Computer See Apple iPad 2 MC979LL/A Tablet (16GB, Wifi, White) 2nd Generation Details
Product Description
Apple iPad X10LL/A Tablet (16GB, Wifi, White) NEWEST MODEL.Built-In Lithium-Polymer Providing up to 10 Hours per Charge (25Wh).Ports: 1x Docking, Audio: 1x 1/8 Inch (3.5 mm) Headphone, 1x Integrated Speaker, 1x Integrated Microphone.What's in the box: Apple 16GB iPad 2 with Wi-Fi (White), Dock Connector to USB Cable, 10W Power Adapter, Documentation and 1-Year Limited Warranty.
- Apple?s newest generation of iPads.
- 9.7-inch (diagonal) LED-backlit glossy widescreen Multi-Touch display with IPS technology.
- 1 GHz dual-core Apple A5 custom-designed processor.
- Forward facing and rear facing cameras.
- Apple?s iOS 4 and access to Apple?s app store.
- 1 GHz dual-core Apple A5 custom-designed processor
- 9.7-inch (diagonal) LED-backlit glossy widescreen Multi-Touch display with IPS technology
- Apple's iOS 4 and access to Apple's app store,Bluetooth 2.1 + EDR
- Designed for Apple's 2nd generation of iPads
- Forward facing and rear facing cameras
More About Apple iPad 2 MC979LL/A Tablet (16GB, Wifi, White) 2nd Generation
Computer viruses have bought misery to millions of computer users about the world. It is Among the negatives of these computer world we live in today. This article takes a look at ten of those worlds most famous Computer Viruses.Morris Worm
The Morris Worm will go back to 1988. Its creator claimed the method was invented to crawl the world wide web (at this stage in its extremely early days) to investigate its size. It did, however, cause major harm to computers. It was capable of infecting computers many times over, every time causing much more difficulties and potentially resulting in it Ultimately becoming unusable.
Michelangelo Virus
This was given its name because of it being programmed to attack on 6th March, the date of Michelangelos birthday. At one time installed on a computer it lay dormant, along with other all infected computers being attacked On the same date. The virus triggered big data loss.
Melissa Virus
This was named after a topless dancer in Florida. It was spread via emails And this contained a Microsoft Word document. Once the document was opened it infected the computer and sent the same email in to the initial fifty addresses at the receivers email address book. huge corporations and organisations were infected, which include some government networks.
I love You Virus
The I enjoy You virus appeared in emails titled I enjoy you with an attached text file, And this the email claimed was a enjoy letter. When this was opened it would attack the computer and send it to all or any email addresses at the recipients address book. This meant it quickly spread widely. Along along with other millions of other computers across the world, it infected the White House and Pentagon computers.
Conficker Virus
The Conficker virus infected millions of Windows users which include the British and French military computer networks. It linked infected computers and would be controlled by a central computer, run by its creators.
Bugbear
This virus copied itself to the hard drive of computers by means of Microsoft Outlook and Net Explorer but exploiting a security hole. At one time installed onto a computer it was also capable of infecting any computers it shared a network with. So, if it infected one computer within a enterprise network it could soon infect the whole network. The virus was also sent to others at the address book of those receiver. Bugbear copied any usernames, passwords and bank details the user typed into their computer and sent this Information via email.
Code Red Virus
This attacked a large number of websites and meant that Rather than viewing a website, visitors would see a message stating that the website had been hacked. Amongst the websites it infected were several US government sites.
Nimda Virus
This initial attacked exactly a week after 9/11 and was therefore thought to be connected, something that was later identified not to be the case. Unlike most computer viruses, it spread in multiple distinct ways, such as via email, across shared networks, and to those that had browsed infected websites. It targeted computers making use of Microsoft Windows.
Sasser Virus
This exploited holes in Microsoft Windows and triggered computers to shut down. Some big organisations and corporations were impacted, including the European Commission, British Airways and Goldman Sachs.
Blaster Virus
Blaster attacked computers employing the Microsoft Windows XP and 2000 operating systems. It triggered the overuse of memory and therefore Eventually resulted in computers crashing. The virus would start up once again each and every time the computer was restarted.
Andrew Marshall
No comments:
Post a Comment