0% found this document useful (0 votes)
23 views8 pages

Short Note For Protecting Application or System Software

Uploaded by

Legesse Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views8 pages

Short Note For Protecting Application or System Software

Uploaded by

Legesse Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

World Bright College

Course Title: Protect Application or System Software

Module Code: EIS HNS1 M03 03

Prepared by: Legesse.S


UNIT-1

Controlling ensure user accounts


What is user account?
User account is a collection of information that tells Windows what files and folders you can
access, what changes you can make to the computer, and your personal preferences, such as your
desktop background or color theme.

There are three different kinds of user accounts:

1. Standard or Limited User


The limited account is intended for someone who should be prohibited from changing most
computer settings and deleting important files. A user with a limited account
If your account type is limited account type
 You change and remove your password
 Change picture, themes and other desktop setting
 View file you created
 View file in shared document folder
 Users with a limited account cannot always install the programs to install it.
 Depending on the program the users might need the administrator privileges

2. Administrator User
If your account type is computer administrator
Create password and remove
Create change and delete account
Make system wide changes
Install a program and access all file
Manage another user kind
Perform any task

3. Guest user
The guest account is intended for use by someone who has no user account on the computer.
There is no password for the guest account, so the user can log on quickly to check e-mail or
browse the Internet.

The major activities that you perform when you are doing with user account
Create user account
Modify user account
Create password (strong password, weak password)
Change password

Creating strong passwords


To help keep your computer more secure, you should use a strong password

1
For a password to be strong, it should:
 Be at least seven characters long. Because of the way passwords are encrypted,
the most secure passwords are seven or 14 characters long.
 Contain characters from each of the following three groups:

Group Examples

Letters (uppercase and lowercase) A, B, C... (and a, b, c...)

Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

Symbols (all characters not defined as letters or ~!@#$%^&*()_+-={}|[]\:";'


numerals)
<> ? , . /

 Have at least one symbol character in the second through sixth positions.
 Be significantly different from prior passwords.
 Not contain your name or user name.
 Not be a common word or name.

To create user account, follow the following procedure:


1. Click Start, and then click Control Panel. Click Performance and Maintenance, click
Administrative Tools, and then double-click Computer Management.
2. In the console tree, click Users.
Where?
 Computer Management
 System Tools
 Local Users and Groups
 Users
3. On the Action menu, click New user
4. Type the appropriate information in the dialog box.
5. Select or clear the check boxes for:
 user must change password at next logon
 user cannot change password
 Password never expires
 Account is disabled
6. Click account, and then click Close.

2
If you have a computer administrator account on the computer
1. Open User Accounts in Control Panel.
2. Click your account name.
3. Click Create a password.
4. In Type a new password and Type the new password again to confirm, type the password for
your account.
5. Click Create Password.
If you have a limited account on the computer
1. Open User Accounts in Control Panel.
2. Click Create a password.
3. In Type a new password and Type the new password again to confirm, type your password.
4. Click Create Password

Quality criterial
Enter descriptive or meaningful text in Type a word or phrase to use as a password hint to
help you remember your password.
Type your password and confirm it
Use understandable and strong password

UNIT-2
Detecting and removing destructive software
What is Virus?

A virus is “a program that can infect other programs” by modifying them to include a possibly
evolved copy of itself.”

Virus is program that travel from one computer to another, using various methods, such as
programs that are not what they appear to be.

How do viruses work?

Basic viruses typically require unwary computer users to inadvertently share or send them. Some
viruses that are more sophisticated, such as worms, can replicate and send themselves
automatically to other computers by controlling other software programs, such as an e-mail
sharing application.

Common types of distractive software


A. Trojan horses
Trojan horses are programs that an intruder plants on one or more servers in your network. If
you have these types of programs, they can be difficult to detect, because many use the same
filename as a file that is already part of your operating system or application software.

3
B. Worms
Worms are usually considered to be self-propagating programs that travel through email as
well as by other means. A worm will replicate itself by sending copies of the software to all or
most of the addresses in your email address book.
C. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can
overcome and interrupt all of the operations executed by the system: corrupting files and
programs that are opened, closed, copied, renamed etc.
D. Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or folder
that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch
file is always located in the root directory of the hard disk and carries out certain operations
when the computer is booted.
E. Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a
disk, in which information on the disk itself is stored together with a program that makes it
possible to boot (start) the computer from the disk.

Steps to help avoid viruses:


1. Visit Microsoft Update and turn on Automatic Updates.
2. Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in and
active).
3. Subscribe to industry standard antivirus software and keep it current.
4. Never open an e-mail attachment from someone you don't know.
5. Avoid opening an e-mail attachment from someone you know, unless you know exactly
what the attachment is. The sender may be unaware that it contains a virus.

How do I know if a virus has infected my computer?


Here are a few primary indicators that your system might be infected:
 Runs consistently slower than normal
 Stops responding or locks up often
 Crashes and restarts every few minutes
 Restarts on its own and then fails to run normally
 Applications don't work properly
 Disks or disk drives are inaccessible
 Printing doesn't work correctly
 You see unusual error messages
 You see distorted menus and dialog boxes
 Carry out a denial of service attack

4
 Crash the machine
 Randomly destroy data
 Perform password cracking …etc.

Install Anti-virus
What is Antivirus program?
An antivirus is a program that searches for, identifies and removes potential viruses
existing in the computer system.

Some of the most commonly and reliable antivirus programs available in the market are -
Symantec Norton antivirus
AVG antivirus
McAfee Scan
Microsoft Antivirus
Avast

To install anti-virus is a necessity, nowadays. But taking some precautionary measures can
prevent virus invasion.
 You can install a firewall to protect your computer when connected to Internet.
 Don’t open suspicious attachments.
 Always keep your anti-virus software up-to-date by installing latest updates.
 Download programs only from authentic websites.
 Make sure that you have read all security warnings, license agreements, and privacy
statements associated with any software you want to download.
Methods of Eliminating Viruses
Generally, the antivirus adopts one of two methods to eliminate the virus:
 Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.
 Quarantine – this is done when the virus cannot be easily identified removed from the
file and the removal of virus means the removal of the complete file.
Perform a Full System Scan
Even after the virus is removed from the system, the next step is to scan the whole system to
ensure that no infected files remain.

What if the Antivirus Fails?


It may happen that your antivirus fails to detect and get rid of the virus. In such a case, you can
follow the steps given below:
 Take a backup of the entire data.
 Format the infected disk partition.
 In case the entire system is infected, the system will have to be reinstalled.
 Install the antivirus and the latest updates.
 Restore the backup.

5
If you want to uninstall or remove Antivirus
You can remove or uninstall Avast! Antivirus totally from your computer by the following the
steps
1. Click on Start menu and then go to Control Panel.
2. Find Add or Remove Programs and click on it.
3. A new window will be opened and find Avast! from the installed program lists. Single click
on it and then click on Remove button.
4. After successful uninstallation, Restart your PC

UNIT-3
Identify and take action to stop spam
What is spam?
Spam is flooding the Internet with many copies of the same message, in an attempt to force the
message on people who would not otherwise choose to receive it.

There are two main types of spam, and they have different effects on Internet users.

1. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups.


Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give
their address away.
Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of
advertising or other irrelevant posts.
2. Email spam targets individual users with direct mail messages. Email spam lists are
often created by scanning Usenet postings, stealing Internet mailing lists, or searching the
Web for addresses. Email spam typically cost users money out-of-pocket to receive.

Spam Filter Software’s


Ella
Ella is the smart Spam filter software. It keeps important email in your inbox, moves your
electronic newsletters into their own folder, and stops spam.

What Does Spam Filter Software Do?


Spam filter software can help mitigate this overwhelming chore. Spam filter software can reduce
the amount of junk mail delivered to a user's inbox.

Benefits of spam filter software


The most important feature of any spam filter software is the ability to reliably prevent and block
spam.
It is important to choose a spam filter software that meets your needs and fits into the services
and applications you use.

6
Below are the criteria Top REVIEWS used to evaluate the best spam filter software:
i. Blocking/Filtering
Reliably blocking and filtering spam is the most valuable feature of any spam filter software. The
spam filter software should come equipped with multiple capabilities that prevent junk mail from
contaminating the user's inbox.
ii. Protection
Spam blocker apps should have the capability of protecting multiple user accounts with a single
installation.
iii. Rules
The spam filter software should give the user the ability to edit predefined rule settings as well as
the creation of new rules.
iv. Compatibility
When selecting a spam blocker, one needs to evaluate if the spam filtering software they select is
compatible with their current email client or webmail service provider.
 The spam filtering software should also support several webmail service providers like
Gmail, Yahoo, Hotmail and others.

Phishing and Hoaxes


Phishing is a phony communication
Attempts to scam someone into sending vital information
Hoaxes are attempts to scam people into sending money, or join a chain letter.
Hackers
 Anyone who unlawfully accesses a computer system
Types of hackers:
 White-hat
 Black-hat
 Script kiddies
What Hackers Do?
 Steal information from computers:
 Credit card numbers
 Bank account numbers
 Internet packet sniffing
 Commit identity theft
Denial of Service Attacks
 Backdoor programs
 Trojan horse
 Zombies

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy