Thursday, September 5, 2013

SCL 2 : Computer Software

1. What is open source software?
    In your opinion, why people prefer open source software over proprietary alternatives nowadays?
    Name top (fives) 5 most popular open source software and compare them with similar proprietary
    software (e.g. Open Office versus Microsoft Office).

What Is Open Source Software ?
Open-source software (OSS) is computer software with its source code made available and licensed with a license in which thecopyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
In your opinion, why people prefer open source software over proprietary alternatives nowadays?
From my point of view, people prefer open source software over proprietary alternatives because open source software is free software compared to proprietary alternatives.It’s not about price. Yes, free sounds great and it’s beneficial to have the option to try something for free instead of paying for a trial license.Open source software is made available for anybody to use or modify, as its source code is made available. Open source software promotes learning and understanding through the dissemination of understanding. The main difference between open-source and traditional proprietary software is in user and property rights, the conditions of use imposed on the user by the software license, as opposed to differences in the programming code .However, I think the steady rise of open source software is good news for developers, corporations and consumers alike. For the first time in many years they now have the freedom to choose between several viable alternatives and more and more of them seem to be breaking free of their shackles.


5    Top most popular open source software:

1.Wordpress



2. Firefox


3. Open Office


4. VLC Player



5. Notepad++



                                                                                                                                                
Comparisons between Windows Phone 8 Versus Android Jelly Bean 4.2

Windows Phone 8
Aspects
Android Jelly Bean 4.2
No, Settings Menu
Control Centre
Yes, Varies by phone maker
Live Tile Badges
Notification Centre
Detailed Notifications
Multitasking preview
Multitasking Preview
Recent List
Third-Party lenses
Surfaced Camera Modes
Varies by Android skin
Yes
Unified Browser Bar
Yes


2. Discuss different types of threats and malicious program (malware) that can damage a computer, mobile       device or disrupt any system.

   Search for information on current know malware program. Based on the information taht you have found,      create a table to list different types of malware, what it does, and how it can be repaired removed. These      information is useful for you to prevent any malware from damage your computer system.

No.
Types of Malwares
What It Does…???
How It Can Be Repaired or Removed….??
1
Computer Viruses
Replicates itself and go on to infect other computers by inserting copies of itself(possibly modified) into other computer programs, data files or the boot sector of the hard drive.
*      One of the viruses removal is reinstallation of operating system. High possibilities to recover copies of essential user data by booting a live CD, or connecting the hard drive to another computer and booting from the second computer’s operating system.
*      Purchase or download antivirus software or antivirus programmes for virus scanning.
2
Worms
Replicates itself in order to spread to other computers through computer networks by utilizes a computer network to send replicates of itself to connecting computers on that network
*      Removed by using malware removal tools.
*      Anti-virus and anti-spyware software are helpful, but must be up-to-date.
*      Usage of firewall
3
Trojan Horse
Hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target’s computer.
*      Removed manually
*      Removed by using antivirus software programmes
4
Spyware
Gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent or that asserts control over a computer without the consumer’s  knowledge such as  free online scanning, Internet add-ons or plugins, dubious websites and image or even through a search engine.
*      Removed by using antispyware removal tools.
*      Install firewalls from a variety of companies
*      Install large hosts file which prevent the user’s computer from connecting to known spyware-related web addresses.
5
Adware (Advertising-supported software)
Automatically renders advertisements in order to generate revenue for its author by spy on the computer  user and also steal user sensitive information.
*      Adware can be removed using trusted spyware or malware removal tools.
6
Keyloggers
Moniter user keystrokes and the information are logged and reported the person or organization who installed them. For instance, monitor workers or employees activities
*      Installing anti-keylogger
*      Rebooting the computer using a Live CD or using write-protected Live USB
*      Installing anti-spyware ot anti-virus programs
*      Uses network monitor to alert the users
*      Using automatic form-filling programs to prevent keylogging by removing the requirement for a user to type personal details and password using the keyboard.
*      Usage of One-Time Passwords
*      Usage of handwriting recognition, mouse gestures or speech recognition
7
Rootkit
Hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Besides, its may able to subvert the software that is intended to find it.
*      The only available solution to the problem is the reinstallation of the operating system.
*      Removal require hardware replacement or specialized equipment.

No comments:

Post a Comment