In your opinion, why people prefer open source software over proprietary alternatives nowadays?
Name top (fives) 5 most popular open source software and compare them with similar proprietary
software (e.g. Open Office versus Microsoft Office).
What Is Open Source Software ?
Open-source
software (OSS) is computer software with its source code made available and licensed with a license in which thecopyright holder provides the rights to study, change and distribute
the software to anyone and for any purpose.
In your opinion, why people prefer open
source software over proprietary alternatives nowadays?
From my point of view, people prefer
open source software over proprietary alternatives because open source software
is free software compared to proprietary alternatives.It’s not about price.
Yes, free sounds great and it’s beneficial to have the option to try something
for free instead of paying for a trial license.Open source software is made
available for anybody to use or modify, as its source code is made available.
Open source software promotes learning and understanding through the
dissemination of understanding. The main difference between open-source and
traditional proprietary software is in user and property rights, the conditions
of use imposed on the user by the software license, as opposed to differences
in the programming code .However, I think the steady rise of open source
software is good news for developers, corporations and consumers alike. For the
first time in many years they now have the freedom to choose between several
viable alternatives and more and more of them seem to be breaking free of their
shackles.
5
Top
most popular open source software:
1.Wordpress
2.
Firefox
3.
Open Office
4.
VLC Player
5.
Notepad++
Windows
Phone 8
|
Aspects
|
Android
Jelly Bean 4.2
|
No, Settings Menu
|
Control
Centre
|
Yes,
Varies by phone maker
|
Live Tile Badges
|
Notification
Centre
|
Detailed
Notifications
|
Multitasking preview
|
Multitasking
Preview
|
Recent
List
|
Third-Party lenses
|
Surfaced
Camera Modes
|
Varies by
Android skin
|
Yes
|
Unified
Browser Bar
|
Yes
|
2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system.
Search for information on current know malware program. Based on the information taht you have found, create a table to list different types of malware, what it does, and how it can be repaired removed. These information is useful for you to prevent any malware from damage your computer system.
No.
|
Types of Malwares
|
What It Does…???
|
How It Can Be Repaired or Removed….??
|
1
|
Computer Viruses
|
Replicates itself and go on to infect other computers by inserting
copies of itself(possibly modified) into other computer programs, data files
or the boot sector of the hard drive.
|
One of the viruses removal is reinstallation
of operating system. High possibilities to recover copies of essential user
data by booting a live CD, or connecting the hard drive to another computer
and booting from the second computer’s operating system.
Purchase or download antivirus software or
antivirus programmes for virus scanning.
|
2
|
Worms
|
Replicates itself in order to spread to other computers through
computer networks by utilizes a computer network to send replicates of itself
to connecting computers on that network
|
Removed by using malware removal tools.
Anti-virus and anti-spyware software are
helpful, but must be up-to-date.
Usage of firewall
|
3
|
Trojan Horse
|
Hacking program that is a non-self-replicating type of malware which
gains privileged access to the operating system while appearing to perform a
desirable function but instead drops a malicious payload, often including a
backdoor allowing unauthorized access to the target’s computer.
|
Removed manually
Removed by using antivirus software programmes
|
4
|
Spyware
|
Gathering information about a person or organization without their
knowledge and that may send such information to another entity without the
consumer’s consent or that asserts control over a computer without the
consumer’s knowledge such as free online scanning, Internet add-ons or
plugins, dubious websites and image or even through a search engine.
|
Removed by using antispyware removal tools.
Install firewalls from a variety of companies
Install large hosts file which prevent the
user’s computer from connecting to known spyware-related web addresses.
|
5
|
Adware (Advertising-supported software)
|
Automatically renders advertisements in order to generate revenue for
its author by spy on the computer user
and also steal user sensitive information.
|
Adware can be removed using trusted spyware or
malware removal tools.
|
6
|
Keyloggers
|
Moniter user keystrokes and the information are logged and reported
the person or organization who installed them. For instance, monitor workers
or employees activities
|
Installing anti-keylogger
Rebooting the computer using a Live CD or
using write-protected Live USB
Installing anti-spyware ot anti-virus programs
Uses network monitor to alert the users
Using automatic form-filling programs to
prevent keylogging by removing the requirement for a user to type personal
details and password using the keyboard.
Usage of One-Time Passwords
Usage of handwriting recognition, mouse
gestures or speech recognition
|
7
|
Rootkit
|
Hide the existence of certain processes or programs from normal
methods of detection and enable continued privileged access to a computer.
Besides, its may able to subvert the software that is intended to find it.
|
The only available solution to the problem is
the reinstallation of the operating system.
Removal require hardware replacement or
specialized equipment.
|
No comments:
Post a Comment