The Effects Of Technology To Mental Health


Technology has indeed ruled over the world. It did so many wonders in terms of work efficiency, speed, accuracy, communication and have provided so many types of convenience to mankind. With this, it is not a wonder if everyone would like to experience it for themselves. Technology also became people’s lifestyle that they cannot accomplish anything without it. But despite all the benefits technology is capable of giving. Still, there are flaws attached to it. And one thing that was uncovered is that it harms people’s mental health.

“There is also little doubt that all of the new technologies, led by the Internet, are shaping the way we think in ways obvious and subtle, deliberate and unintentional, and advantageous and detrimental.” –Jim Taylor Ph.D.

Continue reading “The Effects Of Technology To Mental Health”

Computer Health: Looking Back To When Rootkit Attacked Linux Servers And Tips On Removing The Virus


Researchers reported an unusual discovery about the health of Linux servers several years ago. They found out that a new malware was specially designed for the operating system that would inject every single web page with malicious code. The revealed worm managed to hide from the server administrator, considering rootkits are supposed to remain invisible to the naked eyes even now.

The Bad News

A guest initially published the rootkit in the Full Disclosure mailing list. The individual talked about some customers who were complaining that they were being redirected to mischievous sites. After having some of their time dedicated to looking for any malware on their computer, they learned that two hidden processes were running: Debian Squeeze 1.2.3 and Apache web server.

A security firm named CrowdStrike examined the malware and stated that this virus was a new invention and not something that was cut out from an existing rootkit. As what the company said, the developer who was in charge of the malware had minimal experience in the field of study. The firm further disclosed that the quality of the code was not top-of-the-line. Hence, its ability to conceal the list of processes was quite average compared to the others.


The Virus

The malware that got introduced in the Full Disclosure list was generally a compilation of modules for the Linux kernel 2.6.32-5, also known as the latest version of Debian Squeeze. An expert at Kaspersky said that this bug could replace the function responsible for building TCP packets, the tcp_sendmsg. Through the use of an altered function, the outgoing traffic from the server could easily have malicious codes written directly.

The Good News

Whether you have access to Linux or any other operating system out there, the truth is that viruses will try to infect your computer. Worse, if it’s a rootkit, you won’t even know about its existence until the system starts acting up.

Win32.Stuxnet.b is one of the most stubborn computer threats ever created. Probably because of its nature too, there may have been moments when you have tried to get rid of it but to no avail. Nevertheless, that may be because you have not learned about the proper techniques to remove it yet.

The Methods

There are two methods on how to erase Win32.Stuxnet.b. One of them is the manual removal method, which can be utilized by people with more advanced IT skills. The other is the automatic removal method, which is practically for the general public.

Manual Method

The first thing that you have to do is use Task Manager to eradicate all malicious processes in the background. After that, you should locate the file(s) connected to Win32.Stuxnet.b and erase all of them as well before cleaning up the Windows registry.

Please do take note of the fact that this threat can and will recreate itself after starting up the PC. Hence, make sure to delete everything entirely before shutting down your computer.


Advanced Method (Recommended)

If you are one of those folks who does not have an expertise in technology, you can get a specialized virus removal program to help you flush Win32.Stuxnet.b out of the system.

Considering you already have an antivirus, you may go into Safe Mode with Networking, and then perform a scan. Some tests have shown that many virus removal programs out there can remove Win32.Stuxnet.b in Safe Mode, but not in normal mode, so you can also give it a try.

As added information, you must download a virus removal tool that is of high quality to avoid malware deletion problems in the future. Among the different software to choose from, Avast is the top recommendation that we can give to you. It is a comprehensive Win32.Stuxnet.b removal tool that you can find in the market. You merely have to follow several steps to make it work:

  1. Run the Avast application.
  2. Hit the Scan button.
  3. Use either an online scan or local scan if you have or do not have internet access, respectively.
  4. Once Rootkit.Win32.Stuxnet.b is detected, hit the Remove button.

Final Thoughts

Looking after the health of your computer is essential to prevent malware from destroying or snooping around your precious files. Try to be more aware of everything that goes on in the system; run scans regularly as well. This way, you will be able to remove rootkits before they can damage your virtual stuff.

Good luck!