May 26, 2017

ওয়ারলেস পাওয়ার ট্রান্সমিটার ও রিসিভার তৈরি - উদাহরণ সহ (with Eng sub)


ওয়ারলেস পাওয়ার ট্রান্সমিশন এখন একটি বেশ জনপ্রিয় প্রযুক্তি। অনেকের বাসাতেই ওয়ারলেস ফোন, ওয়াকিটকি ইত্যাদি দেখেছি যা কিনা এই ওয়ারলেস টেকনোলজি ব্যবহার করেই কাজ করে। তবে হাল আমলে ওয়ারলেস পাওয়ার ট্রান্সফার কিংবা বলা যায় ওয়ারলেস পাওয়ার ট্রান্সমিটার ও রিসিভার তৈরি করার একটি ধুম পড়ে গেছে। বলা বাহুল্য যে সেগুলোর সাফল্যের চেয়ে ব্যর্থতার পরিমানই বেশি। এর প্রধান কারন এর তাত্ত্বিক ও নির্মান জটিলতা। তবে আমাদের ইলেকট্রনিক্সের কয়েকজন মিলে এই ওয়ারলেস পাওয়ার সিস্টেম সফল ভাবেই তৈরি করতে সক্ষম হয়েছেন। আর এই ওয়ারলেস সিস্টেম দিয়ে আপাতত ছোট কিন্তু পাওয়ারফুল ডিসি মোটর চালিয়ে দেখানো হলেও আপনি কিছুটা মডিফাই করে এর দ্বারা মোবাইল চার্জার থেকে শুরু করে ওয়ারলেস মাউস, রাউটার ইত্যাদিও চালাতে পারেন।

ওয়ারলেস কি?
এটি এমন একটি পদ্ধতি যার মাধ্যমে একটি যন্ত্র থেকে আরেকটি যন্ত্রে কোন ধরনের বৈদ্যুতিক তার ছাড়াই কোন কিছু (সাধারণত বিদ্যুৎ অথবা বৈদ্যুতিক সিগনাল) পাঠানো যায়। আমরা এই পদ্ধতি প্রয়োগ করে স্বল্প দূরত্ব থেকে ছোট একটি ফ্যান চালাবো। ইচ্ছা করলে মোবাইল চার্জার ও বানানো সম্ভব এর মাধ্যমে।

এটি তৈরি করতে আমাদের যা যা লাগবে
১টি ১২ ভোল্ট ৩ এম্পিয়ারের সেন্টার ট্যাপ ট্রান্সফরমার
পাওয়ার সাপ্লাই সার্কিট
ট্রান্সমিটার ও রিসিভার সার্কিট
ট্রান্সমিটার ও রিসিভার কয়েল
যেকোন একটি লোড (এখানে ছোট ডিসি ফ্যান ব্যবহৃত হয়েছে)

ওয়ারলেস ট্রান্সমিটার ও রিসিভার সার্কিট
ট্রান্সমিটার ও রিসিভার সার্কিটের বিস্তারিত কার্যপ্রণালী ও ডায়াগ্রাম ভিডিও তেই দেয়া আছে বিধায় এখানে আর বেশি কিছু লিখছিনা।

ট্রান্সমিটার ও রিসিভার কয়েল
কয়েলটি হলো এই যন্ত্রের মূল প্রাণ। কারন ট্রান্সমিটার কয়েল ভালো ভাবে তৈরি করা না হলে পাওয়ার ট্রান্সমিট ভালো হবে না। এই কয়েল টি বানানোর জন্য ৩০ গেজ (30 SWG এর ) ৭ টি আলাদা আলাদা তার কে একত্রে প্যাঁচাতে হবে। এবং সেই প্যাঁচানো তারটিকে দিয়ে এই ভিডিও অনুযায়ী কয়েল বানাতে হবে। বুঝতে সমস্যা হলে ভিডিও টি আবার দেখুন। এই টিউটোরিয়াল ভিডিওতে কয়েল গুলো বানানোর বিস্তারির বিবরণ দেয়া আছে।

সার্কিটের কার্যপ্রণালি যেহেতু ভিডিওতেই বিস্তারির বলা আছে তাই এখানে আর লিখছি না।

ভিডিওর শেষ অংশ দেখলে আপনারা বুঝতে পারেন যে ডিজিটাল মাল্টিমিটার দিয়ে ইনপুট ও আউটপুট পাওয়ারের তুলনা দেখানো হয়েছে।
তাতে আমরা দেখতে পাই যে এই ধরনের ওয়ারলেস পাওয়ার ট্রান্সমিটার ব্যবহার করলে প্রচুর পরিমাণ বিদ্যুতের অপচয় ঘটে।

অবশ্য কয়েল, ব্যবহৃত সার্কিট, পার্টস ও সর্বপরি সার্কিট ডিজাইনের উন্নয়ন সাধনের মাধ্যমে এই অপচয় অনেকাংশেই কমানো সম্ভব।

আজকের মত এখানেই বিদায় নিচ্ছি। সবাই ভালো থাকবেন। আর অবশ্যই আমাদের চ্যানেল সাবস্ক্রাইব করতে ভুলবেন না যেন!

~~~~~~~~~~~~~~~~~~~~~~~~~~~
আমাদের বহুল জনপ্রিয় আরো কিছু ভিডিও দেখুন-

"হাই ভোল্টেজ প্লাজমা গ্লোব/ল্যাম্প তৈরি - মজার বিজ্ঞান প্রজেক্ট (সার্কিট ডায়াগ্রাম ও টিউটোরিয়াল সহ)"-
https://www.youtube.com/watch?v=e52hCnUKQyE

"ঘরে তৈরি সহজ ভূমিকম্প নির্নয়কারী যন্ত্র - আর্থকুয়েক ডিটেক্টর (প্রজেক্ট ও সার্কিট ডায়াগ্রাম সহ)"-
https://www.youtube.com/watch?v=9yjaTHdn6IU

"How to Sharpen Twisted Mini Drill Bit - DIY Jig For Your PCB Drilling Machine (Bangla)"-
https://www.youtube.com/watch?v=28QY31zPyzk

"৩ মিনিটে ঘরে বসেই তৈরী করুন নিজের পিসিবি বোর্ড - PCB MAKING TUTORIAL"-
https://www.youtube.com/watch?v=hMuNb6ikS7A

"Digital Laser and Gas Security Alarm PROJECT for Students using Arduino"-
https://www.youtube.com/watch?v=zgxvTG0EKxU

"তৈরী করুন মজার ব্যাটারী ও চুম্বক ট্রেন"-
https://www.youtube.com/watch?v=70LQe8A0vMY


May 20, 2017




Wireless Power Transmission is a very popular technology now a days. We have seen wireless phones, walkitalkies and many wireless devices. However, there is a modern trend in wireless power supply or
wireless power transfer project. But sadly most of them are fake and not so powerful. The main reason behind is theoretical and constructive complexity. However, some of our fellows at Amader Electronics have successfully managed to create this wireless power system. And with this wireless system you can now run small but powerful DC motor. But one can also modify some of it output circuitry and can run mobile chargers, wireless mouse, router etc.

What is wireless?

This is a method by which anything (specially electricity or electrical signal) can be sent from one device to another without any physical contacts. We will use this method to run a small fan from short distance. If you wish, mobile chargers can be made and possible through this.

What we need to do to create this project:


  1. Center Tap Transformer of 1 12 Volt 3 Ampere
  2. Power supply circuit
  3. Transmitter and Receiver Circuit
  4. Transmitters and receiver coils
  5. Any kind of load (small DC fan used here)

Wireless Transmitters and Receiver Circuits
Transmitter and receiver circuits have detailed procedures and diagrams in the video, so here we are not writing anything more.

Transmitters and receiver coils

The Coils are the main part of this device. If the transmitter coil is not well made, the power transmission will not good. 
To make this coil, we have arranged 7 different strands of 30 SWG super enamel wires to put together. And with that twisted wire, rest of the coil is made according to the video. Watch the video again if you have trouble understanding In this tutorial video.

At the end of the video, you can see that the comparison of input and output power with the digital multimeter.
By seeing this we can assume that the use of such wireless power transmitter system will result of great amount loss of electricity.


How to reduce Power Wastes

However, it is possible to reduce the power waste greatly by improving the coil designs, circuits, parts and circuit designs.

Thank you for watching this wireless tutorial video do not forget to SUBSCRIBE to our channels!

Check out some of our most popular videos-

"Creating High Voltage Plasma Globe / Lamp - Funny Science Project (Including Circuit Diagrams and Tutorials)" -
Https://www.youtube.com/watch?v=e52hCnUKQyE

"Simple earthquake-making machine built-in earthquake detectors (including project and circuits diagram)" -
Https://www.youtube.com/watch?v=9yjaTHdn6IU

"How to Sharpen Twisted Mini Drill Bit - DIY Jig For Your PCB Drilling Machine (Bangla)" -
Https://www.youtube.com/watch?v=28QY31zPyzk

"Create your own PCB board at home in 3 minutes - PCB MAKING TUTORIAL" -
Https://www.youtube.com/watch?v=hMuNb6ikS7A

"Digital Laser and Gas Security Alarm PROJECT for Students using Arduino"
Https://www.youtube.com/watch?v=zgxvTG0EKxU

"Create Fun Battery and Magnet Train" -
Https://www.youtube.com/watch?v=70LQe8A0vMY

January 28, 2013

10 Types Of Smartphone Displays, Touchscreens

Below you will find 10 Types Of Smartphone Display currently uses in the techno-market.

TFT LCD
TFT stands for Thin Film Transistor technology. TFT LCDs are the most common type of display units used across mobile phones. TFT LCD offer better image quality and higher resolutions compared to earlier generation LCD displays but their limitation lies in narrow viewing angles and poor visibility in direct light or sunlight.

Large TFT displays consume more power and hence are not battery friendly. But since these are cheaper to manufacture these are found on budget phones, feature phones and lower end smartphones.


IPS-LCD
IPS stands for In-Place Switching. IPS LCDs are superior to normal TFT LCD displays with wider viewing angles and lower power consumption which leads to a much improved battery life. IPS-LCDs are costlier than normal TFT LCD and hence are found only on higher end smartphones. A higher resolution (640 x 960 pixels) version of IPS LCD is used in Apple iPhone 4 and is called Retina Display because of its brilliant picture quality.


Resistive Touchscreen LCD
Touchscreen LCD displays are of two types – Resistive and Capacitive. Resistive touchscreens contain two layer of conductive material with a very small gap between them which acts as a resistance. When the resistive touchscreen is touched with finger (or stylus) the two layers meet at the point of touch thus making a circuit at the point of touch. This information is recognized by the mobile’s processor / chip and passed on to the mobile’s OS there by triggering and event / action at the point of touch.

Resistive Touchscreens are not as responsive as capacitive touchscreens and often require a stylus to identify point of touch accurately. These are used only in lower end smartphones and feature touch phones.

Capacitive Touchsceen LCD
Capacitive touchscreen technology consists of a layer of glass coated with a transparent conductor (like indium tin oxide). When a capacitive touchscreen is touched by human body (finger), an interruption is created in the screens electrostatic field (which is measurable as a change in capacitance) which is detected by phone’s processor or chip and which in turn instructs phone’s operating system to trigger and event or action accordingly.

Capacitive touchsceens are much better and responsive to human touch when compared to resistive touchsceens and hence the user experience for touch is much better with capacitive touchscreens. Capacitive Touchsceens are used in most of the higher end smartphones.

OLED
OLED stands for Organic Light Emitting Diode and is a newer technology for displays of mobiles and monitors. In OLED technology a layer of organic material (carbon based) is sandwiched between two conducting sheets (an anode and a cathode), which in turn are sandwiched between a glass top plate (seal) and a glass bottom plate (substrate). When electric pulse is applied the two conducting sheets, electro-luminescent light is produced directly from the organic material sandwiched between. Brightness and color can vary depending on the electric pulse.

OLEDs are much better compared to LCDs because of their exceptional color reproduction, blazing fast response times, wider viewing angles, higher brightness and extremely light weight designs.

AMOLED
AMOLED stands for Active-Matrix Organic Light-Emitting Diode. AMOLED displays are a type of OLED displays for mobiles and are rapidly gaining popularity in top end smartphone segment. AMOLED screens have all the attributes of an OLED display like brilliant color reproduction, light weight, better battery life, higher brightness and sharpness and light weight designs.

AMOLED displays are now getting into main stream and most of the latest higher end smartphones like Nokia N8 are now coming with AMOLED displays. If you can shell out a little extra, our suggestion is to go with AMOLEDs over TFT LCDs.

Super AMOLED displays
Super AMOLED displays are an even advanced version of AMOLED displays developed by Samsung. Super AMOLED display is built with touch sensors on the display itself, as opposed to creating a separate touch sensitive layer (as in capacitive touchscreen). This makes it the thinnest display technology on the market.

Super AMOLED displays are also much more responsive than other AMOLED displays. Samsung’s recent top of the line smartphone Samsung Galaxy S I9000 comes with Super AMOLED.

Retina Display
Retina Display is a term used by Apple for its high resolution (640 x 960 pixels) IPS LCD (with backlit LED) used by them in iPhone4. They call it the Retina display because its pixels cannot be individually identified by the human eye, thus making the display super sharp and brilliant.

Haptic / Tactile touchscreen
Haptic technology has been used by Blackberry and Nokia for their touchscreen smartphones targeted towards enterprise market. This technology provides a tactile feedback on a touch action on the screen thus providing an immediate and unmistakable confirmation to the user. Haptic technology has been found to significantly improve user performance, accuracy and satisfaction while typing on a touchscreen.

Gorilla Glass
Gorilla Glass is a special alkali-aluminosilicate glass shield with exceptional damage resistance that helps protect mobile displays from scratches, drops, and bumps of everyday use. Many companies like Motorola, Samsung and Nokia are now using Gorilla Glass to make their mobile displays more durable and reliable. It is always better to go for a smartphone with Gorilla Glass for that added protection and peace of mind.
 

October 25, 2012

The World Today - আজকের দুনিয়া: How is this Smile ??? - A Request to all

Smiley Smile Dear fellow readers around the world, my good wishes to you all. Today I want to request you to do me a favor. I am giving you a link of a Photo Beauty Contest which is arranged by SunSilk and love to share you this because the picture of the Lady is the main contributor of our blog... So please open this LINK and like the photo, the many like she gets she will be the winner of the week.. so do hurry and share with your friends and keep on liking.

My Best Regards To You All

How is this Smile ??? - A Request to all

Smiley Smile
Dear fellow readers around the world, my good wishes to you all. Today I want to request you to do me a favor. I am giving you a link of a Photo Beauty Contest which is arranged by SunSilk and love to share you this because the picture of the Lady is the main contributor of our blog... So please open this LINK and like the photo, the many like she gets she will be the winner of the week.. so do hurry and share with your friends and keep on liking.

My Best Regards To You All

S.R 

September 23, 2012

Photos - Just in Time

Amazing MomentsJust in Time :)

Check these amazing photos captured in perfect time with nature, baby and so on... .




Zoom in (real dimensions: 700 x 470)Amazing Moments

Funny Babies Photos

Zoom in (real dimensions: 700 x 455)Amazing Moments


Zoom in (real dimensions: 700 x 492)Amazing Moments


Zoom in (real dimensions: 700 x 476)Amazing Moments


Amazing Moments

Funny Babies Photos

Zoom in (real dimensions: 700 x 470)Amazing Moments


Amazing Moments


Zoom in (real dimensions: 700 x 348)Amazing Moments

Creative Photos

Zoom in (real dimensions: 700 x 389)Amazing Moments


Zoom in (real dimensions: 700 x 482)Amazing Moments


Zoom in (real dimensions: 700 x 447)Amazing Moments

Amazing Moments

Creative Photos

Amazing Moments


Amazing Moments 

Funny Babies Photos
 
 

September 12, 2012

Automate Your Windows 7 Backups


windows 7 backup 


Far too many PC users fail to properly back up their systems and their data. Because of that, I’ve often found myself in the position of having to tell family and friends that all of the family photos and financial information they’ve stored on their computer is completely lost. There are so many free and inexpensive ways to set up regular backups, that there is really no excuse to lose all of those precious memories and important files.
Tina recently described a step-by-step approach to setting up the Windows 7 backup and restore feature that’s built right into the operating system. It really doesn’t get much easier than that. Justin also provided 10 free products that can help with manually taking regular backups. In this article, I’m going to offer three other free products that you can use to configure regularly scheduled, automated Windows 7 backups.

Back Up All of Your Computers Today

These are products that are guaranteed to work with the Windows 7 operating system, but you can also use them to back up other PCs in your house as well. The best of all, the client-server solution, which I’ll describe last, offers a very cool centralized approach to your entire household backup needs.

Fast & Simple Backups With TrueSafe

The simple fact is, some people just don’t know where to start when it comes to computer maintenance. In my opinion, TrueSafe offers one of the simplest solutions for taking PC image backups.
It is free software, but you will need to register with the site using an email address. The process is simple and painless. Once you’re done, the software will take you through a very simple four step backup process.
windows 7 backup
Best of all, part of the process includes an option to schedule the backups only at a regularly scheduled time of your choosing. In the “Choose Schedule” step, you get to define when the backups take place, and how often they take place. Make sure to choose the “Automatic” mode in this step, or you won’t be able to schedule your backups.
windows backup
Once you’re through the four steps, your PC is now protected with regular backups of either your entire drive, or select files and folders that you’ve chosen, to the destination of your choice. This can be a network share that you’ve set up on a different PC, or some external or internal drive.

Image Your Hard Disk With ODIN

The second tool that I wanted to offer is a very easy to use open-source disk imaging software tool called ODIN, that lets you quickly configure what partitions you want to image, and where you want to store those images.
windows backup
The manual operation of this tool is a quick one-screen operation, which is very cool. It offers one of the easiest ways to take a quick backup of your hard drive to an external hard drive where you probably (should be) storing all of your hard disk backups.
However, the reason I’m covering the tool here is because it also offers a command line feature that you can schedule using Windows 7 task scheduling tool to fire off at automated, scheduled intervals.
windows backup
You can get all the usage options by typing “usage” after the executable. Using the -backup parameter lets you define the -source and -target for the images. You could install the software on any PC where you want to take backup images and just schedule the backup command to kick off whenever it’s convenient for you – like when no one is likely to be using the computer.

Use UrBackup to Set Up a Client-Server Imaging Solution

In this article, I’ve saved the best for last. I absolutely love the UrBackup imaging solution. I like it because it follows the general goal I have to accomplish most of my home network maintenance and processing tasks using a centralized server to do all of the work.
Basically, you install a UrBackup Server app onto your centralized server where you would like to store all of your backups. Then, you install the UrBackup Client software on all of the PCs in your house that you want to back up.
The nice thing about this solution is that it bypasses messy antivirus or firewall problems networking sharing often introduces, because once you enable the client software, the server software has full access to take backups.
windows backup utility
As you can see above, for each client, you tell the server software where to store the backups and at what frequency you want to take images.
On the client machine, you can either trigger manual backups by right clicking the UrBackups icon in the taskbar, or you can open up the client software to define the schedule for that client’s automated backups.
windows backup utility
You can schedule only a backup of files and specific folders, or if you prefer you can define an interval for incremental image backups. Make sure the “active” box is selected, or the Server schedule settings will be used instead.
windows backup utility
On the server, you can select between all of your clients by using the drop-down list at the top of the main screen.
windows 7 backup
In my opinion, UrBackup offers the nicest solution because you can set up, schedule, and organize all of your backup configurations and storage from one central location. Attack a massive drive to that server and you’ve got an awesome at-home backup solution for all of your home computers.
Do any of these Windows 7 backup solutions strike your interest? Do you know of any others that work well? Share your thoughts in the comments section below.....Thanks

September 3, 2012

Setup Your Own Personal Torrent Server

BitTorrent Icon
BitTorrent is a peer-to-peer or P2P file sharing protocol used for distributing large amounts of data over the Internet. BitTorrent is one of the most common protocols for transferring large files and it has been estimated that peer-to-peer networks collectively have accounted for roughly 43% to 70% of all Internet traffic.
As of January 2012, BitTorrent has 150 million active users according to BitTorrent, Inc.  At any given instant BitTorrent has, on average, more active users than YouTube and Facebook combined.
In our today's  article you will be able to setup a BitTorrent Server all by your self and it is very easy pictorial you can follow.

A BitTorrent server or in other word Torrent Tracker Server basically is an http-Server that collects all clients ip addresses into pools sorted by one of the request strings parameters and answers all other clients that specified this exact same parameter a list of all other recent clients.

The following is a list of notable software for running a BitTorrent tracker.
Tracker Programming Language License Operating System Support Description
MLDonkey OCaml GPL Cross-platform MLDonkey has a built in tracker and announce service.
MonoTorrent C# MIT Linux, Mac, Windows Uses Mono for cross-platform support (.NET)
Opentracker C Beerware FreeBSD, Linux, Mac, Solaris, Windows,… Uses libowfat,[4] performs well even on embedded hardware. Only requirement is a POSIX compliant OS.
PeerTracker PHP GPL Cross-platform Extremely lightweight and efficient BitTorrent tracker. Supports SQLite3, MySQL and soon PostgreSQL for storage.
PHPBTTracker PHP GPLv2 Cross-platform A simple BitTorrent tracker which supports tracking basic statistics. Supports MySQL backend database.
RivetTracker PHP GPLv2 Cross-platform Based on PHPBTTracker, it is a slightly more complicated but still simple to use BitTorrent tracker which supports tracking basic statistics. It has a more polished user interface than its predecessor which splits torrents up into pages and uses icons from the Tango Project. Supports MySQL backend database. Support for RSS 2.0 spec.
TBDev Tracker PHP GPLv2 Cross-platform A fully featured torrent tracker originally based on the final version of TorrentBits. The user interface is very polished, and is used by many private tracker sites.
μTorrent C++ Proprietary Freeware Mac (Intel only), Windows / Wine Does not have a web interface or list of hosted torrents; it is not designed for secure or large-scale application.
Vuze Java Disputed/GPL Linux, Mac, Windows Vuze (formerly Azureus) has a built in tracker.
XBT Tracker C++ GPL Linux and Windows Uses MySQL for data storage, lightweight tracker
Hefur C++ MIT Linux Standalone, no database required. Very simple to setup.


.torrent files require a tracker to keep track of who (peer clients) has which piece of a particular torrent file. Azureus is a popular Java-based BitTorrent client with an inbuilt tracker.
You will require the Azureus Vuze client. You can download it from http://azureus.sourceforge.net. If you don’t have the Java Development Kit, let Azureus download it for you. Azureus prevents basic users from creating a torrent tracker, so you’ll need to switch to the advanced user mode. Under View, select Advanced, and then in Mode, select Advance User proficiency.
For your torrent to work, you have to create a server (tracker). To do so, navigate to Tools > Options > tracker >Server. If you have a static IP, key it in. If you’re on a dynamic IP, things are a little more complicated—you will have to use Azureus along with dynamic DNS services such as DynDNS, Discoveryvip and No-IP; register with them free of cost to use them. Once that is done, key in the dynamic host name given to you during registration. You will also have to keep the dynamic DNS client running in the background while your tracker is up.
Azureus then automatically checks if the dynamic IP is being resolved or not. Enable the tracker using the checkbox, and let it use the default 6969 HTTP port. To let others host their own torrents using your tracker, turn on Enable External Torrents. You can even force these external torrents to use the default port by selecting the appropriate option. The tracker also lets you enable the UDP protocol, which will trouble your server less than HTTP, but you won’t be able to control clients’ download ratios—beware of leechers!
The Windows XP SP2 Firewall will require you to forward the ports used by Azureus. The simplest way to
do it is by adding an exception for Azureus in the firewall. Switch your Control Panel to Classic View and
open Windows Firewall. Under the Exception tab, select Add Program. Browse to the directory where Azureus is installed, select Azureus.exe, and apply the changes.
Creating The Torrent:
To create a torrent, use [Ctrl] + [N] or go to File > New Torrent. Make sure that “Azureus Embedded Tracker” is selected; you can also share a directory in accordance with your requirements. On the third page of the “Make a torrent” interface, don’t forget to check the option to open the torrent for seeding when done.  Azureus will then create the .torrent file in the directory selected.
Distributing The Torrent:
Completing all the above steps properly will make Azureus seed the file. Seed your file for a long time to prevent peers from being left with incomplete files. Finally, you can distribute the torrent to your friends using e-mail or IM. If you’re releasing your personal videos or an amateur film using torrents, don’t use your PC as a tracker—it won’t be able to handle the traffic. Instead, opt for an external tracker service or a server instead. So keep sharing and make the world free.

August 29, 2012

Most Dangerous Computer Virus Of All Time

In the grand view of human history, computers are a fairly recent development. Today they are everywhere, but only 50 years ago the idea of a computer in every home and in everyone’s hand was a thought found only in science fiction novels.

But just as regular viruses have been tormenting the human body since we climbed down from the trees, computer viruses have been around since the first lot of us plugged our PC’s in to the outlet. Now, there’s a whole host of computer viruses out there -- some bad, some really bad, and some not-so-bad. But the viruses below were the worst of the worst.


If you’ve seen the 1995 Angelina Jolie film Hackers, then you’re probably familiar with the computer virus depicted in the film, which is known as The Da Vinci Virus. The Da Vinci Virus was probably a thinly veiled allusion to a real life virus that ran amok a few years earlier in 1992, that was also named after a world famous artist/Ninja Turtle, Michelangelo.

Back in 1991, some computer technicians in New Zealand found a virus on a random computer. The virus they found was designed to attack all DOS-based computers, and it would make a computer seem like it had its hard drive erased, when, in actually, nothing had been erased at all. For the average computer user of the time, this problem was not easily rectified.

For a while, the virus laid dormant. Only a handful of computers were actually infected by it, so no one cared to fix the problem. It wasn’t a blip on anyone’s radar.

In January of 1992, a computer manufacturer accidentally shipped 500 home PC’s out to consumers that had been infected by the Michelangelo virus. Another company did the same thing, but with floppy disks and instead of just 500, they shipped out 900.

500 + 900 = 1,400 infected computers, give or take. So that doesn’t sound like a big deal, right? Right. Well, some “expert” at the Reuters news agency estimated that 25% of all Americas computers would be infected by the virus. Where they got this number is anyone’s guess, but it’s safe to say that this caused a bit of an uproar among personal computer users.

And then it came: On March 6th, 1992, the birthday of Michelangelo, the virus went live. It turned out that the virus was nearly as destructive as it was hyped to be, but caused a fair amount of chaos: 10,000 to 20,000 computers were infected and “lost” their data.
The creator of the virus was never found and Michelangelo is still floating around out there somewhere on the internet. It hasn’t been active since March 6th, 1992.


CIH


Unleashed from Taiwan in June of 1998, CIH one of the most dangerous and destructive viruses ever. The virus infected Windows 95, 98, and ME computers and it was able to remain in a PC's memory, where it would infect what’s called ”executables,” a command that performs a certain task according to the coding of the computer.

Unlike Michelangelo, when CIH said it was going to erase your hard drive, it wasn’t all show. It actually did it. And it did…to an incalculable amount of computers worldwide. It would even overwrite your BIOs, rendering our computer useless as it never booted up.

And the worst part is that since the virus attached itself to and attacked executable files (where are in every piece of software out there), it was shipped out on millions of software discs unknowingly, including the anticipated demo for a video game called Sin made by the company Activation.

As I said, the number of computers it damaged is innumerable, but it is estimated the amount of damaged it caused cost between 20 and 80 million dollars.

The creator of the virus was a college student Tatung University in Taipei named Chen Ing Hau (CIH). When he created the virus, his university reprimanded him, but not harshly. Later, Chen discovered that the virus had somehow escaped his reach and had become prevalent. He confessed to creating the virus and apologized to the millions of Chinese citizens that were affected by it. He was never prosecuted because at the time, there were no laws in the Taiwanese constitution regarding computer viruses.

Love Bug


In 200, computer users received e-mails with the subject line “ILOVEYOU.” If one were to open this e-mail and download its attachment, out would spring a virus that would automatically e-mail itself to everyone on your contacts list. Also, once it was opened, it would send your e-mail address and password to its original authors.

And who were the original authors? Two men from the Philippines named Onel de Guzman and Reomel Ramones. And just as it happened with Chen Ing Hau with the CIH virus, so too happened with Onel and Reomel: There were no cyber crime laws in the Philippines, so they got off Scott-free.  In fact, Onel was offered several computer programming jobs as a result.

Code Red


Code Red was a computer worm that was let loose on network servers on July 13, 2001. It was a particularly nasty bug because of its target: Computers running Microsoft  Internet Information Server Web server. The worm was able to exploit a specific vulnerability in the server operating system. Ironically, Microsoft had released a patch addressing this problem a month before.

Code Red was designed for maximum damage. Upon infection, the Web site controlled by the affected server would display the message, "Hacked By Chinese!" Then the virus would look for other vulnerable servers and infect them. This would go on for approximately 20 days, and then it would launch denial of service attacks on certain IP addresses, including the White House Web server. In less than a week, this virus infected almost 400,000 servers, and it's estimated that one million total computers were infected. It also infected a number of websites that ran off of Microsoft servers, including AT&T, Hotmail, and the website for Federal Express.

Lastly but not least:

Conficker

Conficker, also known as Downadup or Kido, is the latest super virus to spread around the Internet and has security experts in a panic. When last we checked, about a week ago, Conficker had already spread to 9 million PCs, with little sign of slowing. Now it has infected at least 10 million PCs and experts believe there may be up to 350 million vulnerable computers out there.

The worm isn't just exploiting a networking hole, however; it features a sophisticated method of cracking administrator passwords, making it difficult to remove, and also copies itself to USB drives so that it can spread even when the online flaw is plugged.

So far this schizophrenic virus hasn't caused any serious damage. Its primary effect has been to prevent people from installing Windows updates and anti-virus software that could potentially thwart the malware. What worries security experts, though, is Conficker's ability to launch a second stage, downloading additional code that could hijack computers completely, steal personal information, or commit basic extortion -- demanding money for fake anti-virus software claiming to remove the infection.

Since it is currently sitting dormant, possibly awaiting further instructions, Conficker is very difficult to detect without running an up-to-date virus and malware scanner. However, if your Internet connection is running abnormally slowly, if services such as Windows Defender is disabled, or if you are unable to access some security-related Web sites (like those for anti-virus programs), then you may be infected and should certainly follow the removal directions included below.

Conficker has certainly spread far and wide, and gathered its fair share of media attention, but is it the biggest virus ever? That remains to be seen. It is certainly the biggest threat to personal computer security to come along in the last few years and would easily claim a spot on the list.