SlideShare a Scribd company logo
We Fix Computers Presents




Busting the Biggest Computer Myths
Magnets Zap Your Data!
FACT
• A cheap dollar store magnet will ruin data!
              On old 3.5” floppy disks

TRUTH
• Most modern storage devices, such as SD and
  CompactFlash memory (camera storage) are immune to
  magnetic fields.
Magnets Zap Your Data!
BUT WHAT ABOUT HARD DRIVES?
FACT
• The only magnets powerful enough to scrub data
  from a drive platter are laboratory degaussers or
  those used by government agencies to wipe bits
  off media. "In the real world, people are not
  losing data from magnets," says Bill Rudock, a
  tech-support engineer with hard-drive maker
  Seagate
Hackers Can Destroy EVERYTHING on
          your Hard Drive!
FACT
• The MyDoom.f worm that was written is just
  one example of data destroying infections.
•MyDoom.f sniffed around on infected PC’s
looking for Word, Excel, and graphics files and
then randomly deleted some of what it found.
Of the people whose PC’s got the worm, 40
percent lost Word files and 60 percent lost Excel
files.
Hackers Can Destroy EVERYTHING on
          your Hard Drive!
FACT
• Today's hackers want to hijack systems, not
  destroy them. Rather than wipe out
  data, worms and viruses want intact PC’s to
  send spam or to attack Web sites. "Just like a
  biological virus, if a computer virus kills the
  host before it propagates, it can't propagate.
If you don’t run your laptop battery
down to zero, you will lose battery life!
FACT
• This was a syndrome that plagued old laptop
  NiCd batteries.
• Newer laptops now use Li batteries that
prefer a partial charge rather than a full charge.
• Running new batteries down to zero, every 30
charges or so, will recalibrate the fuel gauge
(the little indicator that tells you how much
juice you have left)
My 4-Year Old Computer is slow now
         but wasn’t before!
• A computer is considered “obsolete” after a
  maximum of 2 years. (They just don’t make
  them like they used to).
• Software & internet applications become
  exponentially more sophisticated faster than
  hardware can keep up.
• Dust, normal wear-and-tear, & hardware
  degradation all contribute to the overall
  slowdown of computers over time.
My 4-Year Old Computer is slow now
         but wasn’t before!
FACT
• Manufacturers actually want to constantly sell
  you new computers to make $$$ which is also
  why “They don’t make them like they used
  to”.
• Just like the 60’s Cadillacs. They could make it
  wear the bumpers don’t fall off but they
  won’t!
FUN COMPUTER FACTS!
Bill Gates' house was designed using a Macintosh computer.

On eBay, there are an average of $680 worth of transactions
each second.
80% of all pictures on the internet are of naked women.

The first computer mouse was invented by Doug Engelbart
in around 1964 and was made of wood.

The average computer user blinks 7 times a minute, less
than half the normal rate of 20.
FUN COMPUTER FACTS!
For every 'normal' webpage, there are five porn pages.

The first domain name ever registered was Symbolics.com.

Facebook reports over 110 million registered users. Were it
a country, it would be the tenth largest, just behind Mexico.

There are approximately 1,319,872,109 people on the
Internet.

The average 21 year old has spent 5,000 hours playing
video games, has exchanged 250,000 e-mails, instant and
text messages and has spent 10,000 hours on the mobile
phone.
SHAMELESS SELF EXALTATION


   APPLAUSE!!!

More Related Content

What's hot

12 TechCrunch Stories You Don't Want To Miss This Week
12 TechCrunch Stories You Don't Want To Miss This Week12 TechCrunch Stories You Don't Want To Miss This Week
12 TechCrunch Stories You Don't Want To Miss This Week
steven5butler46
 
Living in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You SoarLiving in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You Soar
Northeast Kansas Library System
 
The New York Times - PR Kena Kai
The New York Times - PR Kena KaiThe New York Times - PR Kena Kai
The New York Times - PR Kena Kai
Nelleke Masterson
 
Blown to bits
Blown to bitsBlown to bits
Blown to bits
AbdanSyakuro14
 
Minnesota ARLD Day 2011
Minnesota ARLD Day 2011Minnesota ARLD Day 2011
Minnesota ARLD Day 2011
Jason Griffey
 
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUSECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
ShowGizmo
 
Day 2_Keynote_Tessie Guillermo
Day 2_Keynote_Tessie GuillermoDay 2_Keynote_Tessie Guillermo
Day 2_Keynote_Tessie Guillermo
UCB Center for Health Leadership
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & community
Mathias Klang
 
Internet history project
Internet history projectInternet history project
Internet history project
devhook32
 

What's hot (9)

12 TechCrunch Stories You Don't Want To Miss This Week
12 TechCrunch Stories You Don't Want To Miss This Week12 TechCrunch Stories You Don't Want To Miss This Week
12 TechCrunch Stories You Don't Want To Miss This Week
 
Living in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You SoarLiving in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You Soar
 
The New York Times - PR Kena Kai
The New York Times - PR Kena KaiThe New York Times - PR Kena Kai
The New York Times - PR Kena Kai
 
Blown to bits
Blown to bitsBlown to bits
Blown to bits
 
Minnesota ARLD Day 2011
Minnesota ARLD Day 2011Minnesota ARLD Day 2011
Minnesota ARLD Day 2011
 
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUSECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
ECDU12 - Jo-Anne Kelleway – Back to the Future - AUS
 
Day 2_Keynote_Tessie Guillermo
Day 2_Keynote_Tessie GuillermoDay 2_Keynote_Tessie Guillermo
Day 2_Keynote_Tessie Guillermo
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & community
 
Internet history project
Internet history projectInternet history project
Internet history project
 

Similar to Computer Myths

History Of Personal Computers
History Of Personal ComputersHistory Of Personal Computers
History Of Personal Computers
rynders18
 
Teched 2010 the future of IT
Teched 2010 the future of ITTeched 2010 the future of IT
Teched 2010 the future of IT
Anandan kumaran
 
Essay On Invention Of Computer
Essay On Invention Of ComputerEssay On Invention Of Computer
Essay On Invention Of Computer
College Paper Writing Service Reviews
 
Invention Of Computer Essay
Invention Of Computer EssayInvention Of Computer Essay
Invention Of Computer Essay
Custom Paper Services
 
Butterfly London's A to Z of the Web
Butterfly London's A to Z of the WebButterfly London's A to Z of the Web
Butterfly London's A to Z of the Web
Butterfly London
 
1. computers for the masses
1. computers for the masses1. computers for the masses
1. computers for the masses
Константин Талецкий
 
Charity Engine English
Charity Engine EnglishCharity Engine English
Charity Engine English
hotbridge
 
Jun Union Clac Strom
Jun Union Clac StromJun Union Clac Strom
Jun Union Clac Strom
David Strom
 
Essay About History Of The Computer
Essay About History Of The ComputerEssay About History Of The Computer
Essay About History Of The Computer
I Will Pay You To Write My Paper Immaculata University
 
Comm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley ElginComm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley Elgin
ashleyelgin
 
Future-of-computers
Future-of-computersFuture-of-computers
Future-of-computers
Mark Sathish Pairdha
 
My electronic gadget
My electronic gadgetMy electronic gadget
My electronic gadget
Madugula Kumar
 
Comm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley ElginComm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley Elgin
ashleyelgin
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
segughana
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
wirelessbroadbandinternet57
 
The future of computing and its impact
The future of computing and its impactThe future of computing and its impact
The future of computing and its impact
waqar hanif
 
Vinnies power point
Vinnies power pointVinnies power point
Vinnies power point
Virendra Ramkissoon
 
Intro IT.pdf
Intro IT.pdfIntro IT.pdf
Intro IT.pdf
ssuser536c36
 
Vinnies power point
Vinnies power pointVinnies power point
Vinnies power point
Virendra Ramkissoon
 

Similar to Computer Myths (20)

History Of Personal Computers
History Of Personal ComputersHistory Of Personal Computers
History Of Personal Computers
 
Teched 2010 the future of IT
Teched 2010 the future of ITTeched 2010 the future of IT
Teched 2010 the future of IT
 
Essay On Invention Of Computer
Essay On Invention Of ComputerEssay On Invention Of Computer
Essay On Invention Of Computer
 
Invention Of Computer Essay
Invention Of Computer EssayInvention Of Computer Essay
Invention Of Computer Essay
 
Butterfly London's A to Z of the Web
Butterfly London's A to Z of the WebButterfly London's A to Z of the Web
Butterfly London's A to Z of the Web
 
1. computers for the masses
1. computers for the masses1. computers for the masses
1. computers for the masses
 
Charity Engine English
Charity Engine EnglishCharity Engine English
Charity Engine English
 
Jun Union Clac Strom
Jun Union Clac StromJun Union Clac Strom
Jun Union Clac Strom
 
Essay About History Of The Computer
Essay About History Of The ComputerEssay About History Of The Computer
Essay About History Of The Computer
 
Comm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley ElginComm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley Elgin
 
Future-of-computers
Future-of-computersFuture-of-computers
Future-of-computers
 
My electronic gadget
My electronic gadgetMy electronic gadget
My electronic gadget
 
Comm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley ElginComm Tech 303 Final- Ashley Elgin
Comm Tech 303 Final- Ashley Elgin
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
 
The future of computing and its impact
The future of computing and its impactThe future of computing and its impact
The future of computing and its impact
 
Vinnies power point
Vinnies power pointVinnies power point
Vinnies power point
 
Intro IT.pdf
Intro IT.pdfIntro IT.pdf
Intro IT.pdf
 
Vinnies power point
Vinnies power pointVinnies power point
Vinnies power point
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Computer Myths

  • 1. We Fix Computers Presents Busting the Biggest Computer Myths
  • 2. Magnets Zap Your Data! FACT • A cheap dollar store magnet will ruin data! On old 3.5” floppy disks TRUTH • Most modern storage devices, such as SD and CompactFlash memory (camera storage) are immune to magnetic fields.
  • 3. Magnets Zap Your Data! BUT WHAT ABOUT HARD DRIVES? FACT • The only magnets powerful enough to scrub data from a drive platter are laboratory degaussers or those used by government agencies to wipe bits off media. "In the real world, people are not losing data from magnets," says Bill Rudock, a tech-support engineer with hard-drive maker Seagate
  • 4. Hackers Can Destroy EVERYTHING on your Hard Drive! FACT • The MyDoom.f worm that was written is just one example of data destroying infections. •MyDoom.f sniffed around on infected PC’s looking for Word, Excel, and graphics files and then randomly deleted some of what it found. Of the people whose PC’s got the worm, 40 percent lost Word files and 60 percent lost Excel files.
  • 5. Hackers Can Destroy EVERYTHING on your Hard Drive! FACT • Today's hackers want to hijack systems, not destroy them. Rather than wipe out data, worms and viruses want intact PC’s to send spam or to attack Web sites. "Just like a biological virus, if a computer virus kills the host before it propagates, it can't propagate.
  • 6. If you don’t run your laptop battery down to zero, you will lose battery life! FACT • This was a syndrome that plagued old laptop NiCd batteries. • Newer laptops now use Li batteries that prefer a partial charge rather than a full charge. • Running new batteries down to zero, every 30 charges or so, will recalibrate the fuel gauge (the little indicator that tells you how much juice you have left)
  • 7. My 4-Year Old Computer is slow now but wasn’t before! • A computer is considered “obsolete” after a maximum of 2 years. (They just don’t make them like they used to). • Software & internet applications become exponentially more sophisticated faster than hardware can keep up. • Dust, normal wear-and-tear, & hardware degradation all contribute to the overall slowdown of computers over time.
  • 8. My 4-Year Old Computer is slow now but wasn’t before! FACT • Manufacturers actually want to constantly sell you new computers to make $$$ which is also why “They don’t make them like they used to”. • Just like the 60’s Cadillacs. They could make it wear the bumpers don’t fall off but they won’t!
  • 9. FUN COMPUTER FACTS! Bill Gates' house was designed using a Macintosh computer. On eBay, there are an average of $680 worth of transactions each second. 80% of all pictures on the internet are of naked women. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood. The average computer user blinks 7 times a minute, less than half the normal rate of 20.
  • 10. FUN COMPUTER FACTS! For every 'normal' webpage, there are five porn pages. The first domain name ever registered was Symbolics.com. Facebook reports over 110 million registered users. Were it a country, it would be the tenth largest, just behind Mexico. There are approximately 1,319,872,109 people on the Internet. The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone.