Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Computer Basics.docx
Скачиваний:
7
Добавлен:
24.11.2019
Размер:
3.92 Mб
Скачать

Applications: Security & Utility

There are many categories of special purpose programs that are generally called Utility Programs. Some of these just tweak the user interface and some perform highly technical tasks.

The Security Programs that help keep the bad guys from messing with your computer and its data are the most important type of utility program.

Security Programs

To do a good job of keeping your computer safe from random visitors or from crime syndicates, you need several types of programs.

Types of security programs:

  • Anti-malware: Continuously watches for incoming attacks. Scans regularly for hidden malware (a virus, trojan, worm or other intrusive software). Repairs many kinds of damage. Anti-virus is the old name for these programs but current versions deal with much more than just computer viruses.

  • Firewall: Controls who gets into your computer from the Internet or other network connection.

  • Anti-spam: Examines incoming email and sends known or suspected bad messages to a special folder, Spam or Junk.

Purpose:

  • To avoid or repair damage from malware

Major Advantage:

  • Protection is easier than recovering from a malware disaster

Major Disadvantage:

  • Must be configured correctly to work effectively.

  • Must be updated regularly with new definitions

Examples of security programs, some of which include several programs: Norton Security Suite, Microsoft Security Essentials, Avira AntiVirus, Windows Firewall, Norton 360, Trend Micro Internet Security Plus, Zone Alarm

Utility Programs

There are many categories of utility programs, including security software. What is counted as a utility program depends on who is doing the counting! The usual definition is that a utility program is not application software that the user uses to create something, like a document or image, nor is it a game or a browser. It does something to way the computer looks or behaves, often in the background. [Some web sites that sell software include a lot more in their Utility category, including games(!), money management software, genealogy software, course management software, and many more.]

Over time, features and services that used to be available only through a utility program get included in the operating system or as part of the program the program was designed to modify. Nothing changes more and faster than the world of computers!

Purpose:

  • To customize the way the computer behaves, making it more efficient or easier or safer to use.

Major Advantage:

  • Better features or better user interface than what comes with the operating system.

  • Special features for keeping your computer running well.

  • Configuring your computer to suit the way you work.

Major Disadvantage:

  • Many are very technical and require some expertise to use.

Examples:

  • Parental control programs block access (especially for children) to web sites that are not suitable or are more likely to result in malware attacks - NetNanny, K9 Web Protection, some operating systems include some features.

  • Encryption programs encode your data so that to read it the user must have the right key code. Some operating systems include some type of encryption. Could be for the whole disk, selected folders, or selected files.

  • Password management software remembers all of your logon and password information so that you only have to remember how to get into the password software - one thing!  The file that records your passwords is encrypted - Password Safe, Roboform, KeePass.

  • Back-up and file synchronization software can automatically save a copy of your data or the whole computer's contents to DVDs, tape, or to a data site online. To be prepared in case a disaster happens, whether it is a security issue or a dead hard drive issue, you need a back-up copy of your important data - Windows Backup & Restore, Norton 360, Norton Ghost. Online file storage - Carbonite. File storage with synchronization: Dropbox, Box, Microsoft Skydrive, Google Drive

  • Disk defragmenting  software rearranges files so that all parts of the file are next to each other. The computer will scatter pieces of a file all over the disk, wherever there is some room. Defragmenting makes it easier for the computer to find and display the file - Windows Disk Defragmenter, Norton SpeedDisk.

See System Software: Utilities for more discussion.

Applications: PIM

A PIM program (Personal Information Management) is a special kind of database. A PIM will normally include an address book, a calendar to schedule activities and appointments, and a to-do list where you list chores, calls to make, various things to do.

Some popular programs which include PIM functions are Microsoft Office Outlook, Lotus Organizer, Windows Calendar and Windows Contact List, Google Calendar and Google Notebook, Palm Desktop, Novell Groupwise.

New versions of these programs add email management, wireless access, and other features for the new, hot technologies. The new goal for a PIM seems to be to vanish into the background, while letting you have access to your email, calendar, and scheduling software from anywhere.

Example of a PIM: Microsoft Outlook

Purpose:

  • Tracking personal information like:

    • appointments

    • address book

    • email

    • birthdays

    • phone messages

    • notes on future projects

Major Advantage:

  • Quick access to schedule data and address book.

  • Can often be merged into documents directly.

Contact Manager

An advanced PIM may be called a Contact Manager. Such a program is optimized to make it easy to track who you have talked to or met with and what you did or said.

A contact manager automatically links a name in the address book to names in the calendar. Clicking on the name in the calendar brings up the full contact information, including fields for notes about what you did and reminders for what you need to do after the meeting or conversation. From the address book you can bring up a list of when you had contacts with this person. Powerful stuff!

Applications: Integrated & Suites

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]