Archive for September 2013

SCL Questoins 3

Question 1

OPERATING SYSTEM USED IN DESKTOPS/LAPTOPS
List of latest operating system that are used in desktops/laptops :
* Microsoft windows
* Mac OS
* DOS
* UNIX and LINUX
Most users in the world used Microsoft Windows as its operating system.

HOW OPERATING SYSTEM WORKS?

  • * It manages the hardware and software resources of the system. In a desktop computer, these resources include such things as the processor, memory, disk space and more.
  • * Computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit (CPU). It's the operating system's job to make sure that each application gets its fair share of your computer's finite resources in the most efficient way possible.
  • * The operating system provides a consistent set of rules for applications to use in order to be able to interface with your computer's hardware. 




Operating System
Advantage
Disadvantage
Microsoft windows
v  consumer-oriented. Tightly integrated.
v  vulnerable to viruses. Tightly integrated
Mac OS
v  Mac viruses are rare compared to PCs, but mac viruses do exist. 
v  Very user friendly. 
v  Able to run both Windows and OSX. 
v  Great computer for professional applications such as business, photo editing, rendering, movie editing, etc. 
v  Unix based, thus more secure + stable. 
v  Good multimedia computer. 
v  Upgradeability is limited. 
v  Overpriced. 
v  Interface is flashy and childish, bullshit. 
v  People who switched from a PC to a Mac may be confused for the first few days. 
v  Many programs do not work on Macs. (unless you buy OSX software). 
v  Nearly ALL PC games DONT work on a MAC. 
v  Fixing macs is rather difficult than fixing PCs. 
DOS
v  The advantages of MS-DOS is that it was the most popular operating system for IBM computers in the early 1980s and it was very easy for novices to learn and use
v  The disadvantages of MS-DOS is that it was replaced by more advanced operating systems and is now an old operating system
 
v  While graphical user interfaces are now used, MS-DOS uses a character-based interface.
UNIX and LINUX
v  No need to worry about viruses.
v   
v  Shows its technical origins and derivation from Unix in things like tar (short for Tape ARchive) cp (copy without the vowels) and other command line tools which are often used as back-ends for GUI programs.



Question 2


ANDROID
 
WINDOWS 8
GOOGLE PLAY
DISTRIBUTOR
MICROSOFT CORP
ORIGINALITY OF GOOGLE PLAY APPLICATIONS WAS EASILY TO BE COPIED NOWADAYS
THE ORIGINALITY OF OPERATING SYSTEM
ORIGINALITY OF WINDOWS 8 OF MICROSOFT STILL CAN BE MAINTAINED
NEED TO DOWNDLOAD APPLICATIONS TO READ OR VIEW FILES/PDF.
FILE OR DOC. VIEWING
ALREADY AVAILABLE WITH MICROSOFT TOOLS OFFICE (e.g MICROSOFT WORDS , POWERPOINT , EXCEL)
ONCE UPGRADED , THE PREVIOUS INSTALLENT TERMINATED
VERSION UPGRADES
EVENTHOUGH IT IS UPGRADED , THE PREVIOUS APPLICATION IS STILL THERE
 
OFTEN
VERSION UPDATES APP
SELDOM
MORE THAN 700K APPS
APPS AVAILABLE
AROUND 100K APPS
MORE THAN WINDOWS USER
USERS
LESS THAN ANDROID USER
 
 
THE SPEED , STABILITY AND FEATURES OF ANDROID CAN VARY FROM ONE TO ANOTHER , BUT WINDOWS PHONE IS FRIENDLY AND FAST.
 


*CONCLUSION WE MADE , ANDROID WAS MORE TO SOCIAL WHILE WINDOWS MORE TO EDUCATIONAL AND BUSSINESS WORKING.
 

 

SCL QUESTIONS 2


Question 1

 Open source software is any operating system that is free to use and which provides the original code where the source code is available (under a copyright license) to the public, which enables them to use, modify / enhance the operating system, and redistribute the modified (or unmodified) form of the operating system.

People nowadays prefer to use open software because of the availability of the source code and the right to modify them. People can use the source code and modify it into something they prefer to. They also have the right to redistributae and improves the source code, they can easily share it with their friends and even change the code if there are something they don’t like about.

5 Popular Open Source Software:

  • Firefox vs Internet Explorer
  • Thunderbird vs Microsoft Outlook
  • Abiword vs Microsoft Word
  • OpenOffice vs Microsoft Excel and Microsoft Powerpoint
  • VLC Media Player vs Windows Media Player, Quick Player and Real Player.
 
 
 
Question 2

No.

Types of threats and malicious program

The effect on device

How to repaired or remove

1

Ransomware trojans (e.g. Pgcoder, FBI Virus)

Encrypt data files on the infected system, then demand money from the victims in exchange for the decryption key. This type of malware adds insult to injury - not only has the victim lost access to their own important files, they've also become victim to extortion.

To detect and remove ransomware and other malicious software that might be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products can detect and remove this threat:

  •  Windows Defender Offline (Some ransomware will not allow you to use the products listed here, so you might have to start your computer from a Windows Defender Offline disk.)

 

2

Keylogger trojan

Surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner. Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity - like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.

 

The best way to remove keyloggers is to make use of software that work in many ways to get rid of this hidden virus. It is quite easy to run software to remove keylogger. In order to make the most out of the software, it is imperative to run it at least once in a week. This is a must to keep a Trojan, like keylogger, at bay and to protect your data and necessary information from hackers. However, prior downloading any removal software makes sure you are shopping it from a reputed and authorized site. Else others can refill it with unwanted viruses, instead of cleaning it.

3

Storm worm

 gives attackers full access to the system (hence the term 'root') and typically hides the files, folders, registry edits, and other components it uses. In addition to hiding itself, a rootkit typically hides other malicious files that it may be bundled with.

Most antivirus programs that have been updated with the latest worm definitions will detect and remove the worm. You can also use an online worm scanner if you don’t have one installed. This type of program is available from companies such as Trend Micro and Symantec. A free anti-malware program, such as Malwarebytes or Spybot Search & Destroy, will also do the trick. Another program that can defeat the Storm worm might already be installed on your computer: The Microsoft Malicious Software Removal Tool (MSRT) is a free program you can use to remove the Storm worm from your system.

4

Android plankton origin 2

Hide itself in apps that addressed themselves as supplementary programs to Angry Birds, but when in the device would steal user browser data and could access a remote server to add even more malicious files to the device.

You would need to remove the entire application, and check for the viruses in the entire file directory of yours. If there is something fishy that you still find, the only way you can proceed is re-installation of the operating system. The two things you need to do is delete the application along with the app data and memory of the app.

 
 
 

 

Powered by Blogger.