Benefits of Solid State Drive over Hard Disk Drive

A SSD and a HDD are both types of Hard Drives. An SSD is a newer, more advanced Hard Drive that doesn’t include moving parts. The standard Hard Drive was first introduced by IBM in 1956 which is a long time. An SSD lasts longer then the standard Hard Drive making it more expensive then a HDD. The form factor is the same and most new computers come with a SSD.

A SSD allows quicker boot up times and quicker access to other data on the Hard Drive since it stores data on microchips. Since a Solid State Drive doesn’t have any moving parts it also has a better chance of not breaking if dropped accidentally. If you are looking to replace or update your hard drive an SSD is the better choice. The only real benefit of a standard Hard Drive is the price making it the cheaper option.


iPhone x review

Apple has released another iPhone named the iPhone X. It has stainless steel boarders with an all glass design. It is being called the best iPhone yet. The name comes from 2017 being the 10th year that the first iPhone was released. It is also referred to as the iPhone 10. It is unclear if Apple is going to be releasing an iPhone 9. Windows jumped from Windows 8 to 10 so it’s possible that Apple will do the same. Below are the specifications and features that are presented with the iPhone X.

Physical specifications

Height 5.65 inches

Width 2.79 inches

Depth 0.30 inch

Weight 6.14 ounces(174 grams)

Face ID

This is the first time face ID is being introduced. It uses your face to unlock the phone replacing the home button. That means no more fingerprint scanner. Some people may not be a fan of this, however this is the route that Apple has taken. Face ID technology can detect your face in the dark, without or without glasses, or if you just got a haircut. Your face needs to be in front of the camera so nobody can unlock your phone by pointing it at you or if your face is at a side angle.

Animoji system

The new animoji feature uses the face ID facial recognition system to create 3D animated facial expressions with voices using faces like an alien head, a chicken head, and alot of others. You can share with other users using Apple’s messages app. Anybody with iOS 11 can receive and view emojis but you need the new face ID system which is only on the iPhone X for now. The Animoji system uses the true depth front facing camera system and the neural engine built into the A11 bionic chip to capture and anylize more then 50 different muscle movements.


The screen is completely bezel-less since the home button has been replaced. The screen is a 5.8 inch OLED multi-touch display with a resolution of 2436 x 1125 resulting an a astounding 458 ppi pixel density. The display is being called super retina. This is the first time OLED has been introduced. OLED screen display darker blacks and more contrast. Since it uses darker colors OLED screens save battery life. They are very efficient but difficult to manufacture which could limit iPhone X availability. True tone is built in which ajusts the color to the ambient light around you.


Not much has changed in terms of audio. Just like with the iPhone 7 and 8, there is no headphone jack. Headphones or other audio sources can be used using a lightning adapter.


  • Rear facing cameras

Wide angle and telephoto cameras. 12 mp, optical zoom, digital zoom up to 10x. Has portrait mode which first appeared on the iPhone 7 plus and iPhone 8 plus.

  • Front facing camera

7 mp true depth camera, also has portrait mode. Only camera with true depth system which is needed to create and share Animojis.


Lasts up to 2 hours longer then the iPhone 7 and 8. The talk time is up to 21 hours, internet up to 12 hours, video up to 13 hours, and audio playback up to 60 hours.


The iPhone X Uses a A11 bionic chip which is 70 percent faster than the A10 fusion in the iPhone 7 and 7 plus. It has 6 cores, 2 high performance and 4 efficiency cores to save battery during lower intensity tasks. The processor is nearly as powerfull as an Intel processor in one of the 2017 Mac book pro which is pretty impressive.


The iPhone X uses a 3 core GPU which is 30 percent faster then the gpu in the iPhone 7. It is the first GPU designed by Apple instead of imagination technologies on previous iPhones. It is being called the neural engine which is used for specific machine learning algorithms, Face ID, and the Animoji system. Machine learning is a branch of AI that deals with creating algorithms that can “learn” from data, as aposed to being strictly programmed on where to look for it.


Since the home button has been replaced you can no longer access siri using a home button. However it is still very simple to summon the AI. The power button on the side of the phone can be pressed down for 3 seconds or you can use your voice by simply saying “hey siri”.


The iPhone X is the most expensive iPhone yet priced at $1,000 upon release. It comes in ether silver or space grey. Unfortunately there is no gold.

So if your a fan of Apple and their line of smartphones then the iPhone x is a worth while purchase to most. The price tag is the most expensive, however with the new improvements and features it seems that the price tag is deemed worthy.

Different types of malware and the purposes they are used for

A computer should always be running in top condition. Over time, memory (hard drive) usage may impact a computers speed. Otherwise a well taken care of computer should stay in good shape. However, a computer infected with any type of malware can impact the performance of a computer, in some cases making it unusable. The underlying goal of malware and why it’s created is for stealing information and mostly profit (stealing money).

This section describes different types of malware, why it exists, and where it comes from so you can understand it and have a better idea on how to keep your computer safe. All malware can generally spread the same way. Infected websites, spam email, infected programs the user downloads, and a weak or no firewall. Smartphones can be infected with malware although it is less common.


Any type of software that is harmful to your computer. Obtained by downloading files/programs that seem harmless, opening or following through with spam email instructions, or visiting bad websites. Every definition in the list below is malware. A virus, worm, and trojan are all different types of malware even though a virus is often used to describe other types of malware which is technically incorrect.


A computer virus is attached to a .exe file and is only ran while the infected file/program is running. A virus can run in the background remaining undetected if the user does not know how to check processes. A virus requires a user to run an infected .exe file to spread and infect other programs and computers while a worm can spread by itself. The payload of a virus can range from displaying messages on your screen to deleting critical files as well as infecting the computer with other malware. A virus can be obtained by visiting websites infected with malware. Android uses .apk files for apps so technically viruses do not exist on android but other types of malware do.


Unlike a computer virus, worms can spread by themselves without running a .exe file. A worm can infect your email contacts and send copies of itself to other networks and computers. A strong firewall is important to prevent worms along with other security measures.


Usually hidden inside of a download, email, or an infected website (drive by download) that seems harmless. A trojan can create a back door. Allowing the trojan to gain remote access to the computer. Unlike a virus or worm, a trojan does not copy itself or spread. A trojan can drastically slow down a computer due to processor and network usage. A trojan can also be used to infect a computer with other types of malware such as a keylogger, or turn the computer into a bot for ddos attacks.


Ransomware is malware that encrypts (locks) files on a computer (or sometimes the entire hard drive) and will only decrypt them or not publish them if the user pays the demanded amount of money. Some ransomware can be reversed if it’s not that advanced and most likely created by a script kitty which is a term for a amateur cyber criminal. Otherwise, serious ransomware will encrypt the files making it highly difficult to reverse. This is why it is always important to back up important information such as pictures, files, videos, and whatever else that has high value. The use of ransomware has grown between the years of 2012 and 2014. Ransomware is usually a trojan disguised as a safe file.


A bot is a computer that has been compromised by a hacker or malware and is used to send out email spam or a ddos attack and is usually controlled remotely. When multiple computers are compromised and used for malicious purposes, it is then called a botnet. People may be unaware that they have a compromised computer.


A malicious program that is used to record what the user types. It is often used to crack passwords and other information such as bank or credit card information.


Malware used to monitor web browsing habits such as what websites the user visits and what they search for. Spyware can collect information without you knowing and then sell it to other company’s. Spyware does not spread like a virus. It is installed by exploiting security holes and can also be hidden inside of programs and files.


Adware is malware that places unwanted ads and pop ups on your computer while your on or offline. Adware can track a users internet activity and record information without the user knowing. The data that is collected is usually sold to third party’s. If you are infected with adware then you might notice unfamiliar toolbars in your browser. You may also be redirected to ad pages when using your browser. Alot of free software contains adware so be cautious when downloading programs.


A rootkit is a malware program that can modify the operating systems and programs. It is designed to hide software. It can be hard to detect and sometimes very complicated or nearly impossible to remove.


A bootkit is similar to a rootkit. Bootkit are also hard to detect and remove. A security exploit in Windows allows the bootkit to infect and hide itself in the master boot record or the volume boot record. Anti virus may not detect a bootkit because the bootkit is not located in the regular files where the anti virus scans.