Professional Documents
Culture Documents
Protect Application or System Software INFORMATION SHEET
Protect Application or System Software INFORMATION SHEET
Protect Application or System Software INFORMATION SHEET
LEARNIG OUTCOME:_
Introduction
This module is designed to provide the required
knowledge, skill and attitude to keep application or
system software working effectively. It includes
detecting and removing destructive software in
accordance with the occupational standards
INFORMATION LO1
ensure user accounts Controlled
SHEET MODULE Protecting Application or System
Software
1 prepared by: B. T
Shashemene Polly technique collage
1. Standard: is user account that we use for everyday use. We probably create this type of
account when we first started using our PC.
If your account type is limited account type
You can change and remove your password
Change picture, themes and other desktop setting
View files created by your own
View files in shared document folder
Users with a limited account cannot always install the programs to the system.
Depending on the program the users might need the administrator privileges
2. Administrator: provide the most control over a PC and should be used sparingly.
LO1
ensure user accounts Controlled
Operation sheet MODULE Protecting Application or System
Software
2 prepared by: B. T
Shashemene Polly technique collage
3 prepared by: B. T
Shashemene Polly technique collage
4 prepared by: B. T
Shashemene Polly technique collage
Follow the easy steps below to create a password for your Windows XP logon account:
Note: You need to be on an administrator's level or account to complete this.
Step 1: Click on the "Start" button on the Windows taskbar and then click on "Control Panel". If
"Control Panel" is not visible, try clicking on "Settings", then "Control Panel".
Note: If you're viewing the Classic View of Control Panel, double-click on the User Accounts icon.
5 prepared by: B. T
Shashemene Polly technique collage
Step 3: Click on your Windows XP user name from the pick an account to change area of the User
Accounts window.
Step 5: In the first two text boxes, enter the password you would like to start using. Entering the
password twice helps to make sure that you typed your password correctly. Put a password hint on the
third line.
Note: Passwords are capital sensitive, so if your password is ArFikn, the A and the F needs to be
capitalized when you log in.
Note: This hint will remind you what your password is, but because it's visible to everyone that goes on
the computer (on the log in screen), don't be too obvious if it's a family computer.
6 prepared by: B. T
Shashemene Polly technique collage
Step 8: Now your Windows XP account has a password setup and it will return to the "User Accounts"
window. You must use this password to log on to Windows XP from this point forward. If you forget
Windows XP Account Password, you can read "How to Recover Lost XP Password".
Hint:
1. If a user with a computer administrator account changes the password for another user, that user will
lose all EFS-encrypted files, personal certificates, and stored passwords for Web sites or network
resources.
2. A user with a computer administrator account can create and change passwords for all users on the
computer. Users with limited accounts can only create and change their own passwords, as well as create
their own password hints.
3. When you create a password hint, anyone who uses the computer will be able to see the hint on the
Welcome screen.
7 prepared by: B. T
Shashemene Polly technique collage
8 prepared by: B. T
Shashemene Polly technique collage
Set System Restore Points: Windows' System Protection is where you can create restore points for
your operating system. You may have made some changes to your computer that has caused
problems, and you are unsure how to rectify the situation manually, therefore restoring your system
to an established restore point is useful for such a case.
Protect your Computer with an Anti-Virus: antivirus software is absolutely necessary for
protecting your computer especially if connected to the internet. Personal information and files are
very valuable and so your anti-virus will expose, remove and even prevent harmful applications
such as viruses, worms, and trojans. Some anti-virus software even protect against malware (adware
and spyware) from infecting your computer. Know that there is NO 100% guarantee that all
harmful applications will be blocked so it is best to choose a very high rated antivirus.
Defend your Internet Browsing with Anti-Spyware: This is an important type of software that
defends by preventing and removing spyware that is associated with internet browsing. Spyware is
designed to collect your personal information usually without your knowledge or consent for
commercial purposes.
Use supported hardware on your computer: In the case of a desktop where you can more easily
add or change hardware devices, make sure to check and double check if the particular hardware is
compatible with your specific Operating System before installing.
Remove Unused Software: If there are applications that you really don't use on your computer, it
is wise to uninstall them because every additional application reduces the overall performance of
your operating system.
Install Software that is compatible with your Operating System: Just as in the case with
choosing compatible hardware, do take note of the compatibility of a particular software with your
operating system before installing. Only install compatible software applications.
Repair your System's Registry: The registry holds a wealth of settings and configurations for your
operating system to work. The registry is also contains files from installed and removed software
that has no reason to be there. These can cause the performance of your computer to decrease.
There are a number of software applications that can detect and fix a number of registry issues. It is
not uncommon to find that a computer has hundreds of potential registry issues.
How to Protect Software
It likely came as no surprise that when software developers began disabling software functionality, their
sales increased significantly.
Protecting software and limiting its usage beyond a specified trial period has become a necessity and
protecting software from cracks can be critical to an application's success.
1. Third Party Software
Many developers use third party applications to help protect their software. As a result many software
developers use a combination of protection methods in an effort to prevent hackers. Third party
applications are often part of a total protection solution.
The downside to relying on a third party is that if the algorithm of the third party application is cracked
your software can be at risk. Cracking software specifically made for software protection is a feather in a
software pirate's hat and very desirable within their community.
9 prepared by: B. T
Shashemene Polly technique collage
2. Wrappers
Wrappers are applications that go around a software download. The wrapper handles the ecommerce,
security access and tracks affiliate referrals.
3. Partial Key Verification
A method popularized by Chris Thornton of Thornsoft Development , partial key verification is a
protection scheme that only verifies certain digits of the registration key. The verification digits vary in
different versions.
4. Hardware Locking
Hardware locking, locks the software to a specific computer. Hardware locking is used so that a single
license cannot be used on multiple computers. This is generally unpopular with users because they will
often have difficulties if they upgrade their system to a faster system or if they have a hard drive crash
and need to replace failing hardware. In addition to the headaches associated with a system crash or
upgrade, they will have the additional burden of contacting the software manufacturer so they can get
their software to run on their new hardware.
5. Online Activation
Software activation services provide software developer’s access to a centralized license server on the
Internet, preventing software piracy by means of online software activation. Software activation is the
process of obtaining a license for your software so that it becomes active and ready to use on your
computer. Many customers dislike software activation because it is a form of "phoning home" and
though the access is declared, it can still be an inconvenience if the customer is off-line.
6. Separate Trial and Download
Another approach developers take to protect their software is that their trial version is completely
different from their registered version. After purchasing, the customer is given a new download location
to download the full registered version. The trial version is different than the registered version and it
cannot be cracked to increase functionality.
The registered download can be time limited and password protected to help minimize its effect in the
"wild", should a license be obtained through the use of a fraudulent credit card. FileKicker, a third party
file hosting service, has a number of optional controls in place to restrict download access.
7. Dongle Locking
Dongle locking is another form of hardware locking. The software will require the use of an external
piece of hardware (either connected to the parallel port or USB port) to "activate" the software. This is
unpopular simply because it causes additional points of failure and relies on something that can be easily
misplaced or lost.
It is generally difficult to locate lots of detail on software protection. Software developers tend not to
post or share their methods of protecting their software in the public. As a result the software
conferences and private member only forums tend to be the best places for getting detailed information
on the most effective ways to protect software.
10 prepared by: B. T
Shashemene Polly technique collage
of our system from power damages. If power is not protected properly it may bring damage of different
small chips as well as hardware components of our system.
COMPUTER HARDWARE LIFESPAN
Knowing the lifespan of your hardware can give you a heads up on protecting your data. For your
convenience, here is a quick rundown of the average lifespan of some of your typical hardware.
1. Modem :- 5 years (if you need a external modem-with satellite connection you need to make sure the
modem is well ventilated to extend the life of the modem.)
2. Computer: - 2 to 5 years (You're probably been left behind and will find that you need to upgrade
just to run the new programs)
3. Monitors : - In most cases your monitor will last for a long time and will not become obsolete
until the operating system(s) no longer supports the monitor. But when you have the opportunity, and
the money to upgrade you should upgrade, because the newer monitors can offer better protection for
your eyes and health.
4. Hard Drive : - 5 years at most - This is an easy upgrade, the main thing to remember is to check
your system. When purchasing a new hard drive be aware of the type of interface your PC uses. It can be
the older ATA interface or the new SATA. Always check your computer specifications. It can save you
a lot of headaches.
5. CD/DVD: 3 to 5 years. Upgrades should come when you need more speed and functionality.
6. Video cards: - 3 to 5 years. Don't need to upgrade the video card, unless you need more functionality.
Again check your stats for specifications.
7. USB Flash Drive: - 10 years
8. Printer :- 4 years. You can only stretch the usefulness of your printer as long as the company
updates the software for the printer. Once the software is obsolete, so it the printer.
INFORMATION LO2
Detecting and removing destructive
SHEET software
MODULE Protecting Application or System
Software
Definition of Virus
A virus is “a program that can ‘infect other programs by modifying them to include a possibly evolved
copy of itself. Virus is program that travel from one computer to another, using various methods, such as
programs that are not what they appear to be. Shareware downloaded from the Internet is a popular method for
spreading virus code. You really should seriously enforce a policy for any programs that are installed on any
computer in your network
How do viruses work?
Basic viruses typically require unwary computer users to inadvertently share or send them. Some viruses
that are more sophisticated, such as worms, can replicate and send themselves automatically to other
12 prepared by: B. T
Shashemene Polly technique collage
computers by controlling other software programs, such as an e-mail sharing application. Certain
viruses, called Trojans (named after the fabled Trojan horse), can falsely appear as a beneficial program
to coax users into downloading them. Some Trojans can even provide expected results while quietly
damaging your system or other networked computers at the same time.
Although it's good to be aware of these different types of viruses and how they work, what is most
important is that you keep your computer current with the latest updates and antivirus tools, stay current
about recent threats, and that you follow a few basic rules when surfing the Internet, downloading files,
and opening attachments. Once a virus is on your computer, its type or the method it used to get there is
not as critical as removing it and preventing further infection. Nothing can guarantee the security of your
computer 100 percent. However, you can continue to improve your computer's security and decrease the
possibility of infection by keeping your system up-to-date, maintaining a current antivirus software
subscription, and following a few best practices.
Common types of distractive software
A. Trojan horses
Trojan horses are programs that an intruder plants on one or more servers in your network. If you have
these types of programs, they can be difficult to detect, because many use the same filename as a file
that is already part of your operating system or application software. The Trojan horse program is
activated by some specific event, such as the arrival of a certain date, or by a user running a program
that has been replaced by the Trojan horse. This latter tactic is very popular. Some programs are not
what they appear to be.
B. Worms
Worms are usually considered to be self-propagating programs that travel through email as well as by
other means. A worm will replicate itself by sending copies of the software to all or most of the
addresses in your email address book. A worm travels through the Internet very quickly because of this
aspect of its replication. The solution? Don't open email attachments unless you have a good antivirus
program (which you have kept up-to-date). After you open an email that contains a worm virus, all heck
can break loose, and the friends in your address book will not be inclined to think very well of you!
C. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and
interrupt all of the operations executed by the system: corrupting files and programs that are opened,
closed, copied, renamed etc.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific
condition is met, the virus will go into action and infect files in the directory or folder that it is in and in
directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the
root directory of the hard disk and carries out certain operations when the computer is booted.
E. Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it
infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing
13 prepared by: B. T
Shashemene Polly technique collage
14 prepared by: B. T
Shashemene Polly technique collage
15 prepared by: B. T
Shashemene Polly technique collage
STEP 5: A message asking you to schedule a boot-time anti-virus scan of your local hard drive would
appear.
I recommend you to select No, because this scan could take a lot of time.
STEP 6: Once the setup process has been finished, restart your computer. Select Restart and click
Finish.
STEP 7: After you will restart your computer, two new icons in the bottom of the right corner of the
screen would appear.
The icon with "I" is the "Virus Recovery Database" (VRDB). It makes the copies of the
programs installed by you and if one of them gets infected with a virus, this will help in
replacing the infected file so that the program functions properly. However, the icon with
"A" is the On-Access Protection.
Note: After restarting your computer, right-click on icon with "A" in the task bar and select
"Updating".
Remark: These steps not mandatory for all ant viruses it is only for Avast antivirus
16 prepared by: B. T
Shashemene Polly technique collage
In case the entire system is infected, the system will have to be reinstalled.
Install the antivirus and the latest updates.
Restore the backup.
Detecting distractive software
If we can’t limit the spread of a virus, maybe we can find it and quarantine infected files…
Unfortunately, no general algorithm for detecting virus behavior is possible.
Cohen argues this by proposing a virus that infects only when the detection
algorithm thinks it isn’t a virus.
Anti-virus programs must make do with more limited solutions, such as scanning
for a virus signature
According to Cohen, the following are un decidable:
Detection of a virus by its appearance
Detection of a virus by its behavior
Detection of an evolution of a known virus
Detection of a triggering mechanism by its appearance
Detection of a triggering mechanism by its behavior
Detection of an evolution of a known triggering mechanism
Detection of a virus detector by its appearance
Detection of a virus detector by its behavior
Detection of an evolution of a known viral detector
OPERATION LO2
Detect and remove destructive software
SHEET MODULE Protecting Application or System
Software
STEP2: Another window with Read-Me file will appear, just click "Next" again.
STEP 3: Legal agreement would appear, click "I agree", and then click "Next" to continue.
STEP 4: I recommend you to use "Typical" installation.
Ensure that "Typical" has been selected by you and then click "Next".
17 prepared by: B. T
Shashemene Polly technique collage
STEP 5: A message asking you to schedule a boot-time anti-virus scan of your local hard drive would
appear.
I recommend you to select No, because this scan could take a lot of time.
STEP 6: Once the setup process has been finished, restart your computer. Select Restart and click
Finish.
STEP 7: After you will restart your computer, two new icons in the bottom of the right corner of the
screen would appear.
The icon with "I" is the "Virus Recovery Database" (VRDB). It makes the copies of the
programs installed by you and if one of them gets infected with a virus, this will help in
replacing the infected file so that the program functions properly. However, the icon with
"A" is the On-Access Protection.
PRECAUTIONS:
1. You can install a firewall to protect your computer when connected to Internet.
2. Don’t open suspicious attachments
3. Always keep your anti-virus software up-to-date by installing latest updates.
4. Download programs only from authentic websites
5. Make sure that you have read all security warnings, license agreements, and privacy
statements associated with any software you want to download.
QUALITY CRITERIAL: - The antivirus software should be updated regularly to retain its effectiveness
Remark
If you want to uninstall or remove Avast!
You can remove or uninstall Avast! Antivirus totally from your computer by the following the steps
These steps not mandatory for all anti viruses it is only for avast antivirus
INFORMATION LO3
Identify and take action to stop spam
SHEET MODULE Protecting Application or System
Software
18 prepared by: B. T
Shashemene Polly technique collage
What is spam?
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message
on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for
dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to
send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
There are two main types of spam, and they have different effects on Internet users.
Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long
experience, Usenet users have found that any message posted to so many newsgroups is often not
relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but
rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups
by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam
subverts the ability of system administrators and owners to manage the topics they accept on their
systems.
Email spam targets individual users with direct mail messages. Email spam lists are often created by
scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email
spam typically cost users money out-of-pocket to receive. Many people - anyone with measured phone
service - read or receive their mail while the meter is running, so to speak. Spam costs them additional
money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are
transmitted directly to subscribers. One particularly nasty variant of email spam is sending spam to
mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to
their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so
that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.
Ella
Ella is the smart Spam filter software. It keeps important email in your inbox, moves your electronic
newsletters into their own folder, and stops spam. With spam messages out of your way, email is
actually a productivity activity again!
What Does Spam Filter Software Do?
These days one cannot open their email without seeing countless spam messages in their inbox. For the
email-recipient, spam is easily recognized. However, the receiver of spam loses countless hours
manually deleting the intrusive messages from their inbox. Spam filter software can help mitigate this
19 prepared by: B. T
Shashemene Polly technique collage
overwhelming chore. Spam filter software can reduce the amount of junk mail delivered to a user's
inbox.
Shockingly, the content of spam email can range from the incomprehensible to the downright obscene.
Spam is dangerous to both the computer and its users. Junk mail can contain viruses, key loggers,
phishing attacks and more. These types of malware can comprise a user's sensitive private data by
capturing bank account information, usernames and passwords. Spam blocker applications can assist a
user in preventing these types of PC contaminations. Certainly, there are advantages to using a spam
blocker. However, no spam filter software is 100% effective. Despite this limitation, spam filter
software can assist parents in blocking email that contains pornography and other questionable content.
What to Look for in Spam Filter Software
The best spam filter software is easily customizable by computer users of all levels. The most important
feature of any spam filter software is the ability to reliably prevent and block spam. The spam filter
software you pick should support multiple email clients and webmail service providers. It is important to
choose a spam filter software that meets your needs and fits into the services and applications you use.
Below are the criteria Top Ten REVIEWS used to evaluate the best spam filter software:
Blocking/Filtering
Reliably blocking and filtering spam is the most valuable feature of any spam filter software. The spam
filter software should come equipped with multiple capabilities that prevent junk mail from
contaminating the user's inbox. The best spam filtering software has both black and white lists,
sensitivity settings, community-based filtering, challenge and response techniques, and quarantine
settings. Additional features to evaluate are blocking by IP address, server, email address, and country
code.
Protection
Spam blocker apps should have the capability of protecting multiple user accounts with a single
installation. Moreover, the spam blocker must protect the user from email that contains worms, viruses,
Trojans, attachments with embedded key loggers and other malware. Additionally, robust spam filter
software can identify HTML email that contains phishing attacks designed to garner a user's sensitive
personal information.
Rules
The spam filter software should give the user the ability to edit predefined rule settings as well as the
creation of new rules. The best spam filter software can adapt to meet the needs of the user, not the other
way around.
Compatibility
when selecting a spam blocker, one needs to evaluate if the spam filtering software they select is
compatible with their current email client or webmail service provider. Common supported email clients
20 prepared by: B. T
Shashemene Polly technique collage
include Thunderbird, Outlook, Outlook Express and other POP3/SMPT applications. The spam filtering
software should also support several webmail service providers like Gmail, Yahoo, Hotmail and othe
JOB SHEET
I. Underpinning knowledge
A. Corrupt file
B. Damage hardware
C. Change file format
D. Convert the data to useable format
JOB SHEET
21 prepared by: B. T
Shashemene Polly technique collage
Laboratory
Materials Required
Procedure
Evaluation
22 prepared by: B. T