วันเสาร์ที่ 27 มีนาคม พ.ศ. 2553

System Board


System Board Removal

To remove the system board in the small form-factor chassis, perform the following steps:

  1. Disconnect all cables from their connectors at the back of the computer, observing all safety precautions in "Precautionary Measures."

  2. Remove the computer cover.

  3. Remove the drive shelf assembly.

  4. Remove the expansion-card cage.

  5. Remove the hard-disk drive/bracket assembly.

  6. Disconnect all cables from the system board.

  7. Remove the screw that secures the existing system board to the bottom of the chassis

    Before you remove the existing system board, visually compare the replacement system board to the existing system board to make sure that you have the correct part.

  8. Slide the system board toward the front of the chassis until it stops.

  9. Carefully lift the system board out of the chassis (lift evenly and do not twist the system board). Place the system board that you just removed next to the replacement system board.

System Board Components


The subsections that follow contain procedures for removing system board components, which are

System Board Components

1 Optional audio connectors
2 NIC connector
3 Standby power LED (AUX_PWR)
4 Video connector
5 CD-ROM drive audio cable connector (optional)
6 Fan power connector
7 Telephony connector (optional)
8 Serial port 2 connector
9 USB connectors (2)
10 Mouse (upper) and keyboard (lower) connectors
11 Parallel port (upper) and serial port 1 (lower) connectors
12 Riser board connector
13 System board jumpers
14 IDE1 connector
15 IDE2 connector
16 Diskette/tape-drive connector
17 PC speaker connector
18 Battery
19 DIMM sockets (2)
20 Microprocessor package
21 3.3-V power connector
22 Control panel connector
23 DC power connector

System Board Jumper

Figure 21 shows the location of the PSWD jumper on the system board.

Figure 21. System Board Jumper

Expansion-Card Cage


Expansion-Card Cage Removal

1 Securing lever
2 Expansion-card cage
3 Tabs (2)
4 Hooks (2)

System Power Supply

Power Supply Removal

1 Securing screw hole
2 AC power receptacle
3 Power supply
4 System board DC power connectors (2)
5 Drive DC power connectors (3)

To remove the system power supply in the small form-factor chassis, perform the following steps:

  1. Disconnect the AC power cable from the back of the power supply.

  2. Disconnect the DC power cables from the system board and the drives.

    Note the routing of the DC power cables underneath the tabs in the chassis as you remove them from the system board and drives. It is important to route these cables properly when you replace them to prevent them from being pinched or crimped.


  3. Remove the screw on the side of the chassis that secures the power supply.

  4. Remove the screw below the AC power receptacle at the back of the chassis.

  5. Slide the power supply toward the center of the computer approximately 1 inch.

  6. Lift the power supply up and out the computer chassis.

To replace a CD-ROM drive, perform the following steps:

To replace a CD-ROM drive, perform the following steps:

  1. Align the tabs on the bottom of the CD-ROM drive with the notches on the drive shelf, and slide the drive toward the back of the shelf until it snaps into place (see Figure 15).

CD-ROM Drive Replacement

1 Tabs (2)
2 Notches (2)
  1. Connect a power cable and an interface cable to the appropriate connectors on the back of the drive (see Figure 16).

CD-ROM Drive Cable Attachment

1 Interface cable
2 Power cable
3 Power input connector
4 Interface connector

Check all cable connections. Fold cables out of the way to provide airflow for the fan and cooling vents.

  1. Replace the computer cover; reconnect your computer and peripherals to their electrical outlets, and turn them on.

  2. Update your system configuration information.

Set the Drive 1 option under Drives: Primary to Auto. See the online System User's Guide for more information.

  1. Verify that your system works correctly by running the Dell Diagnostics (see the online System User's Guide for complete information).

CD-ROM Drive Removal


1 Drive release tab

Hard-Disk Drive Cable Attachment

Hard-Disk Drive Cable Attachment
1 IDE1 connector
2 EIDE cable
3 Power cable

Drive Bracket

Drive Bracket Removal
1 Drive
2 Drive bracket
3 Screws (4)

Hard-Disk Drive/Bracket Replacement

1 Tabs on bottom of the drive bracket
2 Hooks on chassis floor
3 Drive bracket
4 Release tabs (2)

Hard-Disk Drive/Bracket Removal

Hard-Disk Drive/Bracket Removal
1 Drive bracket
2 Release tabs (2)

Drive Shelf Removal

Drive Shelf Removal
1 Drive shelf
2 Release tabs (2)

To remove the drive shelf from the small form-factor chassis, perform the following steps:

  1. Disconnect the power and interface cables from the diskette drive and CD-ROM drive.

  2. Press inward on the two drive shelf release tabs, and pull the shelf forward and out of the chassis (

Drive Locations


1 Chassis intrusion switch
2 CD-ROM drive
3 3.5-inch diskette drive
4 Hard-disk drive

Chassis Intrusion Switch Removal


1 Control panel
2 Chassis intrusion switch

To remove the chassis intrusion switch in the small form-factor chassis, perform the following steps:

  1. Remove the drive shelf.

  2. Remove the power supply.

  3. Remove the control panel.

  4. Disconnect the chassis intrusion switch cable connector from the control panel on the front of the chassis.

    Note the routing of the chassis intrusion cable as you remove it from the chassis. Chassis hooks may hold the cable in place inside the chassis.


  5. Slide the chassis intrusion switch out of its slot and remove the switch and its attached cable from the chassis

  6. Install the replacement chassis intrusion switch and cable.

  7. To reset the chassis intrusion detector, enter System Setup during the system's POST. In the Chassis Intrusion option, press the left- or right-arrow key to select Reset, and then choose Enabled, Enabled-Silent, or Disabled.

Control Panel Removal

Control Panel Removal
1 Screw
2 Control panel

To remove the control panel in the small form-factor chassis, perform the following steps:

  1. Remove the drive shelf.

  2. Remove the power supply.

  3. Disconnect the control panel cable from the control panel connector on the system board (see "System Board Labels" for the location of the PANEL connector).

    Note the routing of the control panel cable as you remove it from the chassis.

  4. From inside the chassis, remove the mounting screw that secures the control panel to the chassis.

  5. Disconnect the chassis intrusion switch cable connector from the control panel.

  6. Remove the control panel from the chassis.

    Note the routing of the control panel cable as you remove it from the chassis.

When you install the replacement control panel, be sure to put the right side of the control panel behind the mounting tab.

Eject and Power Button Removal

Eject and Power Button Removal
1 Diskette eject button
2 Power button

To remove the eject and power buttons in the small form-factor chassis, perform the following steps:

  1. Lay the computer cover on a flat work surface, with the inside of the top cover facing up.

  2. To remove the 3.5-inch diskette-drive eject button, pull gently on the plastic part of the button until it comes free.

  3. To remove the power button, use a small screwdriver and push in the two plastic clips that hold the button to the bezel. When these clips are released, the button and the spring come free from the bezel.

Computer Cover Replacement

Computer Cover Replacement

To replace the small form-factor chassis computer cover, perform the following steps:

  1. Face the front of the computer and hold the cover at a slight angle

  2. Align the bottom of the cover with the bottom of the chassis and insert the hooks on the cover into the recessed slots on the computer chassis so that the tabs catch the hooks inside the slots.

  3. Pivot the cover down toward the back of the chassis and into position.

    Make sure that the securing buttons click into place.

  4. If you wish to install a padlock, slide the padlock ring out of the cover.

Computer Cover

Computer Cover Removal

lcc.gif 1 Padlock ring

2 Securing buttons (2)

To remove the computer cover in the small form-factor chassis, perform the following steps:

  1. Turn off your computer and peripherals, and observe the caution for your personal safety and protection of the equipment described in "Precautionary Measures."

  2. Press in to retract the padlock ring into the cover to open

  3. Press in on the two securing buttons until the cover is free to swing up

  4. Raise the back of the cover, and pivot it toward the front of the computer.

  5. Lift the cover off the hooks at the front of the chassis.

  6. Disengage the tabs that secure the cover to the top of the chassis, and lift the cover out of the way.

Orientation View

shows a top view of the small form-factor chassis to help orient you when you work inside the computer.


Orientation View

1 System board
2 Diskette drive
3 Hard-disk drive
4 CD-ROM drive
5 Power supply

Computer virus


A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

[edit] Vectors and hosts

Viruses have targeted various types of transmission media or hosts. This list is not exhaustive:

* Binary executable files (such as COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux)
* Volume Boot Records of floppy disks and hard disk partitions
* The master boot record (MBR) of a hard disk
* General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix-like platforms).
* Application-specific script files (such as Telix-scripts)
* System specific autorun script files (such as Autorun.inf file needed by Windows to automatically run software stored on USB Memory Storage Devices).
* Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)
* Cross-site scripting vulnerabilities in web applications (see XSS Worm)
* Arbitrary computer files. An exploitable buffer overflow, format string, race condition or other exploitable bug in a program which reads the file could be used to trigger the execution of code hidden within it. Most bugs of this type can be made more difficult to exploit in computer architectures with protection features such as an execute disable bit and/or address space layout randomization.

PDFs, like HTML, may link to malicious code.[citation needed]PDFs can also be infected with malicious code.

In operating systems that use file extensions to determine program associations (such as Microsoft Windows), the extensions may be hidden from the user by default. This makes it possible to create a file that is of a different type than it appears to the user. For example, an executable may be created named "picture.png.exe", in which the user sees only "picture.png" and therefore assumes that this file is an image and most likely is safe.

An additional method is to generate the virus code from parts of existing operating system files by using the CRC16/CRC32 data. The initial code can be quite small (tens of bytes) and unpack a fairly large virus. This is analogous to a biological "prion" in the way it works but is vulnerable to signature based detection. This attack has not yet been seen "in the wild".
[edit] Methods to avoid detection

In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however, especially those which maintain and date Cyclic redundancy checks on file changes.

Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.

Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.

As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.
Avoiding bait files and other undesirable hosts

A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of host that viruses sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:

* Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.
* Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.
* Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system.

Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of 'garbage instructions'.

A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.
Stealth

Some viruses try to trick antivirus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the antivirus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the antivirus software, so that it seems that the file is "clean". Modern antivirus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.
Self-modification

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.
Encryption with a variable key

A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible. Since these would be symmetric keys, stored on the infected host, it is in fact entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least flag the file as suspicious.

An old, but compact, encryption involves XORing each byte in a virus with a constant, so that the exclusive-or operation had only to be repeated for decryption. It is suspicious for a code to modify itself, so the code to do the encryption/decryption may be part of the signature in many virus definitions.
Polymorphic code

Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses, however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts which remain identical between infections, making it very difficult to detect directly using signatures. Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body. See Polymorphic code for technical detail on how such engines operate.

Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for antivirus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.
Metamorphic code

To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that utilize this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of which is part of the metamorphic engine.
Vulnerability and countermeasures
The vulnerability of operating systems to viruses

Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses.

This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. The users of Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) are especially vulnerable to the spread of viruses. Microsoft software is targeted by virus writers due to their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated and non-integrated Microsoft applications (such as Microsoft Office) and applications with scripting languages with access to the file system (for example Visual Basic Script (VBS), and applications with networking features) are also particularly vulnerable.

Although Windows is by far the most popular operating system for virus writers, some viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. Some operating systems are less secure than others. Unix-based OS's (and NTFS-aware applications on Windows NT based platforms) only allow their users to run executables within their own protected memory space.

An Internet based research revealed that there were cases when people willingly pressed a particular button to download a virus. Security analyst Didier Stevens ran a half year advertising campaign on Google AdWords which said "Is your PC virus-free? Get it infected here!". The result was 409 clicks.

As of 2006[update], there are relatively few security exploits targeting Mac OS X (with a Unix-based file system and kernel). The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. Virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising.[21] In January 2009, Symantec announced discovery of a trojan that targets Macs. This discovery did not gain much coverage until April 2009.

While Linux, and Unix in general, has always natively blocked normal users from having access to make changes to the operating system environment, Windows users are generally not. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, when a virus for Linux was released – known as "Bliss" – leading antivirus vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows.[23] The Bliss virus may be considered characteristic of viruses – as opposed to worms – on Unix systems. Bliss requires that the user run it explicitly (so it is a trojan), and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.
The role of software development

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits.
Anti-virus software and other preventive measures

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.

Some anti-virus programs are able to scan opened files in addition to sent and received e-mails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.

One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).

If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives.
Recovery methods

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.
Virus removal

One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files or also exists in previous restore points. Some viruses, however, disable System Restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor. However, many such viruses can be removed by rebooting the computer, entering Windows safe mode, and then using system tools.

Administrators have the option to disable such tools from limited users for various reasons (for example, to reduce potential damage from and the spread of viruses). A virus can modify the registry to do the same even if the Administrator is controlling the computer; it blocks all users including the administrator from accessing the tools. The message "Task Manager has been disabled by your administrator" may be displayed, even to the administrator.[citation needed]

Users running a Microsoft operating system can access Microsoft's website to run a free scan, provided they have their 20-digit registration number. Many websites run by anti-virus software companies provide free online virus scanning, with limited cleaning facilities (the purpose of the sites is to sell anti-virus products). Some websites allow a single suspicious file to be checked by many antivirus programs in one operation.
Operating system reinstallation

Reinstalling the operating system is another approach to virus removal. It involves either reformatting the computer's hard drive and installing the OS and all programs from original media, or restoring the entire partition with a clean backup image. User data can be restored by booting from a Live CD, or putting the hard drive into another computer and booting from its operating system with great care not to infect the second computer by executing any infected programs on the original drive; and once the system has been restored precautions must be taken to avoid reinfection from a restored executable file.

These methods are simple to do, may be faster than disinfecting a computer, and are guaranteed to remove any malware. If the operating system and programs must be reinstalled from scratch, the time and effort to reinstall, reconfigure, and restore user preferences must be taken into account. Restoring from an image is much faster, totally safe, and restores the exact configuration to the state it was in when the image was made, with no further trouble.
See also

* Adware
* Antivirus software
* Computer insecurity
* Computer worm
* Crimeware
* Cryptovirology
* Linux malware
* List of computer virus hoaxes



* List of computer viruses
* List of computer viruses (all)
* Malware
* Mobile viruses
* Multipartite virus
* Spam
* Spyware
* Trojan horse (computing)
* Virus hoax


References

1. ^ Dr. Solomon's Virus Encyclopedia, 1995, ISBN 1897661002, Abstract at http://vx.netlux.org/lib/aas10.html
2. ^ http://www.bartleby.com/61/97/C0539700.html
3. ^ http://www.actlab.utexas.edu/~aviva/compsec/virus/whatis.html
4. ^ "Virus list". http://www.viruslist.com/en/viruses/encyclopedia?chapter=153310937. Retrieved 2008-02-07.
5. ^ Thomas Chen, Jean-Marc Robert (2004). "The Evolution of Viruses and Worms". http://vx.netlux.org/lib/atc01.html. Retrieved 2009-02-16.
6. ^ See page 86 of Computer Security Basics by Deborah Russell and G. T. Gangemi. O'Reilly, 1991. ISBN 0937175714
7. ^ a b Anick Jesdanun (1 September 2007). "School prank starts 25 years of security woes". CNBC. http://www.cnbc.com/id/20534084/. Retrieved 2010-01-07.
8. ^ "The anniversary of a nuisance". http://www.cnn.com/2007/TECH/09/03/computer.virus.ap/.
9. ^ Boot sector virus repair
10. ^ http://www.youtube.com/watch?v=m58MqJdWgDc
11. ^ Dr. Solomon's Virus Encyclopedia, 1995, ISBN 1897661002, Abstract at http://vx.netlux.org/lib/aas10.html
12. ^ Vesselin Bontchev. "Macro Virus Identification Problems". FRISK Software International. http://www.people.frisk-software.com/~bontchev/papers/macidpro.html.
13. ^ Berend-Jan Wever. "XSS bug in hotmail login page". http://seclists.org/bugtraq/2002/Oct/119.
14. ^ Wade Alcorn. "The Cross-site Scripting Virus". http://www.bindshell.net/papers/xssv/.
15. ^ http://www.virusbtn.com/resources/glossary/polymorphic_virus.xml
16. ^ Perriot, Fredrick; Peter Ferrie and Peter Szor (May 2002). "Striking Similarities" (PDF). http://securityresponse.symantec.com/avcenter/reference/simile.pdf. Retrieved September 9, 2007.
17. ^ http://www.virusbtn.com/resources/glossary/metamorphic_virus.xml
18. ^ Need a computer virus?- download now
19. ^ http://blog.didierstevens.com/2007/05/07/is-your-pc-virus-free-get-it-infected-here/
20. ^ "Malware Evolution: Mac OS X Vulnerabilities 2005-2006". Kaspersky Lab. 2006-07-24. http://www.viruslist.com/en/analysis?pubid=191968025. Retrieved August 19, 2006.
21. ^ Apple - Get a Mac
22. ^ a b Sutter, John D. (22 April 2009). "Experts: Malicious program targets Macs". CNN.com. http://www.cnn.com/2009/TECH/04/22/first.mac.botnet/index.html. Retrieved 24 April 2009.
23. ^ McAfee. "McAfee discovers first Linux virus". news article. http://math-www.uni-paderborn.de/~axel/bliss/mcafee_press.html.
24. ^ Axel Boldt. "Bliss, a Linux "virus"". news article. http://math-www.uni-paderborn.de/~axel/bliss/.
25. ^ "Symantec Security Summary — W32.Gammima.AG." http://www.symantec.com/security_response/writeup.jsp?docid=2007-082706-1742-99
26. ^ "Yahoo Tech: Viruses! In! Space!" http://tech.yahoo.com/blogs/null/103826
27. ^ "Symantec Security Summary — W32.Gammima.AG and removal details." http://www.symantec.com/security_response/writeup.jsp?docid=2007-082706-1742-99&tabid=3

[edit] Further reading

* Mark Russinovich, Advanced Malware Cleaning video, Microsoft TechEd: IT Forum, November 2006
* Szor, Peter (2005). The Art of Computer Virus Research and Defense. Boston: Addison-Wesley. ISBN 0321304543.
* Jussi Parikka (2007) Digital Contagions. A Media Archaeology of Computer Viruses, Peter Lang: New York. Digital Formations-series
* Burger, Ralf, 1991 Computer Viruses and Data Protection
* Ludwig, Mark, 1996 The Little Black Book of Computer Viruses
* Ludwig, Mark, 1995 The Giant Black Book of Computer Viruses
* Ludwig, Mark, 1993 Computer Viruses, Artificial Life and Evolution

[edit] External links

* Viruses at the Open Directory Project
* US Govt CERT (Computer Emergency Readiness Team) site
* 'Computer Viruses - Theory and Experiments' - The original paper published on the topic
* How Computer Viruses Work
* A Brief History of PC Viruses" (early) by Dr. Alan Solomon
* Are 'Good' Computer Viruses Still a Bad Idea?
* Protecting your Email from Viruses and Other MalWare
* Hacking Away at the Counterculture by Andrew Ross
* A Virus in Info-Space by Tony Sampson
* Dr Aycock's Bad Idea by Tony Sampson
* Digital Monsters, Binary Aliens by Jussi Parikka
* The Universal Viral Machine" by Jussi Parikka
* Hypervirus: A Clinical Report" by Thierry Bardini
* The Cross-site Scripting Virus
* The Virus Underground
* Microsoft conferences about IT Security - videos on demand (Video)

Retrieved from "http://en.wikipedia.org/wiki/Computer_virus"
Categories: Computer viruses | Computer security exploits
Hidden categories: Pages containing cite templates with deprecated parameters | Wikipedia indefinitely move-protected pages | Articles lacking reliable references from March 2009 | Articles that may contain original research from March 2009 | All articles that may contain original research | Articles that may contain original research from January 2008 | All articles with unsourced statements | Articles with unsourced statements from January 2008 | Articles containing potentially dated statements from 2006 | All articles containing potentially dated statements | Articles with unsourced statements from February 2009
Views

* Article
* Discussion
* Edit this page
* History

Personal tools

* Try Beta
* Log in / create account

Navigation

* Main page
* Contents
* Featured content
* Current events
* Random article

Search

Interaction

* About Wikipedia
* Community portal
* Recent changes
* Contact Wikipedia
* Donate to Wikipedia
* Help

Toolbox

* What links here
* Related changes
* Upload file
* Special pages
* Printable version
* Permanent link
* Cite this page

Languages

* Afrikaans
* Alemannisch
* العربية
* Azərbaycan
* বাংলা
* Bosanski
* Български
* Català
* Česky
* Dansk
* Deutsch
* Eesti
* Ελληνικά
* Español
* Esperanto

Speaker


Speaker may refer to:

* Speaker (politics), the presiding officer in a legislative assembly
* HMS Speaker (D90), a WWII Royal Navy aircraft carrier
* Orator, or public speaker, one who gives a speech or lecture
* Loudspeaker, an electromechanical device which produces sound
* In linguistics, the first person as opposed to the addressee and bystanders
* Computer speaker
* The Speaker, a BBC television series

Computer monitor


Comparison
[edit] CRT

Pros:

* High dynamic range (up to around 15,000:1 ,) excellent color, wide gamut and low black level.
* Can display natively in almost any resolution and refresh rate
* No input lag
* Sub-millisecond response times
* Near zero color, saturation, contrast or brightness distortion. Excellent viewing angle.

Cons:

* Large size and weight, especially for bigger screens (a 20" unit weighs about 50lbs or 22kg)
* High power consumption
* Geometric distortion caused by variable beam travel distances
* Older CRTs are prone to screen burn-in
* Produces noticeable flicker at low refresh rates

[edit] LCD

Pros:

* Very compact and light
* Low power consumption
* No geometric distortion
* Rugged
* Little or no flicker depending on backlight technology

Cons:

* Limited viewing angle, causing color, saturation, contrast and brightness to vary, even within the intended viewing angle, by variations in posture.
* Bleeding and uneven backlighting in some monitors, causing brightness distortion, especially toward the edges.
* Slow response times, which cause smearing and ghosting artifacts. Modern LCDs have response times of 8ms or less.
* Only one native resolution. Displaying other resolutions requires a video scaler, which degrades image quality at lower resolutions.
* Fixed bit depth, many cheaper LCDs are incapable of truecolor.
* Input lag
* Dead pixels are possible during manufacturing

[edit] Plasma
Main article: Plasma display

Pros:

* Compact and light.
* High contrast ratios (10,000:1 or greater,) excellent color, wide gamut and low black level.
* High speed response.
* Near zero color, saturation, contrast or brightness distortion. Excellent viewing angle.
* No geometric distortion.
* Highly scalable, with less weight gain per increase in size (from less than 30 inches wide to the world's largest at 150 inches).

Cons:

* Large pixel pitch, meaning either low resolution or a large screen.
* Noticeable flicker when viewed at close range
* High operating temperature and power consumption
* Only has one native resolution. Displaying other resolutions requires a video scaler, which degrades image quality at lower resolutions.
* Fixed bit depth
* Input lag
* Older PDPs are prone to burn-in
* Dead pixels are possible during manufacturing

CD-ROM


1 CD-ROM drive interface cable
2 Externally accessible upper drive bay
3 Hard-disk drive
4 Diskette-drive interface cable
5 Hard-disk drive interface cable
6 Expansion-card cage
7 System board
8 Expansion-card connectors
9 I/O ports and connectors
10 AC power receptacle
11 Security cable connector
12 Power supply
13 Chassis intrusion switch

CD-ROM (pronounced /ˌsiːˌdiːˈrɒm/, an acronym of "compact disc read-only memory") is a pre-pressed compact disc that contains data accessible to, but not writable by, a computer for data storage and music playback, the 1985 “Yellow Book” standard developed by Sony and Philips adapted the format to hold any form of binary data.

CD-ROMs are popularly used to distribute computer software, including games and multimedia applications, though any data can be stored (up to the capacity limit of a disc). Some CDs hold both computer data and audio with the latter capable of being played on a CD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called enhanced CDs.

Although many people use lowercase letters in this acronym, proper presentation is in all capital letters with a hyphen between CD and ROM. It was also suggested by some,[who?] especially soon after the technology was first released, that CD-ROM was an acronym for "Compact Disc read-only-media", or that it was a more "correct" definition. This was not the intention of the original team who developed the CD-ROM, and common acceptance of the "memory" definition is now almost universal. This is probably in no small part due to the widespread use of other "ROM" acronyms such as Flash-ROMs and EEPROMs where "memory" is usually the correct term.[citation needed]

At the time of the technology's introduction it had far more capacity than computer hard drives common at the time, although the reverse is now true though some experimental descendants of it such as Holographic versatile disc may not have more space than today's biggest hard drive.

Computer software

Computer software, or just software is a general term primarily used for digitally stored data such as computer programs and other kinds of information read and written by computers. Today, this includes data that has not traditionally been associated with computers, such as film, tapes and records. The term was coined in order to contrast to the old term hardware (meaning physical devices); in contrast to hardware, software is intangible, meaning it "cannot be touched". Software is also sometimes used in a more narrow sense, meaning application software only.

Examples:

* Application software, such as word processors which perform productive tasks for users.
* Firmware, which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.
* Middleware, which controls and co-ordinates distributed systems.
* System software such as operating systems, which govern computing resources and provide convenience for users.
* Software testing is a domain independent of development and programming. Software testing consists of various methods to test and declare a software product fit before it can be launched for use by either an individual or a group.
* Testware, which is an umbrella term or container term for all utilities and application software that serve in combination for testing a software package but not necessarily may optionally contribute to operational purposes. As such, testware is not a standing configuration but merely a working environment for application software or subsets thereof.
* Video games (except the hardware part)
* Websites


Overview
A layer structure showing where operating system is located on generally used software systems on desktops

Software includes all the various forms and roles that digitally stored data may have and play in a computer (or similar system), regardless of whether the data is used as code for a CPU, or other interpreter, or whether it represents other kinds of information. Software thus encompasses a wide array of products that may be developed using different techniques such as ordinary programming languages, scripting languages, microcode, or an FPGA configuration.

The types of software include web pages developed in languages and frameworks like HTML, PHP, Perl, JSP, ASP.NET, XML, and desktop applications like OpenOffice, Microsoft Word developed in languages like C, C++, Java, C#, or Smalltalk. Application software usually runs on an underlying software operating systems such as Linux or Microsoft Windows. Software (or firmware) is also used in video games and for the configurable parts of the logic systems of automobiles, televisions, and other consumer electronics.

Computer software is so called to distinguish it from computer hardware, which encompasses the physical interconnections and devices required to store and execute (or run) the software. At the lowest level, executable code consists of machine language instructions specific to an individual processor. A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. Programs are an ordered sequence of instructions for changing the state of the computer in a particular sequence. It is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are compiled or interpreted into machine language object code. Software may also be written in an assembly language, essentially, a mnemonic representation of a machine language using a natural language alphabet. Assembly language must be assembled into object code via an assembler.

The term "software" was first used in this sense by John W. Tukey in 1958. In computer science and software engineering, computer software is all computer programs. The theory that is the basis for most modern software was first proposed by Alan Turing in his 1935 essay Computable numbers with an application to the Entscheidungsproblem (Decision problem).

CPU (Central processing unit)



Computers such as the ENIAC had to be physically rewired in order to perform different tasks, these machines are "fixed-program computers." Since the term "CPU" is generally defined as a software (computer program) execution device, the earliest devices that could rightly be called CPUs came with the advent of the stored-program computer.

The idea of program computer was already present in the design of J. Presper Eckert and John William Mauchly's ENIAC, but was initially omitted so the machine could be finished sooner. On June 30, 1945, before ENIAC was even completed, mathematician John von Neumann distributed the paper entitled "First Draft of a Report on the EDVAC." It outlined the design of a stored-program computer that would eventually be completed in August 1949 [2]. EDVAC was designed to perform a certain number of instructions (or operations) of various types. These instructions could be combined to create useful programs for the EDVAC to run. Significantly, the programs written for EDVAC were stored in high-speed computer memory rather than specified by the physical wiring of the computer. This overcame a severe limitation of ENIAC, which was the considerable time and effort required to reconfigure the computer to perform a new task. With von Neumann's design, the program, or software, that EDVAC ran could be changed simply by changing the contents of the computer's memory.[3]

While von Neumann is most often credited with the design of the stored-program computer because of his design of EDVAC, others before him, such as Konrad Zuse, had suggested and implemented similar ideas. The so-called Harvard architecture of the Harvard Mark I, which was completed before EDVAC, also utilized a stored-program design using punched paper tape rather than electronic memory. The key difference between the von Neumann and Harvard architectures is that the latter separates the storage and treatment of CPU instructions and data, while the former uses the same memory space for both. Most modern CPUs are primarily von Neumann in design, but elements of the Harvard architecture are commonly seen as well.

As a digital device, a CPU is limited to a set of discrete states, and requires some kind of switching elements to differentiate between and change states. Prior to commercial development of the transistor, electrical relays and vacuum tubes (thermionic valves) were commonly used as switching elements. Although these had distinct speed advantages over earlier, purely mechanical designs, they were unreliable for various reasons. For example, building direct current sequential logic circuits out of relays requires additional hardware to cope with the problem of contact bounce. While vacuum tubes do not suffer from contact bounce, they must heat up before becoming fully operational, and they eventually cease to function due to slow contamination of their cathodes that occurs in the course of normal operation. If a tube's vacuum seal leaks, as sometimes happens, cathode contamination is accelerated. Usually, when a tube failed, the CPU would have to be diagnosed to locate the failed component so it could be replaced. Therefore, early electronic (vacuum tube based) computers were generally faster but less reliable than electromechanical (relay based) computers.

Tube computers like EDVAC tended to average eight hours between failures, whereas relay computers like the (slower, but earlier) Harvard Mark I failed very rarely [1]. In the end, tube based CPUs became dominant because the significant speed advantages afforded generally outweighed the reliability problems. Most of these early synchronous CPUs ran at low clock rates compared to modern microelectronic designs (see below for a discussion of clock rate). Clock signal frequencies ranging from 100 kHz to 4 MHz were very common at this time, limited largely by the speed of the switching devices they were built with.
[edit] Discrete transistor and Integrated Circuit CPUs
CPU, core memory, and external bus interface of a DEC PDP-8/I. made of medium-scale integrated circuits

The design complexity of CPUs increased as various technologies facilitated building smaller and more reliable electronic devices. The first such improvement came with the advent of the transistor. Transistorized CPUs during the 1950s and 1960s no longer had to be built out of bulky, unreliable, and fragile switching elements like vacuum tubes and electrical relays. With this improvement more complex and reliable CPUs were built onto one or several printed circuit boards containing discrete (individual) components.


During this period, a method of manufacturing many transistors in a compact space gained popularity. The integrated circuit (IC) allowed a large number of transistors to be manufactured on a single semiconductor-based die, or "chip." At first only very basic non-specialized digital circuits such as NOR gates were miniaturized into ICs. CPUs based upon these "building block" ICs are generally referred to as "small-scale integration" (SSI) devices. SSI ICs, such as the ones used in the Apollo guidance computer, usually contained transistor counts numbering in multiples of ten. To build an entire CPU out of SSI ICs required thousands of individual chips, but still consumed much less space and power than earlier discrete transistor designs. As microelectronic technology advanced, an increasing number of transistors were placed on ICs, thus decreasing the quantity of individual ICs needed for a complete CPU. MSI and LSI (medium- and large-scale integration) ICs increased transistor counts to hundreds, and then thousands.

In 1964 IBM introduced its System/360 computer architecture which was used in a series of computers that could run the same programs with different speed and performance. This was significant at a time when most electronic computers were incompatible with one another, even those made by the same manufacturer. To facilitate this improvement, IBM utilized the concept of a microprogram (often called "microcode"), which still sees widespread usage in modern CPUs . The System/360 architecture was so popular that it dominated the mainframe computer market for decades and left a legacy that is still continued by similar modern computers like the IBM zSeries. In the same year (1964), Digital Equipment Corporation (DEC) introduced another influential computer aimed at the scientific and research markets, the PDP-8. DEC would later introduce the extremely popular PDP-11 line that originally was built with SSI ICs but was eventually implemented with LSI components once these became practical. In stark contrast with its SSI and MSI predecessors, the first LSI implementation of the PDP-11 contained a CPU composed of only four LSI integrated circuits .

Transistor-based computers had several distinct advantages over their predecessors. Aside from facilitating increased reliability and lower power consumption, transistors also allowed CPUs to operate at much higher speeds because of the short switching time of a transistor in comparison to a tube or relay. Thanks to both the increased reliability as well as the dramatically increased speed of the switching elements (which were almost exclusively transistors by this time), CPU clock rates in the tens of megahertz were obtained during this period. Additionally while discrete transistor and IC CPUs were in heavy usage, new high-performance designs like SIMD (Single Instruction Multiple Data) vector processors began to appear. These early experimental designs later gave rise to the era of specialized supercomputers like those made by Cray Inc.

Mouse (computer)


In computing, a mouse (plural mice, mouses, or mouse devices.) is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons. It sometimes features other elements, such as "wheels", which allow the user to perform various system-dependent operations, or extra buttons or features can add more control or dimensional input. The mouse's motion typically translates into the motion of a cursor on a display, which allows for fine control of a Graphical User Interface.

The name mouse, originated at the Stanford Research Institute, derives from the resemblance of early models (which had a cord attached to the rear part of the device, suggesting the idea of a tail) to the common mouse.

The first marketed integrated mouse – shipped as a part of a computer and intended for personal computer navigation – came with the Xerox 8010 Star Information System in 1981. However, the mouse remained relatively obscure until the appearance of the Apple Macintosh; in 1984 PC columnist John C. Dvorak ironically commented on the release of this new computer with a mouse: “There is no evidence that people want to use these things.”

A mouse now comes with most computers and many other varieties can be bought separately.
Mechanical mouse devices
Mechanical mouse, shown with the top cover removed
Operating an opto-mechanical mouse.
1: moving the mouse turns the ball.
2: X and Y rollers grip the ball and transfer movement.
3: Optical encoding disks include light holes.
4: Infrared LEDs shine through the disks.
5: Sensors gather light pulses to convert to X and Y vectors.

Bill English, builder of Engelbart's original mouse, invented the ball mouse in 1972 while working for Xerox PARC. The ball-mouse replaced the external wheels with a single ball that could rotate in any direction. It came as part of the hardware package of the Xerox Alto computer. Perpendicular chopper wheels housed inside the mouse's body chopped beams of light on the way to light sensors, thus detecting in their turn the motion of the ball. This variant of the mouse resembled an inverted trackball and became the predominant form used with personal computers throughout the 1980s and 1990s. The Xerox PARC group also settled on the modern technique of using both hands to type on a full-size keyboard and grabbing the mouse when required.

The ball mouse utilizes two rollers rolling against two sides of the ball. One roller detects the forward–backward motion of the mouse and other the left–right motion. The motion of these two rollers causes two disc-like encoder wheels to rotate, interrupting optical beams to generate electrical signals. The mouse sends these signals to the computer system by means of connecting wires. The driver software in the system converts the signals into motion of the mouse cursor along X and Y axes on the screen.

Ball mice and wheel mice were manufactured for Xerox by Jack Hawley, doing business as The Mouse House in Berkeley, California, starting in 1975.

Based on another invention by Jack Hawley, proprietor of the Mouse House, Honeywell produced another type of mechanical mouse. Instead of a ball, it had two wheels rotating at off axes. Keytronic later produced a similar product.

Modern computer mice took form at the École polytechnique fédérale de Lausanne (EPFL) under the inspiration of Professor Jean-Daniel Nicoud and at the hands of engineer and watchmaker André Guignard. This new design incorporated a single hard rubber mouseball and three buttons, and remained a common design until the mainstream adoption of the scroll-wheel mouse during the 1990s. In 1985, René Sommer added a microprocessor to Nicoud's and Guignard's design. Through this innovation, Sommer is credited with inventing a significant component of the mouse, which made it more "intelligent;" though optical mice from Mouse Systems had incorporated microprocessors by 1984.

Another type of mechanical mouse, the "analog mouse" (now generally regarded as obsolete), uses potentiometers rather than encoder wheels, and is typically designed to be plug-compatible with an analog joystick. The "Color Mouse," originally marketed by Radio Shack for their Color Computer (but also usable on MS-DOS machines equipped with analog joystick ports, provided the software accepted joystick input) was the best-known example.

Keyboard (computing)



In computing, a keyboard is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or computer commands.

In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. In a modern computer, the interpretation of keypresses is generally left to the software. A computer keyboard distinguishes each physical key from every other and reports all keypresses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine.



Types
Standard

Standard keyboards for desktop computers, such as the 101-key US traditional keyboards or the 104-key Windows keyboards, Include alphabetic characters, punctuation symbols, numbers and a variety of function keys. The internationally-common 102/105 key keyboards have a smaller 'left shift' key and an additional key with some more symbols between that and the letter to its right (usually Z or Y).[1] Computer keyboards are similar to electric-typewriter keyboards but contain additional keys.
Laptop-size

Keyboards on laptops and notebook computers usually have a shorter travel distance for the keystroke and a reduced set of keys. They may not have a numerical keypad, and the function keys may be placed in locations that differ from their placement on a standard, full-sized keyboard.
The keyboards on laptops have a shorter travel distance and (usually) a reduced set of keys.
Multimedia

Keyboards with extra keys, such as multimedia keyboards, have special keys for accessing music, web and other frequently used programs. For example, 'ctrl+marked on color-coded keys are used for some software applications and for specialized uses such as video editing.
Thumb-sized

Smaller keyboards have been introduced for laptops, PDAs, cellphones or users who have a limited workspace. The size of a standard keyboard is dictated by the practical consideration that the keys must be large enough to be easily pressed by fingers. To reduce the size of the keyboard, the numeric keyboard to the right of the alphabetic keyboard can be removed, or the size of the keys can be reduced, which makes it harder to enter text.

Another way to reduce the size of the keyboard is to reduce the number of keys and use chording keyer, i.e. pressing several keys simultaneously. For example, the GKOS keyboard has been designed for small wireless devices. Other two-handed alternatives more akin to a game controller, such as the AlphaGrip, are also used as a way to input data and text. Another way to reduce the size of a keyboard is to use smaller buttons and pack them closer together. Such keyboards, often called a "thumbboard" (thumbing) are used in some personal digital assistants such as the Palm Treo and BlackBerry and some Ultra-Mobile PCs such as the OQO.
Numeric

Numeric keyboards contain only numbers, mathematical symbols for addition, subtraction, multiplication, and division, a decimal point, and several function keys (e.g. End, Delete, etc.). They are often used to facilitate data entry with smaller keyboard-equipped laptops or with smaller keyboards that do not have a numeric keypad. A laptop does sometimes have a numeric pad, but not all the time. These keys are also known as, collectively, a numeric pad, numeric keys, or a numeric keypad, and it can consist of the following types of keys:

* arithmetic operators such as +, -, *, /
* numeric digits 0-9
* cursor arrow keys
* navigation keys such as Home, End, PgUp, PgDown, etc.
* Num Lock button, used to enable or disable the numeric pad
* enter key

Non-standard or special-use types
Chorded

A keyset or Virtual keyboards, such as the I-Tech Virtual Laser Keyboard, project an image of a full-size keyboard onto a surface. Sensors in the projection unit identify which key is being "pressed" and relay the signals to a computer or personal digital assistant. There is also a virtual keyboard, the On-Screen Keyboard, for use on Windows. The On-Screen Keyboard is an image of a standard keyboard which the user controls by using a mouse to hover over the desired letter or symbol, and then clicks to enter the letter. The On-Screen Keyboard is provided with Windows as an accessibility aid, to assist users who may have difficulties using a regular keyboard. The iPhone uses a multi-touch screen to display a virtual keyboard.
Touchscreens

Touchscreens, such as with the iPhone and the OLPC laptop, can be used as a keyboard. (The OLPC initiative's second computer will be effectively two tablet touchscreens hinged together like a book. It can be used as a convertible Tablet PC where the keyboard is one half-screen (one side of the book) which turns into a touchscreen virtual keyboard.)