Bleeping Computer
Encyclopedia
Bleeping Computer is a computer help site founded by Lawrence Abrams in 2004. It is a resource site for answering computer, security, and technical questions. All services to the public are free, including malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 and rootkit
Rootkit
A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications...

 cleanup of infected computers and removal instructions on rogue anti-spyware programs. Bleeping Computer caters especially to the new computer user. The site is a featured Microsoft Expert Zone Community and has been recommended in PC World magazine.

Members, volunteers and staff

As of 24 July, there are 373,262 registered members, of which the vast majority are 'regular' members. However, a significant proportion of the membership also includes members who work for the site, in varied roles, as volunteers. Some examples of such volunteer roles are the Malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 Response Team and Trainees and also BC Advisors. The site also has an administration team who work as site staff. The team consists of the Administrator (owner), Site Administrator, Global Moderators and Moderators. There is a comprehensive membership description that provides an overview of each group.

Forums

Bleeping Computer's forums have subsections devoted to several operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

s, broad classes of application software
Application software
Application software, also known as an application or an "app", is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software and media players. Many application programs deal principally with...

, and malicious software removal, as well as sections for web browsers, home
Home network
A home network or home area network is a residential local area network . It is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices...

 and small business networking
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

 and the Mac OS X
Mac OS X
Mac OS X is a series of Unix-based operating systems and graphical user interfaces developed, marketed, and sold by Apple Inc. Since 2002, has been included with all new Macintosh computer systems...

 operating system.

Malware removal

Bleeping Computer offers free malware removal help. All help given to users are provided by volunteers trained to use anti-malware tools like HijackThis
HijackThis
HijackThis is a freeware enumerating tool for Microsoft Windows originally created by Merijn Bellekom, and later sold to Trend Micro. The program is notable for targeting browser-hijacking methods, rather than relying on a database of known spyware. It scans a user's computer quickly, and displays...

, as well as DDS
DDS
D.D.S. refers to the academic degree of Doctor of Dental Surgery.DDS may refer to:-Computer and information science:*Data Design System, DDS-CAD software vendor*Data Description Specifications, AS400 programming...

, OTL
OTL
OTL may stand for:* On the Level, album by Status Quo* Out to Lunch * One True Love, Philippine film* Optical channel Transport Lane, multi-lane interface for the Optical Transport Network * Oradea Transport Local...

, GMER
GMER
GMER is a software tool for detecting and removing rootkits. It is used by the Avast! antivirus application. It runs on Microsoft Windows and has support for Windows NT, 2000, XP, Vista, and 7....

 and Malwarebytes' Anti-Malware
Malwarebytes' Anti-Malware
Malwarebytes' Anti-Malware is a computer application that finds and removes malware. Made by Malwarebytes Corporation, it was released in January 2008...

. The application Rkill, which was developed by the site founder Lawrence Abrams, is also used to aid in the fight against malware.

Tutorials

Bleeping Computer has a large library of tutorials covering such topics as the basics of TCP/IP
Internet protocol suite
The Internet protocol suite is the set of communications protocols used for the Internet and other similar networks. It is commonly known as TCP/IP from its most important protocols: Transmission Control Protocol and Internet Protocol , which were the first networking protocols defined in this...

, hardware configuration, partition
Disk partitioning
Disk partitioning is the act of dividing a hard disk drive into multiple logical storage units referred to as partitions, to treat one physical disk drive as if it were multiple disks. Partitions are also termed "slices" for operating systems based on BSD, Solaris or GNU Hurd...

 management, and internet security
Internet security
Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,...

. These tutorials are written by members of the Bleeping Computer staff and are available for free.

Bleeping Computer also has many mini guides for things such as "How to Re-Install Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

" to "How to Install and Use Ubuntu
Ubuntu (operating system)
Ubuntu is a computer operating system based on the Debian Linux distribution and distributed as free and open source software. It is named after the Southern African philosophy of Ubuntu...

 or any version of Linux
Linux
Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds...

" as well as guides on how to remove common Malware infections.

Malware removal training program

Bleeping Computer offers a malware removal training program. The course is divided to three groups: the Sophomore Level, the Junior Level and the Senior Level. Many graduates of the program remain active in the forum's malware assistance section. Students in the program learn techniques, methods and cleaning procedures used in today's anti-malware communities.

The training program is a UNITE accredited malware training program

Databases

Bleeping Computer maintains several databases of common programs, startup entries and files found in Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

operating systems. Each entry briefly identifies the file or entry, whether it's malicious, necessary or optional, as well as a recommendation on what actions a user should take against it, if any.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK