of IPv6 services in the coming years. Campaign of ONR to promote the next generation of Internet Protocol continues to have a positive impact on the Internet community.
IPv6 allocations increased nearly 30% in 2009, to members of the community recognize the benefits that can be derived from their adoption. Many of those who make decisions do not realize the amount of devices that require an IP address mobile phones, computers, laptops, servers, routers, etc., said Raul Echeberria, Secretary of NRO. The number of available IPv4 addresses is shrinking rapidly, and if the global Internet community does not recognize this, face serious consequences in the very near future. As such, NRO is working to educate everyone from network operators to top executives and Government representatives, on the importance that has the adoption the IPv6, added Echeberria. IP addresses are assigned by Internet Assigned Numbers Authority (IANA), a contract operated by the Internet Corporation for Assigned Names and Numbers (ICANN). IANA distributes IP to the RIR address, which, in turn, assign them to users in their respective regions. This is the moment that serve Internet community, said Rod Beckstrom, President and CEO of ICANN. Do to global Internet grow and thrive in an unlimited, we have to encourage the rapid overall adoption of the IPv6 protocol?.