The Many Advantages of Using a Firewall

by : Anthony Daniel

It is owing to these benefits of using Internet that has made the medium so popular. But every opportunity presents benefits as well as challenges and exchanging information over the Internet is no exception to this rule of thumb. There is no dearth of anti-social elements that are always on the lookout of opportunities to gain access to an organization's critical data. Such information, if leaked can hurt the interests of the organization as well as the stakeholders, putting the survival of the company at stake. In order to counter this problem service providers advise their clients to get a network firewall installed.  

Firewall defined

Firewall is a network security system which controls and regulates the incoming and outgoing network traffic.  It creates a barrier between the Intranet and the external network, generally the Internet which is not considered to be a secure connection. Firewalls use a set of pre-defined rules. Data which enters the system has to fulfil these rules to move further. Firewalls have evolved over the years owing to the detailed research and development that organizations have been conducting. Getting these new and improved systems installed has therefore enabled businesses in meeting the various threats posed by exposure to external elements.

The many ways in which firewalls perform these important functions are:

•    Traffic monitoring: Firewalls evaluate the traffic entering the network's systems by checking the packets which carry information. This ensures that malicious data does not gain access to your system. A two-way firewall even keeps a check on the traffic exiting the system, thus lowering the chances of malwares being transferred through your system.

•    Trojans blocking: Trojans are a type of computer virus. These malwares attach themselves to the computer files and travel to the destinations where these files are being transferred thus causing widespread damage. Trojans are classified as some of the most potent viruses and can uncover organization specific data to the web server, thus compromising the confidentiality of such critical information. Moreover, the fact that these viruses work silently makes them more lethal. Firewalls block these viruses from the onset, thus protect the system against potential damage.

•    Prevents Preventing hackers from gaining access to the system: Getting a firewall installed helps in securing the system against attacks from hackers. In the absence of such security measures, a hacker would easily gain access to the system and can make it a part of a botnet, which is the term used to define a large group of computers which is used to conduct illegal activities like spreading viruses.  This can mean serious legal ramifications for the owner.

•    Thwarts key logging attempts: Getting a potent firewall installed wards off key loggers, which are spywares that hackers put on the system in order to copy the various keystrokes. This enables the hacker in duplicating whatever is being typed. This is a dangerous situation and can make it possible for hackers to gain access to online accounts.

•    Provides statistics on network use: A firewall can scan all the accesses, in case they pass through the firewall. Most firewalls are also equipped with alarms which go-off in event of a suspicious activity. Moreover, such firewalls are capable enough of picking up signs of external attack and subsequently warning the owner. Data collected on network usage that is by scanning the accesses helps in evaluating the potency of the firewall. This also gives a clear picture regarding the shortcomings that the firewall is suffering from. Owners can study this data in order to tweak the system and equip it with extra features, if necessary. They, for example can introduce more controls in case the current ones are inadequate.

•    Enforcement of rules: A firewall as mentioned above follows set of pre-defined rules. In the absence of a firewall the system will be devoid of such rules and access policies will depend entirely on the cooperation of users who can tweak them to their advantage.

These are some of the many benefits of using a firewall system. Every business should get one installed owing to its bundle of advantages. This would help the business in safeguarding its interests and also protect the system against unwarranted external attacks.

Why is Norton Technical Support so popular?

by : Hardvine Mark

Norton Technical Support is important

Norton antivirus happens to be among the most believed antivirus software and is made use of by millions throughout the world. Thus there has been a rise in popularity of Norton technical with passing years. There happen to be numerous people having the delusion that technical assistance for Norton is simply wastage of money. They just do not consider that any person could ever have need of any form of assistance while making use of Norton software. However that is not the fact. There are more than a few problems which user could face while using this software.  

As an instance, while setting up the Norton antivirus an user could face difficulties like failure to set up the software, PC getting hanged right on installation, additional programs going wrong following installation, PC booting & rebooting automatically and more. Such problems usually occur from configuration difficulties, compatibility matters and erroneous installation. Through such times users not having an excellent about the functioning of PC and its different software will be unsuccessful in sorting out the problem. Thus for all such people who are not well-versed with the interior mechanisms of a PC, the Norton tech support comes as a benefit.

How to get Norton Support

Such services are provided by quite a few companies in USA and UK. The procedure of how to contact Norton support is to give them a call and notify them on the problems you are having with the software. Norton technical support specialists are able to be contacted at toll free numbers which are given on the certified websites of companies. You can get such companies by making an online search by using keywords like Norton technical support, How to install Norton antivirus, How to install Norton 360, antivirus technological support and more. Likewise those who want to know how to activate McAfee antivirus/ How to install McAfee retail card can contact McAfee Support.

The callers nevertheless necessitate a stable internet/web connection along with a telephone line for facilitating the resolution of any problem. Though the services are chargeable the sum charged is pretty cost effective if weighed against the rate of calling up a technician for personally reaching the site and looking up the problem. In addition the technician will take much more time in reaching the site and proceeding with the fixes and these causes must wastage of time. How To Activate Norton? LinkenTech provides best online tech support and help for antivirus, Norton antivirus contact number. We Install and Activate Norton 360 Antivirus! LinkenTech Support Services LLC delivers online technology support services to home PC users and Business across USA, UK, CA and AU. 

AVG Antivirus Offers Highest Security against Virtual Threats

by : Techcillin

Rootkit malware are one of the most dangerous kinds in the internet. The basic purpose of the rootkit application is to infect and get control of the user's computer so an un-authorized person can get administrative access to it. This allows an un-authorized person to get access to the confidential and vital data and information. The rootkit malware hides itself as a normal looking application between the programs and processes of the computer. Due to this, it appears as one of the safe to use normal program, process or Code etc.  

The rootkit malware acts in stealth way and slowly becomes the part of the system it infects. Because of its sophisticated nature, the rootkit becomes difficult to detect and uproot the same. In addition, the rootkit file can also make changes in the existing applications and software's that are installed to detect and remove the rootkits. To understand this better just imagine someone else in control of the sensitive and personal information without you knowing anything about it.

The rootkit mostly collects the private and confidential information and data and sends it via user's internet connection to its distributor or creator. If such crucial information gets in wrong hands, the victim can come under fire of various types of abuse and misuse. Many People worldwide face common crisis about loss or theft of their identity, loss of business information, financial information etc. to deal with such crisis effective and solid antivirus security software is crucial. There are many antivirus security products in the market yet very few manage to deliver comprehensive protection to the users against different types of threats. 

AVG Antivirus  is one of the most trusted names in the cyber security industry, the company offers various products based on the need of security by the user. There are several products offered by the company such as mobile security, internet security, antivirus, mobile back up, anti-phishing tools, android security, parental control and identity protection etc.

The company has its offices in different locations such as Europe, North America, Canada and Australia. AVG Antivirus has many competitors it has left behind; these competitors have well-known antivirus programs such as Avira, Avast, Panda Security, Sophos, Kaspersky, McAfee, F-Secure and Symantec etc. The AVG Antivirus Software is famous for its reliable, non-stop, robust performance in protecting the user's computer systems, crucial information and data.

The antivirus software is user-friendly and easy to install also it has an effective performance delivery. The antivirus security software made by the company is effective and performs well against threats like worm, malware, Trojan horse, virus,adware, rootkits, spam, spyware, phishing and other internet based threats. Regular updates received by the antivirus software keeps it effective, robust against advanced new, and existing threats and helps the users get optimal performance from their computer. AVG antivirus a known brand name in information security continues to give strong, robust and effective protection its licensed users. The company has carefully designed its new antivirus software with integration of new state of the art technology providing competent and robust protection against many internet-based threats including malware.

If you are facing any situation with normal working of the antivirus software then contact Techcillin at AVG Tech Support.

Techcillin provides specialized and technical support to its clients at competitive rate, the technical support services for AVG antivirus are available 24/7 via internet and on phone. Those facing technical problems benefit from the latest and reliable AVG Tech Support.


Essential Windows Shortcuts that You Should Know

by : Brook M. Perry

You might have been working with Microsoft Windows from a long time, but it is possible that you are still not aware of Windows Shortcuts. If you know about the shortcuts then, it becomes easier for you to work with it. The article discusses the benefits of these shortcuts offered to Windows users.

Like other operating systems, Windows OS also offers its set of keyboard shortcuts. The shortcuts make it easier to work with and help you become more productive. It is all about being able to work around with the keyboard to increase your productivity and cut on time using the mouse click. It becomes easier once you know Windows shortcuts that are easy to apply.

Using Control functionality

Most of you might be familiar with the functionality of Ctrl key in the keyboard. However, if you are still not using it then it is difficult to work on Microsoft Word. Using the Ctrl +Z helps you in undo functionality. This comes handy for immediately reverting back to your previous text or last change made in your document. Another shortcut using the Ctrl key is Ctrl + Y that will redo anything.

Control panel and System Options

Control Panel is the best system tool that helps you make a lot of changes. For example, you can use the Control Panel for accessing your Windows directly. If you are using Windows 8 system then, you can use the Win + X and select System option. To access System details use Win + Pause/ Break keys on your keyboard.

Offline content

At times, you want to save a page for offline view or quickly capture the screen for keeping its copy. The key relevant to it is Print Screen, press this key and you will capture the screen shot. However, if you want to do it quickly using an alternate version then press the Alt + Print Screen keys simultaneously. It will capture the active window, and you will not need to make any editing to the current screen captured.

Windows Explorer

Windows Explorer is the best utility that is provided to Windows users. It helps access the file menu easily and provides information about each drive and folder. You can access it from the Start menu or by double click on the icon of My Computer. However, an alternate method, to access the utility, is to press Win + E keys that will immediately launch it.

Creating folder

The easiest way, to create a folder in the Windows Explorer, is to use the right-click and choose the option of New-> Folder. Another way of launching or creating a new folder is to simultaneously pressing Ctrl + Shift + N.

Shutting down PC

You can shut down your Windows PC in few ways. If you are running Windows 8 or Windows 8.1 then press Alt + F4 function key to shut down.
If you are using an advanced Window version like Windows 10, then you can press the Win and then the arrow key + Enter key to shut it down. It will help you shut down your PC without choosing any other option.

Snap screen

Those who are using large computer screen can snap the programs into two different window panes. It prevents you from quitting one program or application to work on another. Using your mouse for snap screen is the easiest way. However, there is dedicated keyboard shortcut for this process, use Win + Arrow keys. The direction of arrow keys you are using will snap the windows accordingly.

Switching programs

Switching between two programs or windows is easier when you know the keyboard shortcuts. Use the Alt + Tab keys to quickly move between multiple programs or windows. Alternatively, you can use the Win + Tab keys for the same functionality.

There are many shortcuts that you can apply using the keyboard. However, the above mentioned are just a handful and essential shortcuts that you should know. Microsoft Windows offers you with a variety of shortcuts to work with to make things easier and for increasing productivity. If you know about it all then, you become a master at using the keyboard. Nonetheless, for any average user it is essential that they remember essential shortcuts and apply them.

How to open Command Prompt in full screen mode on Windows 10

by : Sunita Kumari

You have might have been fascinated with Command Prompt if you are windows user.   Microsoft introduces the Command Prompt with very improved features on Windows 10. and you can again open the Command Prompt in full-screen mode like in its earlier versions.

If you are trying to open the command prompt in full screen mode at your desktop and encountering some problems then you can follow us through this article. We are elaborating here few steps to overcome the above issue.

Copy the given steps one by one:

Access the command prompt.

1. Navigate to launch a new Command Prompt window. To open it, press Windows button with R key and write the text cmd in the Run dialog box followed by OK.

Start Download 1. Click To Begin 2. Download App 3. Increase Download Speed & Enjoy!
You have might have been fascinated with Command Prompt if you are windows user.   Microsoft introduces the Command Prompt with very improved features on Windows 10. and you can again open the Command Prompt in full-screen mode like in its earlier versions.
If you are trying to open the command prompt in full screen mode at your desktop and encountering some problems then you can follow us through this article. We are elaborating here few steps to overcome the above issue.
Copy the given steps one by one:
Access the command prompt.
1. Navigate to launch a new Command Prompt window. To open it, press Windows button with R key and write the text cmd in the Run dialog box followed by OK.

You can also open it by shortcut key. Press Windows button with X key ( the Power user) together and choose Command Prompt option.

Open Command Prompt in full-screen mode using Keyboard shortcut:

2. Press Alt button and Enter key together when command prompt outsets.

3. Then you will see the command prompt in full screen mode on your desktop. Again, press Alt+Enter buttons together to switch back in the windowed mode.

You are also eligible to try this trick with an elevated command prompt. Again, launch a new elevated instance of cmd.exe and then tap on Alt+Enter keys. That's it.

Hope, you will really enjoy this trick to open the command prompt in full window mode on Windows 10.

After the launching of "Windows 10 Technical Preview" Microsoft done a fantastic work by upgrading its Command Prompt to a new level. Command prompt became more useful and user-friendly.  Use of command prompt became outdated because of its non user-friendly environment and complicated commands but, after upgradation it will become useful.  It's version is now upgraded to 6.4.9841. New version of Command prompt comes with a proper text selection, edition, shortcut keys, control keys and generally used copy and paste functions. You can also resize the window of command prompt according to your requirement.

Some Keys for Command Prompt on Windows 10

Selection Keys

Selection Key Combination         Description

SHIFT + LEFT ARROW                    It is used to Moves the cursor to the left characters,
                                                     you can also extend selections by continue pressing
                                                     SHIFT key and right arrow.

SHIFT + RIGHT ARROW                  It is used to Moves the cursor to the right characters,
                                                     you can also extend selections by continue pressing
                                                     SHIFT key and right arrow.

SHIFT + UP ARROW                       It is used to Selects text up line by line starting from
                                                     the location of the insertion point.


A Complete Guide to How System Restore Works in Windows OS

by : Polly M Quinton

Undoubtedly, restoring your PC can help you in troubleshooting a lot of Microsoft Windows issues, but it is essential to learn how to use it efficiently. If a wrong PC action or installation of a faulty Microsoft update is interrupting your smooth PC experience, then read this guide to know how the utility works in Windows OS.

System Restore is one of the best utilities that can help you run your Microsoft Windows-powered computers with great efficiency and performance. The feature can easily fix some crashes and other computer problems that might want you to suffer from unresponsive PC, frequent hangs, no boot issues and other tech problems. It is true that the utility can't solve every PC problem, but you can use it rightfully to restore your personal files, folders, and settings to enjoy a seamless computing experience. It is one of the best tools that you can use when your computer isn't working properly or is facing a serious tech problem after installing the software or Windows update. System restore in Windows 7 also helps to ensure great compatibility and smooth PC functions by recovering and restoring files that get deleted or modified accidentally.

What are Restore Points?

By default, Microsoft Windows are commanded to create restore points automatically once per week to ensure that you never suffer downtime if something goes wrong. The Windows OS creates restore points before major system event like installing a program, installing Windows updates, updating device driver, deleting files or uninstalling certain software. Additionally, it is a surprising thing that the OS creates a restore point even before you restore a faulty PC to assure that you can undo the restore operation. Restore points are nothing but the snapshots of Windows program files, system files, and registry settings that allow you to restore your device back to a normal working state. It is important to remember this utility won't restore your personal files, documents, images, music, or others so store them either on cloud platforms or an external hard disk drive.

How System Restore Can Troubleshoot Faulty PCs?

Whenever, your PC encounters some serious tech problems or become unresponsive, tech experts might recommend restoring your system to an earlier state. The entire process includes selecting a restore point and waiting till the feature restores system files, program files, and registry settings. The utility is capable of restoring your PC settings, system files, and installed programs to a previous state, where the computer was working fine.
The system restoring feature becomes extremely useful, when an unexpected problem occurs, or you don't know the prime reason behind the tech issue. Whenever you install a Windows update, it allows your operating system to complete desired functions with great performance and efficiency, but installing faulty Microsoft updates can ruin your entire computing experience. You might want to uninstall that update, but it may not uninstall properly and cause serious damage to program or system files. The feature that can set your device back into a normal working state can be extremely helpful while fighting with such errors, tech problems, and other PC issues.

Some Potential Problems You Might Face While Using the Utility

Utility Can't Replace Files – The feature operates on critical system files, and sometimes it can't replace the system or program files while the PC is running. You can try running the utility in Safe Mode, but always remember that running restore activities in the Safe Mode prevents you from reversing the restore process.

Restore Points Contain Damaged Files — Always select a restore point that records back to the time before the problem started occurring. Restore points recorded after the problem occurrence might contain the corrupted files and won't fix your problem.

No Restore Points Help – If system restore in Windows 7 can't fix your problem, then try booting your PC from a Windows 7 disc and use the system repair options to restore a full backup. You can also perform the complete reinstall of Windows if nothing else helps.

Microsoft Windows is prone to numerous virtual threats and infections, so managing the complete device's security should be the prime concern of all the users. If you think that your device encounters a lot of system related issues, specifically after a major system event, then use the restoring utility to set back your PC into an earlier state. Device restore feature operates automatically in the background, but it is recommended to create the restore points manually before making any changes to your PC. The utility isn't a cure-all feature, but it can help you fix some major system related problems to reduce the computer downtime and ensure optimal efficiency!


Some Computer Maintenance Tips to Upkeep PC Security

by : Polly M Quinton

With the ever-increasing cyber crime cases, managing PC security and privacy is a huge challenge. Installing a robust antivirus isn't enough to safeguard your crucial files, data, information and other details from prying eyes. Go through the article to learn some important computer maintenance tips that can help you avoid computer hardware damages and security flaws.

Most tech geeks claim that following some basic factors to ensure complete security of your computers, networks, and user accounts isn't enough avoid greater threats. Viruses, malware, Trojans, worms, rootkits and other malicious codes may make numerous attempts to enter into your device and damage PC components to an irreparable extent. Sometimes, you might feel dishearten when you observe that your device gets hacked or attacked by a serious malware, even after installing the best antivirus solution. Have you ever thought that why it is happening? What are the security loopholes that allow such infections to enter your device? Are you aware of the PC guru tips on how to clean a computer? If no, then you must be one of those PC users who think that installing antivirus or antispyware is enough to manage the security of their devices.

If you want to adopt some expert tips to manage your device's security, then simply practice some of the following tips:

1.       Back Up Your Data
Backing up your files is one of the most essential and crucial maintenance tips that help you to stay protected against the dangerous results of computer infections. Backing up your sensitive, and crucial files regularly will defend you in the event of a computer crash or electrical surge. The practice doesn't let you lose any of the important projects and files, even if the PC denies to respond or boot due to a serious virus attack. You can also avoid some of the major computer hardware damages and also thus fight against leading threats by encrypting and backing up your sensitive data. Transfer your important documents to an external hard disk drive or you can also use online cloud storage platforms to store your data and access it anytime, anywhere.

2.       Check Your Firewall
Checking your security firewall doesn't seem helpful to an average user, but a PC guru always recommends doing that to ensure optimal safety of the device. Windows-based users can simply go to Control Panel >  type ‘firewall' in the search box to check whether their firewall is ‘on' or ‘connected' to ensure complete safety of their device. Mac PC users can click the Apple icon, go to System Preferences > Security > Firewall, to keep cyber criminals out of their device's environment. Additionally, you can also disable file and media sharing in case you don't want to make your files visible to other users or machines.

3.       Never Access Rogue Websites
Spotting, judging or controlling a rogue website can be difficult, but there are some features that can help you check the trust factor and reliability of the website. A green lock in the address bar, the ‘https://' code prefix at the beginning of the URL and professional looking websites are ideal for banking, accessing emails or doing shopping online. Innocent users will have to pay extra attention while shopping through an online website, shipping items from overseas, and while dealing with emails that carry web links.

4.       Avoid Lucrative Deals That are too Good to be True
Who doesn't like discounts and offer? But unrealistic offers and lucrative deals can be hacker's trick to fetch sensitive information and other details from innocent users. Deals offering 20% or 30% off on off-season items can be true, but 90% off on "The Beatles Collection" CD is a complete knock off. Users should avoid such deals and offers that promise fake discounts as they can be potential malware that can damage your computer hardware or software components. Additionally, avoid clicking the link, tabs and deals you've availed along with applying some computer maintenance tips to avoid data or financial loss.

5.       Never Provide Sensitive Information
One of the best features of PC maintenance strategies is to block malicious and illegitimate websites by setting up strong parental control. Cyber world may ask for your personal or sensitive information to plan some major frauds in the future, but you've to be extra careful while revealing the information on online platforms. PC guru recommends not revealing your social security number (SSN), address and contact details, or credit card information unless you find a website reliable.

Managing PC security is something that you've been dealing with for quite a long time, but malware authors will make numerous attempts to break the security walls. Most of the advanced antivirus, antispyware and antimalware solutions block and restrict the entry of such threats, but the protection isn't full-proof. It is beneficial to keep your antivirus updated and create strong passwords for your user accounts and online accounts to add extra security layer. You should also try changing your passwords on a regular basis to make your online experience truly secure and enhance your device as well as network security. You might observe that some of the websites lure customers with some amazing deals and offers to trace down your credit card information, personal details and other sensitive information. Additionally, you can avoid opening unknown emails to ensure complete safety and security of your computers, networks, user accounts and servers!


How to Make a Bootable Antivirus Cd

by Matthew Rizos 

How to Make a Bootable Antivirus Disc

Purpose of this document.
This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step.  

Why Bootable Antivirus?
In a bootable environment we are running a stripped down version of windows in a ram disk (programs are loaded directly into ram), thus the hard drive on the PC is treated as attached storage (like a flash drive). In this state malware (malware consists of viruses, trojans, spyware, adware, rootkits, etc) is helpless and totally at your mercy. This is the best free way to remove any piece of malware with a 100% success rate.

Please follow all the steps below:

1. Go to

2. Select a mirror with a green status. (like "Mirror#3" for example)

3. When you click on the mirror it will take you to another site where the download will be available.

4. Click the download link for Ultimate Boot CD and save the download to wherever you download stuff.

5. Once the installer has been downloaded double click it.

6. Choose your language

7. Click next about 3 more times and select the file path where you would like to install ultimate boot cd 4 win. Please note that you should have a drive with at least 5-10 gb of free space to allow for future plugin growth. I will choose C:UBCD4Win. The install should take a few minutes.

8. Click Yes to the MD5 Hash Check. The install will continue once the hash check succeeds.

9. Click Yes to see if a patch file exists.

10. Click the checkbox to launch ubcd4winbuilder.exe.

11. Click the "i agree" button.

12. Click "NO" to searching for windows files.

13. Obtain a windows xp operating system disc w/SP2.

14. Explore the disc and copy the entire content (all the folders and files on the windows xp cd) to any location on your computer. You should allocate at least 700 MB of free space for the windows xp disc.

15. Open UBCD4win (if it's not already open). Click Source browse button (3 dots ...) and browse to your i386 folder. My path was C:WindowsXPcd for example.

16. Next go to the media output section and choose a spot for your ISO image to be created. This ISO can be burned with almost any burning software. Once the ISO is burned it will be bootable.

17. Next, click the plugins button. Don't be too overwhelmed here, actually you should be very happy! Look at all those plugins!

18. Now it's time to update our anti-malware software packages.

19. The first one I have on my list is a-squared free anti-spyware. Click that line and then click the config button. A command prompt will automatically open and start downloading the latest updates for that program...totally awesome, isn't it!

20. So, now you need to update all the anti-malware programs in our plugin list. Click each one and then hit the config button.

21. After you're done configing/updating your plugins click the close button.

22. Next, click Build.

23. Click yes to create a directory and then click i agree.

24. At this point your ISO is created and is ready to be burned.

This concludes the How to Make a Bootable Antivirus CD tutorial.

Types of Computer Hardware

by Isabella Rodrigues

Computer hardware is a physical part of a computer that executes within the hardware. It is unlike computer software or data that can be frequently changed, modified or erased on a computer. Computer hardware is not frequently changed and so is stored in hardware devices such as read only memory (ROM) where it is not readily changed.  

Most computer hardware is embedded and so is not visible to normal users. Below are the different types of hardware's found in a computer.

Ø Motherboard: It is the central or primary circuit board making up a complex electronic system such as a computer. A motherboard is also known as a main board, logic board or system board.

Ø Central processing Unit: A CPU is the main component of a digital computer that interprets instructions and process data in computer programs.

Ø Random Access Memory: A RAM allows the stored data to be accessed in any order. RAM is considered as the main memory of the computer where the working area is used for displaying and manipulating data.

Ø Basic Input Output System: BIOS prepares the software programs to load, execute and control the computer.

Ø Power Supply: Power Supply supplies electrical energy to an output load or group of loads.

Ø Video Display Controller: It converts the logical representation of visual information into a signal that can be used as input for a display medium.

Ø Computer Bus: It is used to transfer data or power between computer components inside a computer or between computers.

Ø CD-ROM drive: It contains data accessible by a computer

Ø Floppy disk: It is a data storage device

Ø Zip Drive: It is a medium capacity removable disk storage system.

Ø Hard Disk: It is a non-volatile data storage system that stores data on a magnetic surface layered unto hard disk platters.