NEWS & UPDATES >> BCA BCSP064 Synopsis & Project Work Started for DEC 2017, IGNOU MCA MCSP060 Synopsis Work Started for DEC 2017, CONTACT 4 IGNOU Mini Project

WHAT IS UTILITY SOFTWARE, WHAT IS PERVERSE SOFTWARE & WHAT IS OPEN SOURCE SOFTWARE


WHAT IS UTILITY SOFTWARE
Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-to-day chores associated with personal computing and to keep your system running at peak performance.

Some of utility programs are discussed below:

Anti-virus software

Computer viruses are software programs that are deliberately designed to interfere with computer operation; record, corrupt, or delete data; or spread themselves to other computers and throughout the Internet. Virus Scanning Software are utility programs designed to protect your computer from computer viruses, worms and trojan horses.

Historically, computer viruses were associated with self-reproducing executable programs that manipulated or even destroyed data on infected computers. They were known to spread by infected floppy disks, network or other hardware media. With the advent of internet, the viruses spread online as well. They can also spread through powerful macros used in word processor applications, like MS Word, or email programs where viruses are embedded in the email body itself and reproduce when the message is just opened or previewed.

To help prevent the most current viruses, you must update your antivirus software regularly. You can set up most types of antivirus software to update automatically.

Most anti-virus programs use one of the following techniques to identify viruses:

1.      Signature based detection: This is the most common method. It compares the contents of the infected file to a known pattern of data.                 Because viruses can embed themselves in existing files, the entire file is searched.

2.      Heuristic-based detection: This method is primarily used to identify unknown viruses by looking for malicious code or variations of such              code.

3.      File emulation: This is another heuristic approach in which the infected program is run in a virtual environment and the actions it performs are recorded. The actions are analyzed to check for any malicious actions and carry out disinfection actions accordingly.


No matter how useful antivirus software can be, these can sometimes have some drawbacks.


Antivirus software can impair a computer's performance. Active anti-virus programs can cause conflicts with other programs.


A "false positive" is when antivirus software identifies a non-malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete infected files, a false positive in a essential file can render the operating system or some applications unusable.


Most popular anti-virus programs are not very effective against new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the market.

Some apparent antivirus programs are actually malware being sold as legitimate software, such as Win Fixer and MS Antivirus.

Some commercial antivirus software agreements include a clause that the subscription will be automatically renewed. For example, McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription. Norton Antivirus also renews subscriptions automatically by default.

Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack



Despite the drawbacks, anti-virus software have become a necessity these days. A number of popular anti-virus programs include those by Kaspersky, Symantec, McAfee, and Norton. The cost of the program increases with the increase in the number of virus detection and removal features and ease they offer.

Backup utilities

Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. All types of data could be backed up like pictures, word documents, files, executables or an entire database.

The main purpose is to recover data in the event of data loss or data getting corrupt. Other purpose could be to recover historical data.

A number of Backup software are available that assist you in taking backup of your important data on the computer. Selecting between various back-up software is not only a based on the cost but also on the software that meeting the requirements.

A backup software could allow automated scheduling of backup in addition to just creating copy of files. The software should be easy to install and maintain. It should be intuitive and easy to use. The restoring from the back-up should be simple. Accessing restored data should be automatic, and the backup should preserve original data files and paths. A backup software that can compress data helps in storing data in lesser space. Certain software also allows securing the backed-up data with passwords and encryption. Good documentation and technical support goes a long way in ensuring help is available when needed.

Backup could be taken on variety of media including hard drive, CDs, DVDs, floppy disks etc. It could also be taken on FTP locations, tape or online servers. A number of free and proprietary back-up software are available including those from Microsoft, Symantec, Apple, IBM, and Norton.

It is important to take backup of important data regularly and also verify that it can be restored successfully.

Diagnostic programs

A diagnostic program is a program written for the purpose of locating problems with the software, hardware, or both, or a network of systems. A diagnostic program provides solutions to the user to solve issues.

In practical experience, these tools do not usually identify the exact cause of the system problem, but they often provide some information about what is in the system and how it is working. Some of these are free or are included with common operating systems at no additional charge, while others are commercial products that range from affordable to rather pricey.

Here are some common software diagnostic tools.


Power-On Self Test (POST) : This isn't a separate diagnostic utility; it is in fact built into your system BIOS and it runs every time you start up your PC automatically. It is often the best indicator of system problems. Don't disable its error-reporting functions unless you really need to.


MEM.EXE : This simple utility, built into Windows operating system that provides you with details about your memory configuration, as well as what is currently using your memory.


Microsoft Diagnostics : Better known as "MSD.EXE", this is a small DOS utility that takes a brief inventory of the contents of your PC and shows them to you in a text-based format. This is very useful for seeing what disks are in the system, how much memory is installed, and also for checking system resource usage. It will show you what type of BIOS you are using.


The Windows Device Manager : This is the most useful tool for identifying system configuration and resource usage information.


Norton System Information : This utility is similar to the Microsoft Diagnostics, only more detailed in its later versions. SI shows a great deal of information about what is in the PC, going well beyond what MSD gives you, but really is still an information utility as opposed to a true diagnostic. This program is part of Symantec's Norton Utilities.


Microsoft ScanDisk and Norton Disk Doctor : These programs are used to check for hard disk problems. This includes file system corruption and hard disk read errors. They should be used when hard disk problems are suspected.


Scandisk is a utility provided with Windows computers. Scandisk scans your disks to see if there are any potential problems on the disk, such as bad disk areas. Since disks are magnetic media, all disks, including your hard drive can be corrupted


Microsoft Disk Defragmenter software assists you in keep reorganizing your disk drives. After files are saved, deleted and resaved again, the disk can become fragmented --- available space is in small blocks located throughout the disk. Disk defragmenters gather those free spots and put them together to enable you to continue to save your data in the most efficient manner.


Norton Diagnostics : This utility is meant to go beyond the System Information program and actually perform tests on the hardware to identify problems. It includes tests of the processor and motherboard and system memory, and will identify some types of resource conflicts. In reality, it is still quite limited in terms of the numbers of problems it will find.


QAPlus : QAPlus from DiagSoft is a more advanced diagnostic suite that comes in several flavours, depending on what you need to do and how you want to do it. This is a more expensive package but can give you much more detailed information about your system and help identify problem situations as well.


File view programs

File view utilities let you see the contents of a wide variety of documents even when you don't have the application on your system

A file viewer is limited-functionality software it does not have a capability to create a file, or modify the content of an existing one. Instead, it is used only to display or print the content. File viewers do not edit files, but they are able to save data in a different file format.

All the fundamental types of file viewers are filters which translate binary files into plain text (one example antiword). Another common type of file viewer is a picture viewer that can display picture files of various formats. Common features here are thumbnail preview and creation, and image zooming.

The primary reason behind limited functionality is marketing and control. For example, a popular software program, Adobe Acrobat, can be used to create content for most computer platforms, under various operating systems. To ensure that people can access the documents created with Adobe Acrobat, the software publisher created a viewer program, the Acrobat Reader, and made it available for free. This viewer application allows the content created by the proprietary authoring software to be readable on all supported operating-system platforms, free of charge, thus making it a more attractive solution.

There are many products which can qualify as a file viewer: Microsoft Word viewer or Microsoft PowerPoint viewer, and the Open Office equivalents are examples. In a sense, a web browser is a type of file viewer, which translates, or renders, the HTML markups into a human-friendly presentation. Although HTML is plain text, viewing an HTML file in a browser and in a text editor produces significantly different results.

Google Docs is another very good example of online file viewer. Google Docs Viewer supports 12 new file types in, including all remaining Microsoft Office file types, Apple's Pages format, and Adobe's Photoshop and Illustrator files.

Computer performance enhancement utilities

A number of utilities are available to improve the overall performance of the computer system by letting you speed up your system or increase storage space. These utilities range from those that come packaged with the operating system or can be purchased separately.

Disk defragmenter utility reorganizes non contiguous files into contiguous files and optimizes their placement on the hard drive for increased reliability and performance.

There are many hardware and software accelerators available to enhance performance in a particular area. For example, download accelerators are software tools to increase the download speed, while graphic accelerators are coprocessors that assist in drawing graphics.

The Windows registry can quickly become crowded and hence slower to search when you remove unused programs that do not uninstall properly. There are utilities like Registry Mechanic or Registry Clean Expert that can help clean Windows registry to improve performance.

WHAT IS PERVERSE SOFTWARE
Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system.

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user's web browsing, and pushes related advertisements.


Typical types of malicious software are - Computer virus, Computer Worm, Trojan horse, Rootkits, Spyware etc.

Here is brief information about the various types of malware:

Computer Virus

Computer virus is a small software program that is designed to enter a computer without users' permission or knowledge, to interfere with computer operation and to spread from one computer to another. A computer virus needs to attach itself to a document or program to infect other computers or programs.

Some viruses do little but replicate while others can cause severe harm or adversely effect program and performance of the system. They can destroy files, software, program applications, and cause the loss of data.

There are various types of computer virus that can be classified by their origins, techniques of attack, modes of spreading, forms of infections, hiding locations and the kind of damage caused. Examples of computer viruses are: Randex, Melissa.A and Trj.Reboot

Computer Worm

Computer Worm is a program that is very similar to a virus. It has ability to self replicate. It actively spreads itself over the network, copies itself from one disk drive to another or copies using email. It does not need user action to start it unlike virus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojan Horse

When a program is disguised as something interesting and desirable, users are tempted to download and install it on their machine, without knowing what it does. This is when it does the damages by deleting files from the system or by further installing unwanted software. This is the typical technique of Trojan horse. For example, a file called "saxophone.wav file" on the computer of user who's interested in collecting sound samples may actually be a Trojan Horse. Trojan Horses unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms, but they are extremely dangerous to users computer's security and personal privacy. They make a computer susceptible to malicious intruders by allowing them to access and read files.

Rootkits

This is a technique using which the malware remains concealed in the system, and continues to do the damage in a concealed manner. Rootkits can prevent a malicious process from being visible (ex Task Bar in Windows operating system) in the list of running applications. Rootkits normally attempt to allow someone to gain control of a computer system. These programs are usually installed by trojans and are generally disguised as operating system files.

Trap doors

This is a way of bypassing normal authentication procedure (windows/ operating system user name and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.

Logic Bombs/ Time Bombs

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.

Spyware

While so far we have discussed the malware's intent to damage the computer system, spyware is designed for commercial gain. These programs gather information about the user in a concealed manner, show pop-up advertisements, redirects the search engine results to paid advertisements etc.

Keystroke loggers

This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Card number while shopping online. This can be used for Credit Card fraud.

Data-stealing

This is a web threat that results in stealing of personal and proprietary information to be used for commercial gains either directly or via underground distribution. Some popular examples of recent data-stealing cases are – steal and sell large number of credit card numbers from businesses such as TJX, OfficeMax, Sports Authority etc.

 Ways to Counter Perverse Software

Some common ways of countering Malware are as following:

Ensure that the operating system and any program one uses are up to date with patches/updates.

Block unwanted email viruses by installing a spam filter and spam blocker.

When browsing the internet, always watch what one clicks and installs. Do not simply click OK to dismiss pop-up windows.

Install anti-virus software; scan and update regularly. It can, in most cases, remove and prevent viruses, worms, trojans, and (depending on the software) some spyware.

Install anti-spyware/anti-adware; scan and update regularly. It will remove and (depending on the software) prevent future adware and spyware.

WHAT IS OPEN SOURCE SOFTWARE

Open Source Software (OSS) is software that comes with source code, and importantly also provides rights (typically reserved for copyright holders) to study, change and improve the software. This development happens in a larger collaborative environment, without any direct objective of the software's commercial success.

Primary objectives of the Open Source movement are as following:

Encourage innovation at the grass-root level and facilitate collaborative software development involving individual talent than it being the prerogative of the large companies.

Reduce the software cost.

Improve quality and security

Avoid forced lock-in to vendor's proprietary software.


Open Source Initiative (OSI) is the patron of the Open Source Definiton (OSD) and is the community-recognized body to evaluate and approve the software as OSD compliant. Some key criterion for OSD compliance are mentioned below:

Free Redistribution : The license should allow any party to sell or give away the software as a component of a larger software distribution containing programs from multiple sources. The license shall not require a royalty or other fee for such sale.


Source Code : The program must include source code, and must allow distribution in source code as well as in executable form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge.


Derived Works : The license must allow changes to the existing source code and must allow them to be distributed under the same terms as the license of the original software.


No Discrimination against specific applications : The license must not restrict anyone from making use of the program in a specific scenario. For example, it may not restrict the program from being used in a business, or from being used in drug research.















License must Not Be Specific to a Product : The rights attached to the program must not depend on the program being part of a particular software distribution.












License must Not Restrict Other Software : The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software.


Some examples of Open Source Software are:

Programming language
PHP - Scripting language suited for the web


Operating System
GNU Project — ―a sufficient body of free software‖
Linux — operating system kernel based on Unix


Server Software
Apache — HTTP web server
Tomcat web server — web container
MySQL – database, popular for applications built on LAMP stack (Linux, Apache, MySQL, PHP/PERL/Python)
MediaWiki — wiki server software, the software that runs Wikipedia


Client software
Mozilla Firefox — web browser
Mozilla Thunderbird — e-mail client

Some typical challenges that used to be associated with the Open Source Software were lack of product support that typically comes with proprietary software, future upgrades, end-user training etc. Over a period of time, industry has evolved to overcome these challenges. For example, Red Hat Linux sells Linux operating system and provides product support, training as well. Further, it is important to note that Open Source Software is not always the best option for all the business needs. However, it does provide a good alternative to the proprietary software. One needs to do the required due-diligence to decide the right product for a specific situation.


Check Your Progress 3

1.      Differentiate between open source and proprietary software?
    
  Proprietary software refers to any computer software that has restrictions on any combination of the usage, modification, copying or               distributing modified versions of the software. It is owned by an individual or a company (usually the one that developed it). Its source code     is almost always kept secret. Advantages of proprietary software include: 1) Availability of reliable, professional support and training; 2)           Packaged, comprehensive, modular formats; and 3) Regularly and easily updated. The disadvantages are: 1) Costly, and 2) has closed         standards that hinder further development.

 Open source refers to a program in which the source code is available to the general public for use and/or modification from its original          design free of charge. Open source sprouted in the technological community as a response to proprietary software owned by corporations.     Advantages of Open source are: 1) Low cost and no license fees; 2) Open standards that facilitate integration with other systems; and 3) it    is easily customizable. The disadvantages are: 1) Lack of professional support; 2) Evolving developer communities; 3) Lack of release co-           ordination; and 4) Erratic updates.

      2.      Identify open source software from the following list?

a.      OpenOffice

b.      Filezilla

c.      MS Word

d.     Pidgin

e.      Confluence

    
     OpenOffice (Word Processing Software), Filezilla (FTP Software), Pidgin (Instant Messaging Software)  


3.      What measure  should you take  to safeguard your computer from a  virus

      attack?

           a.   Install anti virus and anti spyware. Scan and update regularly.

b.      Keep the windows system updated with patches and updates.

c.      Browse and click only known and secure web sites. Avoid suspicious ones.

d.     Open email attachments from verified source only.

      4.      Name a few computer performance enhancement utilities?

     TweakVista, Boost Windows 2009, Registry Cleaner, WinUtilitites, System Optimize Expert.


Enroll for Coaching or Home Class | IGNOU BCA MCA Solved Assignment 2016 2017 on process  Join IGNOU BCA MCA Coaching Class |  Synopsis & Project Support 
Powered by IGNOUFriend | www.ignoufriend.co.in |
ignou bca mca synopsis, ignou class, ignou bca mca project, solved ignou assignment,BCA Coaching Institute in Delhi, MCA Coaching Institute in Delhi, BCA MCA Coaching Institute in Delhi, BCA MCA, Tuation Class in delhi, IGNOU BCA MCA Class, IGNOU BCA MCA Tution,IGNOU Solved Assignment, IGNOU BCA Synopsis , IGNOU MCA Synopsis, ignou bca project, ignou mca project, ignou best coaching in delhi, ignou best coaching in new delhi, ignou best coaching in south delhi, ignou best coaching in north delhi, ignou best coaching in east delhi, ignou best coaching in west delhi
ignou, bca, mca, coaching institute, tution class, bcsp064, mcsp060, cs76, mcs044,bcs011, bcs012, mcs011, mcs012, mcs013, mcs015, bcsl021, bcsl022, mcs014, bcs040, mcs021, mcs023, bcs031, bcsl032, bcsl033, bcsl 034, bcs041, bcs042, mcsl016, bcsl043, bcsl044, bcsl045, bcs051, bcs052, bcs053, bcs054, bcs055, bcsl056, bcsl057, bcsl058, bcs062, mcs022, bcsl063, project
mcsp060, mcse011, mcse004, mcse003, mcsl054, mcs053, mcs052, mcs051, mcsl045, mcs044, mcs043, mcs042, mcs041, mcsl036, mcs035, mcs034, mcs033, mcs032, mcs031, mcsl025, mcs024, mcs023, mcs022, mcs021, mcsl017, mcsl016, mcs015, mcs014, mcs013, mcs012, mcs011
nips institute, nipsar, ignoufriend.in, ignoufriend.co.in, ignouhelp, best coaching institute

No comments:

Post a Comment