We all have gone computer savvy these days. Almost everybody is using technology to communicate with our friends. On many occasions you receive mails saying that you have won a lottery of 1 billion pounds. Actually they are junk mails which intend to take out specific information from your machine. Once you click them they will enter your database and memory to collect all the important information. The most common way is using a mail. But the mail have the drawback that they carry many viruses with the original data too. The internet is flooded with Trojans and viruses. One way to be safe from all this is to use a personal firewall. But the drawback with firewall is that it will sometimes reject genuine and important information too. The best way is to use an Anti Virus which can prevent all types of threats arising from the internet. There are several popular anti viruses available in the market.

These antivirus keep our machine safe from all types of Trojan attacks. Usually these Trojans attach our database and corrupt them. There are many antivirus which can multiply too with other viruses. A database contains some informative data with its own unique structural architecture. It has systematic tables with the logical and physical structure of data, a configuration file which has different values associated with the database. In addition to this a recovery log is also present which keeps a track of the records. It also tracks the ongoing transactions which can be afterwards compressed. Databases can be local or remote. Remote Database is related to communicating database operations and parameters from the client machine to the server machine. So, we can safeguard our personal computer from all different external threats including unprecedented hacks or system attacks. Some of the popular antivirus are Quick Heal, Kaspersky and Norton.