Malware Essay

Submitted By nongiga
Words: 2601
Pages: 11

Malware malicious software
Distributed in other software without being noticed by the user.
Generally created for someone else to access or alter user’s private files.
Common signs of computer malware computer slowing down due to the malicious processes running on the CPU altered features on browser such as different search engine new shortcuts in taskbar or on desktop
List some ways to avoid Malware use an uncommon operating system, so that the Malware is not programmed for that platform be suspicious about what you install or click on use latest software updates use anti-virus software
What can you do once your computer has Malware on it? back up all your data, excluding program files locate the malware boot up of a CD based operating system
Back-up software, re-install operating system
Reasons to update the following software
Updates versions tend to have improvements for run efficiency.
Operating Systems - the newest software will have the latest security. Viruses optimized for older systems will prove ineffective. Applications - updates will be optimized for best security. will most likely not be susceptible to older versions of Malware.
Virus definitions - enable antivirus programs to recognize the latest viruses.
Computer maintenance
Regularly updating the hardware or software of the computer to maintain its usefulness
Ways to maintain the computer’s performance re-install your operating system twice a year upgrade the part of the computer that is utilizing the applications you use minimize the amount of applications installed
Computer Networking
Linking computer devices together to share data.
Networks of computers are built with a mix of computer hardware and computer software.
LAN (local-area network) - The computers are close together eg. small office, internet café
WAN (wide-area network) - The computers are farther apart and are connected by telephone lines or radio waves eg. Internet
a worldwide system of computer networks a public, cooperative, and self-sustaining facility accessible worldwide use a set of protocols called Transmission Control Protocol/Internet Protocol (TCP/IP)
part of a company's intranet that is extended to users outside the company share part of a business's information or operations with costumers and businesses
Networks connecting a set of clients
Using standard Internet Protocols, (TCP/IP, HTTP,FTP)
IP--based network of communication points (nodes) behind a set of firewalls
A home network allows computers to communicate with one another. It can share:
Files and documents
An Internet connection
Printers, print servers and scanners
Stereos, TVs and game systems
CD burners
Different networks have different hardware, but the essential components are:
More than one computer
Hardware (ex:router) and software (application or built in to the OS) coordinating the exchange of information
A path for the information to follow from one computer to another Software Products
Application software directs a computer to perform specific information processing activities for the computer’s user
word processing - creates and edits documents (eg. Microsoft Word) spreadsheet - performs calculations by using spreadsheets (eg. Microsoft Excel) multimedia - creates and plays audio and video files (eg. Media Player) presentation - creates and presents in the form of a slide show (eg. Microsoft PowerPoint) educational - able to run tests and track progress. often used in teaching and self-learning (eg. Google Earth, Matlab) simulation - able to stimulate physical or abstract systems (eg. flight simulators) content access - used to access content without editing (eg. Google Chrome, Firefox) application suites - a group of applications combined to perform related functions (eg. Microsoft Office) bespoke software - commissioned by a company to perform a specific task or function that no current