Computer programming is a phrase that is bandied about quite heavily, but only few people actually understand its implications. The process of computer programming itself is difficult to understand for people who are not in the computer science field. Computer programming makes use of a code or a language: this language can be placed into several lines of code that can be translated to mean different things once they are processed as a program. For instance, the software that you use to calculate your taxes, or the software that you employ to make your simple web page are all products of skilful computer programming. Behind these software programs are scripts and codes, and these scripts and codes can mean different things.

For many different programming languages, a function can be important and can therefore be a key concept to learn when someone is interested in software and computer programming. A function can also be termed as a subroutine, procedure, or sub-query. How is a function important? For instance, if a company or institution has a library of many different programs, these programs can therefore consist of millions upon millions of lines of a source code. In the interests of time and space, you would like to keep from duplicating a certain source code in many different places.

Why is duplication so undesirable? If a source code is duplicated in many different places, it is being needlessly copied, and it can spell Hell for the programmer and troubleshooter when things go wrong down the line. If the source code is actually erroneous, the programmer or troubleshooter will have to correct the code in all the different places that it appears. If the source code has to be updated or improved in order to make the program either run faster or perform more operations, then the source code has to be modified, improved, and updated in all the places that it appears. And if the source code has to be removed and replaced with a new source code, then it has to be erased and replaced with the new code in every single place that it appears.

This is indeed time-consuming, and it can lead to more errors because of all the human intervention that has to be done. On the other hand, if there are functions that are built to handle all the different programs, then only one or a few changes need to be made should there be errors, or should the source code have to be updated, modified, improved, or changed. You can think of the function as an umbrella: it covers all of many different programs beneath it, so that you do not have to cover each program individually.

Having a single source code serving as the function is also advantageous when you have to introduce a new program that still makes use of that same source code. Because the source code is already available as an overall function or sub-program, you do not need to add the source code to the new program. You only need to find a way for the new program to interact with the source code itself.

These are only a few facts that you need to know about functions in computer programming. For more information, read up on the latest computer programs, how different programs can interact with each other using some umbrella or overall scripts, and how different programs can be improved when using functions.

Here are the instruction on how to detect your hard disk :

1) go to Start button
2) right click on computer and click to "Manage"
3) Locate your disk management on your left panel
4) You will see your hard disk below
5) Now you can format it by clicking right click
6) Cheer =)

To convert youtube to Mp3 files

Download Here

If you encounter this problem on Steam.exe, here are the solutions:

1) go to your program file > steam

2) delete ClientRegistry.blob

3) open your Steam.exe

4) Wait until it updates

5) cheers=)

Name: Conficker.C

Technical name: W32/Conficker.C.worm

Threat level: High

Alias:WORM_DOWNAD.AD,W32.Downadup,Net-Worm.Win32.Kido.cn,

Type: Worm

Effects: It exploits the vulnerability MS08-067 in the Windows Server Service in order to spread itself. It also spreads through shared and removable drives. It reduces considerably the protection level of the computer, modifies the security policies of the user accounts and attempts to download another type of malware to the affected computer.

Affected platforms: Windows 2003/XP/2000/NT/ME/98/95

First detected on: Dec. 31, 2008

Detection updated on: March 18, 2009

Statistics: Yes

Proactive protection: Yes, using TruPrevent Technologies

Brief Description:

Conficker.C is a worm which exploits a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067.
If the system date is after January 1, 2009, it will try to connect to a certain website in order to download and run another type of malware in the affected computer.
On the one hand, it reduces considerably the protection level of the computer, as it prevents the user and the computer from connecting to many websites related to antivirus companies.
On the other, it uses weak passwords to access the user accounts in order to modify their security policies.
Conficker.C spreads by exploiting the vulnerability MS08-067. In order to do so, it sends malformed RPC requests to other computers in which it attempts to enter a copy of itself. Additionally, it spreads through shared and removable drives.

It is highly recommended to download and apply the security patch for the vulnerability MS08-067. Click here to access the web page for downloading the patch.


News from Tech.yahoo

In an event that hits the computer world only once every few years, security experts are racing against time to mitigate the impact of a bit of malware which is set to wreak havoc on a hard-coded date. As is often the case, that date is April 1.

Malware creators love to target April Fool's Day with their wares, and the latest worm, called Conficker C, could be one of the most damaging attacks we've seen in years.

Conficker first bubbled up in late 2008 and began making headlines in January as known infections topped 9 million computers. Now in its third variant, Conficker C, the worm has grown incredibly complicated, powerful, and virulent... though no one is quite sure exactly what it will do when D-Day arrives.

Thanks in part to a quarter-million-dollar bounty on the head of the writer of the worm, offered by Microsoft, security researchers are aggressively digging into the worm's code as they attempt to engineer a cure or find the writer before the deadline. What's known so far is that on April 1, all infected computers will come under the control of a master machine located somewhere across the web, at which point anything's possible. Will the zombie machines become denial of service attack pawns, steal personal information, wipe hard drives, or simply manifest more traditional malware pop-ups and extortion-like come-ons designed to sell you phony security software? No one knows.

Conficker is clever in the way it hides its tracks because it uses an enormous number of URLs to communicate with HQ. The first version of Conficker used just 250 addresses each day -- which security researchers and ICANN simply bought and/or disabled -- but Conficker C will up the ante to 50,000 addresses a day when it goes active, a number which simply can't be tracked and disabled by hand.

At this point, you should be extra vigilant about protecting your PC: Patch Windows completely through Windows Update and update your anti-malware software as well. Make sure your antivirus software is actually running too, as Conficker may have disabled it.

Microsoft also offers a free online safety scan here, which should be able to detect all Conficker versions.


Source:

1) http://www.pandasecurity.com/homeusers/security-info/about-malware/encyclopedia/overview.aspx?idvirus=204292
2) http://tech.yahoo.com/blogs/null/128643/beware-conficker-worm-come-april-1/