Short Note For Protecting Application or System Software
Short Note For Protecting Application or System Software
2. Administrator User
If your account type is computer administrator
Create password and remove
Create change and delete account
Make system wide changes
Install a program and access all file
Manage another user kind
Perform any task
3. Guest user
The guest account is intended for use by someone who has no user account on the computer.
There is no password for the guest account, so the user can log on quickly to check e-mail or
browse the Internet.
The major activities that you perform when you are doing with user account
Create user account
Modify user account
Create password (strong password, weak password)
Change password
1
For a password to be strong, it should:
Be at least seven characters long. Because of the way passwords are encrypted,
the most secure passwords are seven or 14 characters long.
Contain characters from each of the following three groups:
Group Examples
Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Have at least one symbol character in the second through sixth positions.
Be significantly different from prior passwords.
Not contain your name or user name.
Not be a common word or name.
2
If you have a computer administrator account on the computer
1. Open User Accounts in Control Panel.
2. Click your account name.
3. Click Create a password.
4. In Type a new password and Type the new password again to confirm, type the password for
your account.
5. Click Create Password.
If you have a limited account on the computer
1. Open User Accounts in Control Panel.
2. Click Create a password.
3. In Type a new password and Type the new password again to confirm, type your password.
4. Click Create Password
Quality criterial
Enter descriptive or meaningful text in Type a word or phrase to use as a password hint to
help you remember your password.
Type your password and confirm it
Use understandable and strong password
UNIT-2
Detecting and removing destructive software
What is Virus?
A virus is “a program that can infect other programs” by modifying them to include a possibly
evolved copy of itself.”
Virus is program that travel from one computer to another, using various methods, such as
programs that are not what they appear to be.
Basic viruses typically require unwary computer users to inadvertently share or send them. Some
viruses that are more sophisticated, such as worms, can replicate and send themselves
automatically to other computers by controlling other software programs, such as an e-mail
sharing application.
3
B. Worms
Worms are usually considered to be self-propagating programs that travel through email as
well as by other means. A worm will replicate itself by sending copies of the software to all or
most of the addresses in your email address book.
C. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can
overcome and interrupt all of the operations executed by the system: corrupting files and
programs that are opened, closed, copied, renamed etc.
D. Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or folder
that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch
file is always located in the root directory of the hard disk and carries out certain operations
when the computer is booted.
E. Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a
disk, in which information on the disk itself is stored together with a program that makes it
possible to boot (start) the computer from the disk.
4
Crash the machine
Randomly destroy data
Perform password cracking …etc.
Install Anti-virus
What is Antivirus program?
An antivirus is a program that searches for, identifies and removes potential viruses
existing in the computer system.
Some of the most commonly and reliable antivirus programs available in the market are -
Symantec Norton antivirus
AVG antivirus
McAfee Scan
Microsoft Antivirus
Avast
To install anti-virus is a necessity, nowadays. But taking some precautionary measures can
prevent virus invasion.
You can install a firewall to protect your computer when connected to Internet.
Don’t open suspicious attachments.
Always keep your anti-virus software up-to-date by installing latest updates.
Download programs only from authentic websites.
Make sure that you have read all security warnings, license agreements, and privacy
statements associated with any software you want to download.
Methods of Eliminating Viruses
Generally, the antivirus adopts one of two methods to eliminate the virus:
Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.
Quarantine – this is done when the virus cannot be easily identified removed from the
file and the removal of virus means the removal of the complete file.
Perform a Full System Scan
Even after the virus is removed from the system, the next step is to scan the whole system to
ensure that no infected files remain.
5
If you want to uninstall or remove Antivirus
You can remove or uninstall Avast! Antivirus totally from your computer by the following the
steps
1. Click on Start menu and then go to Control Panel.
2. Find Add or Remove Programs and click on it.
3. A new window will be opened and find Avast! from the installed program lists. Single click
on it and then click on Remove button.
4. After successful uninstallation, Restart your PC
UNIT-3
Identify and take action to stop spam
What is spam?
Spam is flooding the Internet with many copies of the same message, in an attempt to force the
message on people who would not otherwise choose to receive it.
There are two main types of spam, and they have different effects on Internet users.
6
Below are the criteria Top REVIEWS used to evaluate the best spam filter software:
i. Blocking/Filtering
Reliably blocking and filtering spam is the most valuable feature of any spam filter software. The
spam filter software should come equipped with multiple capabilities that prevent junk mail from
contaminating the user's inbox.
ii. Protection
Spam blocker apps should have the capability of protecting multiple user accounts with a single
installation.
iii. Rules
The spam filter software should give the user the ability to edit predefined rule settings as well as
the creation of new rules.
iv. Compatibility
When selecting a spam blocker, one needs to evaluate if the spam filtering software they select is
compatible with their current email client or webmail service provider.
The spam filtering software should also support several webmail service providers like
Gmail, Yahoo, Hotmail and others.