You are on page 1of 10

Motherboard

The motherboard is the main circuit board of your computer


and is also known as the mainboard or logic board. If you ever
open your computer, the biggest piece of silicon you see is the
motherboard. Attached to the motherboard, you'll find the CPU,
ROM, memory RAM expansion slots, PCI slots, and USB ports. It
also includes controllers for devices like the hard drive, DVD
drive, keyboard, and mouse. Basically, the motherboard is what
makes everything in your computer work together.

Roles of the Processor and Memory


Processor (CPU)
The electronic circuitry within a computer that carries out the
instructions of a computer program by performing the basic
arithmetic, logical, control and input/output (I/O) operations
specified by the instructions. The computer industry has used the
term "central processing unit" at least since the early 1960s
Traditionally, the term "CPU" refers to a processor, more
specifically to its processing unit and control unit (CU),
distinguishing these core elements of a computer from external
components such as main memory and I/O circuitry

The form, design and implementation of CPUs have changed


over the course of their history, but their fundamental operation
remains almost unchanged. Principal components of a CPU
include the arithmetic logic unit (ALU) that performs arithmetic
and logic operations, processor registers that supply operands to
the ALU and store the results of ALU operations, and a control unit
that orchestrates the fetching (from memory) and execution of
instructions by directing the coordinated operations of the ALU,
registers and other components.
Most modern CPUs are microprocessors, meaning they are
contained on a single integrated circuit (IC) chip. An IC that
contains a CPU may also contain memory, peripheral interfaces,
and other components of a computer; such integrated devices are
variously called microcontrollers or systems on a chip (SoC).
Some computers employ a multi-core processor, which is a single
chip containing two or more CPUs called "cores"; in that context,
one can speak of such single chips as "sockets".[3] Array processors
or vector processors have multiple processors that operate in
parallel, with no unit considered central. There also exists the
concept of virtual CPUs which are an abstraction of dynamical
aggregated computational resources.[4]

Memory
The basic function of computer memory is essentially to store data.
Depending on the type of data it stores and the role it plays in computer
operation, however, memory performs several different functions.
Although all of these functions involve data storage, RAM, ROM, flash
memory and hard drives each perform a different and necessary function
to keep a computer and its peripherals working.

RAM

Random access memory (RAM) provides temporary application


data storage. Instead of having to go back and find information on the
hard drive every time a computer needs a piece of data, the computer
temporarily stores frequently used files on RAM, making them easier to
find. When the computer shuts down, all the data in RAM is erased or
transferred to the hard drive, making room for new data when the
computer begins operating again.
Hard Drive

A hard drive is core of a computer's data storage. It provides


memory space for system and user files -- everything from your
operating system to documents and images. In mechanical terms, a hard
drive is a rotating disk treated with a magnetic coating, similar to the
magnetic ribbons that store data on cassettes. A moving arm reads and
copies data to and from the rotating disk, allowing you to open files
from the hard disk or save new data.

Flash Memory

Flash memory, the common term for electronically erasable


programmable read-only memory (EEPROM), is used in computer video
game cards and to store some vital system information. Unlike other
memory types that copy or erase data byte-by-byte, EEPROM can edit
data in groups of bytes, making it a popular choice for devices like
memory sticks and cameras where the data stored is constantly
changing. Unlike hard drives, EEPROM does not require a fragile
moving arm, prompting some computer manufacturers to move toward
replacing hard disks with flash architecture, although the technology
remains more expensive than hard disks.

ROM

Read-only memory (ROM) is used to store data that controls the


most basic computer functionality, such as starting up, detecting
peripherals and operating the computer fan. As the name suggests, the
data cannot be edited by the system or users and, unlike RAM, the data
stays recorded even when the computer is off. Like hard drives and flash
memory, ROM is an example of non-volatile memory -- meaning that it
remains in place when the power is off -- while RAM is considered
volatile memory.
Distinguish between push and pull Notifications
A push notification is a message that pops up on a mobile device.
App publishers can send them at any time; users don't have to be in the
app or using their devices to receive them.

A pull notifications are updates delivered to a computer or mobile


device in response to a user or software-initiated poll of a remote server.
In push communications, a server sends a message about updates to the
client, which has typically subscribed to updates in advance.

List steps to protect yourself from webcam spying

Webcam threats

The practice of hacking webcams known as camfecting has


been happening for years but as cameras have become integrated, always
on and higher resolution, the dangers posed by this practice are
becoming increasingly risky.

While the majority of attacks on webcams have been carried out by


hackers, in 2010 it was revealed that students from two high schools in
Pennsylvania were spied on by administrators using webcams in laptops
loaned to students to use at home with the school district admitting it had
taken 66,000 surreptitious images.

The fact that webcams could potentially be used to spy on the very
people using them is not new, but the reality of the threat may have first
come to many peoples attention in 2014 when a former Miss Teen USA,
Cassidy Wolf, had her webcam hacked by former classmate Jared James
Abrahams. For months Abrahams managed infiltrate Wolfs personal
computer located in her bedroom without her knowledge and captured
multiple images of her in compromising situations. He then tried to
blackmail Wolf via email and after handing himself into police,
Abrahams revealed he had carried out similar attacks against up to 150
other victims including one 14-year-old girl.

Webcam malware

There has been multiple examples of malware designed to


specifically target webcams to allow hackers secretly watch their
victims.

Among the best known of these pieces of malware was


Blackshades, a remote access trojan (RAT) which was distributed
simply by getting victims to visit infected websites, opening malicious
email attachments or by plugging USB drives into their PCs. This is the
malware used against Wolf.

Among its other functionalities Blackshades allows the person


using it to take control of the webcam of an infected user. According to
the FBI the piece of malware had infected over half a million PCs in
over 100 countries around the world, selling for as little as $40 on the
dark web.

For just $40, the Blackshades RAT enabled anyone, anywhere in


the world to instantly become a dangerous cybercriminal, able to steal
your property and invade your privacy, Preet Bharara, the U.S.
Attorney for the Southern District of New York said in 2014 after the
creators of the malware had been arrested by the FBI.

In 2012 the Electronic Frontier Foundation and Citizen Lab


reported that Blackshades was being used against opposition forces in
Syria, while others bought the hacking tool to spy on people they knew,
including one man from Leeds who in 2015 was given a 40-week
suspended sentence for using BlackShades against 14 people, 7 of whom
he knew personally having paid for it using his ex-girlfriends credit
card.
More recently Gartner reported on the Delilah malware which
specifically targeted enterprises and uses webcams to collect
incriminating evidence on employees and their families, in order to
blackmail them and extort them to reveal sensitive about their
companies.

Webcam streaming sites

Accessing a webcam that does not belong to you however does not
necessitate hacking in a lot of cases. In 2014 the US and UK
governments warned that there were numerous websites which were
tracking unsecured webcams across the globe.

These sites which are not hacking anyones systems rely on


the fact that most webcams, security cameras and IP cameras leave the
manufacturer security settings unchanged when they are set up, and so
are vulnerable to be monitored.

The operators of these sites say that they simply scan for unsecured
internet-connected cameras and post snapshots on their site, which are
searchable by country or US state in some cases.

So its clear that there are some significant risks associated with having a
webcam in your home or your workplace. Thankfully, there are a
number of steps you can take to protect yourself, your family and your
business.

Cover it up

The preferred choice of no less figures than Zuckerberg, Snowden


and FBI director James Comey, the easiest way of stopping hackers from
remotely peering into your life is by physically covering up your
webcam.

Zuckerberg prefers a piece of black electrical tape, while Snowden


has been seen throwing a blanket over his entire laptop to stop the spies,
but whatever you choose, you should always check that it works by
firing up the camera app on your laptop or desktop computer (or use the
Skype test call facility) to see if the cover you have used blocks out
everything.

One of the issues with using a piece of tape is that should you have
a need to use the camera at any point, the tape could leave a sticky
residue over the camera lens, though some vigorous scrubbing should
solve this problem.

If you dont want to use a DIY solution but want something more
substantial, you can buy physical webcam covers online, which come in
a variety of shapes, sizes and colours with some even featuring a sliding
door making it easy to protect yourself when the camera is not in use.
These typically cost under 10/$15 but make sure that the model you are
buying is right for your device, and, for example, wont stop you closing
your laptop.

Close your laptop/Turn off your computer

If you use your webcam a lot for Skype chats or video


conferencing (or just checking you dont have something caught in your
teeth) then rather than putting a cover on it, you could just make sure
your computer is off when you are not using it.

Even the best hacker in the world wont be able to see what you
are doing if you close your laptop or if you power down your PC when
youre not using it.

Regularly scan your computer for webcam malware

Hackers are extremely good at circumventing traditional security


measures like antivirus software and typically spotting webcam-focused
malware is not something these pieces of software do that well.

But that doesnt mean you should just do nothing.


What you need is what is known as a second opinion malware
scanner. Just as the name suggests, these act as a secondary malware
detection and removal program like a second line of defence for your
computer should your primary scanner fail to detect an active malware
infection.

With hackers actively coding malware to avoid certain antivirus


software, this is always a good idea, with Malwarebytes and Hitman Pro
among the best on offer.

Turn on the LED notification light

Some webcams come with accompanying LED notification lights


which turn on whenever the camera is active, making it a lot easier to
spot of someone is using the camera without your knowledge.

Unfortunately this is not a foolproof method of protecting yourself


however as some hackers have been able to code their malware to
automatically turn off these LEDs when secretly accessing your camera.

Change the default admin and password

If you are using a standalone webcam, either in conjunction with


your computer or as a security camera or baby monitor, then you need to
make sure you have changed the default settings which were configured
by the manufacturer before leaving the factory.

These changes are done by the firing up the software which came
with your camera, but if like most people you threw that CD out with the
box the camera came in, you should be able to download the software on
the manufacturers website.
References:
https://techterms.com/definition/motherboard
https://en.wikipedia.org/wiki/Central_processing_unit
http://itstillworks.com/functions-computer-memory-1411.html

https://www.urbanairship.com/push-notifications-explained

https://www.searchmobilecomputing.techtarget.com/definition/pull-
notification

https://www.comparitech.com/blog/information.../how-to-secure-your-
webcam/

You might also like