<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Techbmc.com</title>
    <description>The latest articles on DEV Community by Techbmc.com (@techbmc).</description>
    <link>https://dev.to/techbmc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F907085%2F52c8fe0b-57a9-4239-9bf1-3d3cca3934f4.jpg</url>
      <title>DEV Community: Techbmc.com</title>
      <link>https://dev.to/techbmc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/techbmc"/>
    <language>en</language>
    <item>
      <title>How to use conditional commands to write Batch File</title>
      <dc:creator>Techbmc.com</dc:creator>
      <pubDate>Thu, 11 Aug 2022 21:54:43 +0000</pubDate>
      <link>https://dev.to/techbmc/how-to-use-conditional-commands-to-write-batch-file-41l7</link>
      <guid>https://dev.to/techbmc/how-to-use-conditional-commands-to-write-batch-file-41l7</guid>
      <description>&lt;p&gt;One of the hidden and attractive features of Windows is the existence of a batch file (Batch File), by using which you can easily do many repetitive and boring tasks automatically. But the basis of this technology is a complete familiarity with the condition statement or If-else. In the following, we are going to teach you the difference between using this command in Batch File and other programming languages.&lt;/p&gt;

&lt;p&gt;If you are familiar with programming, you must know that the If-else statement is used to control logical situations. More precisely, by using the If-else control statement, you can define different conditions according to the different situations that may occur in a problem. If the conditional statement is true, the corresponding code will be executed, otherwise the code corresponding to the else block will be executed. For example, the following code written in Java programming language means that if the number X is equal to 15, an expression will be printed that shows the number 15, but otherwise, the expression of an unknown number will be printed.&lt;/p&gt;

&lt;p&gt;if (x == 15) System.out.println ("The value of x is 15!"); else System.out.println("Unknown value.");&lt;/p&gt;

&lt;p&gt;The concept of the if-else statement is the same in all programming languages, but the way it is written may have slight differences. For example, in a batch file, we should write the above command as follows:&lt;/p&gt;

&lt;p&gt;if %x%==15 (echo "The value of x is 15") else (echo "Unknown value")&lt;/p&gt;

&lt;p&gt;Now consider a different scenario. For example, suppose a code is to be written that if the number X is equal to 15, the expression of the number is completely correct, otherwise, if the number X is equal to 10, the expression of the number is acceptable, and otherwise the expression of the number is not correct, print to be The following commands in the Java programming language are as follows:&lt;/p&gt;

&lt;p&gt;if (x == 15) System.out.println ("the number is corect!"); else-if (x == 10) System.out.println ("The number is acceptable"); else System.out.println("the number is wrong!");&lt;/p&gt;

&lt;p&gt;But the point is that the if-else command in Batch File is a little different. There is no else-if statement in this language, instead you can use consecutive if statements to write consecutive conditions. For example, the scenario described above is written as:&lt;/p&gt;

&lt;p&gt;if %x%==15 (echo "the number is corect!") if %x%==10 (echo "The number is acceptable") else (echo "the number is wrong!")&lt;/p&gt;

&lt;p&gt;Although using scripting is a very useful method, it is still better to use the PowerShell tool and it is recommended to use this tool because this tool has all the necessary programming features using its own programming, which is of course very simple. The user puts and also the user can run his written batch files through PowerShell. In addition, PowerShell can be easily used on Linux operating system.&lt;/p&gt;

&lt;p&gt;Have you used batch file writing to do repetitive tasks in Windows or do you prefer PowerShell? Share your experiences with us. Meanwhile, check programmed &lt;a href="https://www.techbmc.com/download-free-best-apk-ppsspp-games-for-android-phones-devices/"&gt;ppsspp games&lt;/a&gt; for your system and &lt;a href="https://www.eifsoccer.com/"&gt;sports site&lt;/a&gt; we utilized this batch on.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Difference between malware, virus &amp; computer worm</title>
      <dc:creator>Techbmc.com</dc:creator>
      <pubDate>Thu, 11 Aug 2022 12:23:14 +0000</pubDate>
      <link>https://dev.to/techbmc/difference-between-malware-virus-computer-worm-587m</link>
      <guid>https://dev.to/techbmc/difference-between-malware-virus-computer-worm-587m</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is the difference between malware, virus and computer worm?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every user around the world uses the words malware, virus and worms; There is fear. But today we want to check, to know how they differ from each other and what effect they have on &lt;a href="https://www.techbmc.com/want-to-create-an-iot-system-learn-how/"&gt;your system&lt;/a&gt;?&lt;/p&gt;

&lt;p&gt;Today, every computer system that is connected to the Internet is at risk of security threats at any moment, and there are various ways to enter your system, most of all we have to talk about malware, viruses and worms. In this article, we want to take a closer look at them and their differences, so stay with Facet until the end .&lt;/p&gt;

&lt;h2&gt;
  
  
  The first computer virus
&lt;/h2&gt;

&lt;p&gt;The history of viruses dates back to 1971, when viruses were not as dangerous and were actually experiments in the early days of &lt;a href="https://www.techbmc.com/"&gt;computer technology&lt;/a&gt;. In 1971, an engineer named Creeper at BBN Technologies developed a program that could replicate itself.&lt;/p&gt;

&lt;p&gt;This program was developed to move between various DEC PDP-10 machines running the Tenex operating system. At the same time, this engineer could use the ARPANET to transfer between different computers and display the message "I'M CREEPER: CATCH ME IF YOU CAN."&lt;/p&gt;

&lt;p&gt;This program is self-replicating and tries to remove itself from the previous computer. Apart from being a bit of a nuisance to computers, the Creeper did not cause any damage to the systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is malware?
&lt;/h2&gt;

&lt;p&gt;Malware has a general definition and we usually consider malware, viruses and worms as different entities, but in the term malware is comprehensive and general. Malware refers to any malicious software designed to harm computers. This means that viruses and worms are considered different categories of malware.&lt;/p&gt;

&lt;p&gt;Therefore, we should note that the first viruses were not malware and did not harm the system and were only a kind of experiment. Even the Brain virus of 1986 was not malware, although it was the first virus to spread globally.&lt;/p&gt;

&lt;p&gt;You have probably heard the names of some malware because there are different types of them, for example, the names of Trojans, ransomware, spyware, and other such things often reach the phone. In addition to computers, we are also facing various types of malware to attack Android phones.&lt;/p&gt;

&lt;h2&gt;
  
  
  The difference between viruses and worms
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Virus malware
&lt;/h2&gt;

&lt;p&gt;Now we have to go to viruses and worms. What are the differences between them and which one causes less damage to the system? We will have a look at them later.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is a virus?
&lt;/h2&gt;

&lt;p&gt;Even though malware encompasses a wide range of malicious programs, we tend to think of viruses as a general term. In this regard, we call every piece of malicious software that invades and attacks our computer a virus. But viruses have their own characteristics that make them uniquely dangerous.&lt;/p&gt;

&lt;p&gt;One of the main distinguishing factors of viruses is their ability to self-replicate, and this feature is what made Creeper a virus. Like biological viruses, computer viruses need a host to attach to. They get into your system by attaching to files and then find other files to infect.&lt;/p&gt;

&lt;p&gt;The virus is activated when the user opens an infected document or executes an infected EXE file. By opening the file, the virus starts its work and goes to other files and documents to infect.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is a computer worm?
&lt;/h3&gt;

&lt;p&gt;Computer worms are very similar to viruses and can reproduce themselves, however, there are differences between them. Worms are more self-reliant than viruses, that is, unlike viruses, they do not need host files to connect.&lt;/p&gt;

&lt;p&gt;When a worm finds its place on a hard disk or SSD memory, it initiates its own copying process. Instead of spreading from one file to another, worms make copies of themselves independently and spread in the system.&lt;/p&gt;

</description>
      <category>virus</category>
      <category>malware</category>
      <category>computer</category>
    </item>
  </channel>
</rss>
