Sunday 8 September 2013

SCL 2 (QUESTION 2) : COMPTER SOFTWARE

2. Discuss different types of threats and malicious program (malware) that can damage a  computer, mobile device or disrupt any system.

Search for information on current known malware program. Based on the information that you have found, create a table to list different types of malware, what it does, and how it can be repaired or removed. These information is useful for you to prevent any malware from damage your computer system.


TYPES OF MALWARE
DESCRIPTION
WAYS OF REPAIRING
WORMS
A malware computer program that can self-replicate in order to spread to other computers. Some of worms might delete and encrypt files or send documents via e-mail.










                       
1.Download and extract the Autoruns program by Sysinternal to C:/Autoruns
2.Reboot into Safe Mode
3.Navigate to the C:/Autoruns folder and double click o autoruns.exe
4.Click on the option menu and enable the following options:
  -include empty location
  -verify code signatures
  -hide signed Microsoft entries
5.Refresh the start-ups list using these new settings
6.Look through the filename that you want to remove
7.To delete the entry that is associated with the malware, right click on the entry and select delete.        Hence it will removed from Registry.
8.Reboot into normal mode when done with removing malware entries



ROOTKIT
Is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.

Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information, modify system configurations, after software, install concealed malware, or control the comyter as part of a bootnet.

BOT
A software that uses your computer without your knowledge to send spam, host a phishing site, or steal your identity by monitoring your keystrokes
To safeguard against malicious bots:
Install security software
Configure your software’s
settings to update
automatically.
Increase the security
Settings on your browser
Limit your rights when
online.
Never click on attachments
unless you can verify the
source.
Ensure that your system is
patched with the most current
Microsoft Windows Update.
Set your computer’s
security settings to update
automatically

VIRUSES
It can be used for identity theft, slow down computer significantly, erase information and destroy vital data.

Use anti-virus program to remove a virus from computer


Contributed by Muhammad Tauffiq Bin Khirham (A1300609)
                       Aiman Hakim Bin Hashim (A1300053)

SCL 2 (QUESTION NO.1) : COMPUTER SOFTWARE

What is open software?

Open-source software (OSS) is computer software with its source code made available and licensed with license in which the copyright holder provides rights to study, change and distribute the software to anyone and for any purpose. Open-source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-granted content or (legally defined) open-content movements.

In your opinion, why people prefer to open source software over proprietary alternatives nowdays?

Based on comparison below:

Open source
Type of software
Close souce
(proprietary)
FREE
Price
Paid (usually expensive)
enable
Source code modification
Disable (only organization)
free
Source code
Requires a license fee

            That shows that why people prefer to open source software over proprietary alternatives. This is because they can modify and shared. The cost free too.


Most popular open source software versus most popular proprietary software


Open software
Example of software
Close software
1.Libre office

1.Microsoft office
2.LINUx

2. Microsoft windows
3.firefox

3. internet explorer
4. AVG antivirus
4. Norton antivirus
5.Frost wire
6. lime wire
Open for all
SOURCE
Closed (only for paid)
Free
cost
Additional charge may be added
easy
Accessibility on feature
Limited
Community users
Supporter by
Vendor at cost

  Created by:
  mohamad hanif bin mohamad ariffin (a1300434)
  Muhammad mursyid BIN MUHIDIn (A1301293)

SCL 3 (QUESTION NO.1) : OPERATING SYSTEM AND FILE MANAGEMENT

SCL 3: OPERATING SYSTEMS AND FILE MANAGEMENT


·        List down all the operating system used in a desktop/laptop today and find good descriptions of how operating systems work? Hence, state their advantages and disadvantages.


The operating system used today:
  
                 Microsoft Windows
  
        Mac OS
  
        Unix and Linux



                  DOS


How operating systems work?

An operating system (OS) is a collection of software that manages hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.



An operating system helps the computer do a lot of amazing things, and, broadly speaking, it works in two basic ways:
·         First, the computer's operating system coordinates the demands that the computer's software makes on its hardware, especially the central processing unit. Each piece of software running on the computer ideally would like to have the undivided attention of its hardware. It's the operating system's job to make sure that each application gets its fair share of the computer's finite resources in the most efficient way possible.

·         Second, the operating system provides a consistent set of rules for applications to use in order to be able to interface with the computer's hardware. The system's application program interface lets developers create software that will run on computers of the same type even if the hardware is different or open to change.





  Advantages and Disadvantages of Operating Systems


Operating system
advantages
disadvantages
Microsoft windows
·         Provides ready-made solutions that can be implemented by anyone who’s use the computer.
·         Big in size
·         Easy to attack by virus and malicious software.
·         Not strong enough for high security.


Mac OS
·         Custom-made to work with Apple’s hardware that gives it a level of efficiency, power, and stability.
·         Not easily affected by the virus.
·         Expensive
·         Could not assembled on its own


UNIX
·         There’s a lot of security build that why they don’t get hacked.
·         Compatible for user-level programs.
·         Lack of use in the consumer market.
·         Did not use the same file format for others program.
LINUX
·         Easy to update and installed
·         100% free software.
·         Not usually use by office workers.
·         Learning curve for new people to Linux
DOS
·         Will run on a much smaller system.
·         Easier to write special purpose programs.
·         Not compatible with current browsers and most internet.
·         Very few programs available.



This task is completed by :
1.      Ruth Vanessa ak Retel ( A1301090 )
2.      Dayangku Nur Hamiza bt Awing Kedari ( A1300197 )
3.      Nur Shahirah bt Mohd Shaharin ( A1300884 )
4.      Mizana bt Ameri ( A1300423 )