In this Assessment I will be talking about the range of utility available such as AVG, Norton, Zone alarm and Mcafee. All these software utility contain features such as Virus protection, Anti spyware, Firewalls, Clean up tools and Drive formatting.
Main types of utility software are:
Norton
Mcafee
Zonealarm
AVG
Virus protection
Virus Protection protects allows the user to be protected from the risk of infection from viruses that may invade your pc. New viruses are always being coded all the time no matter what protection or how much protection you have, the users have in place but with the right software utility software and virus protection viruses can be avoided. Everyone who uses internet or email is in the risk from viruses, Trojans and hackers.
Examples and Image:
How it works:
Virus Protection is a software utility which has all the equipment need to keep the computer safe and away from viruses such as it will include, Firewall, Anti Virus etc and each one of the utility performs individual task and it scans the computer for any viruses that could be in the pc, so each utility does it all task to keep the user safe.
Remarks:
This software is good as it covers all aspects of enabling you to be safe and make different utility do different tasks, which would benefits the user.
Virus scanner software:
The virus scanner software simply scans the computer for any viruses which may be around.
Detail Description:
Examples and Image:
How it works:
Remarks:
Start up virus scanner:
When the computer is turned on by the user, a start up virus scanner is used to run the computer for viruses and gives the user notice that viruses are on their pc.
Detail Description:
Examples and Image:
How it works:
Remarks: I think that is not as good as scanning is not generally need when the pc is start and the user can chose to scan later on if they wish to.
Behaviour-based detector
Memory resident scanner that watches for behaviour that will indicate presence of virus and shows to the users of what they may be accepting to or allowing accepting.
Detail Description:
Examples and Image:
How it works:
Remarks:
Memory resident virus scanner software
Detail Description:
Memory resident refers to a part of file-level antivirus software that is loaded in memory at all times. It checks all files that are being used on the hard disk and computer memory.
Examples and Image:
How it works:
Remarks: I think that this utility is good for the user as it scans the computer memory and the files inside the memory for any viruses.
Firewalls
Detail Description:
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.
Examples and Image:
How it works:
A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
Remarks: I think is program is useful and good as it protects you from incoming unwanted access and keep our important information safe and it quick and easy to use and follow.
Cookies:
Detail Description:
A very small text file placed on your hard drive by a Web Page server. It is essentially your identification card, and cannot be executed as code or deliver viruses. It is uniquely yours and can only be read by the server that gave a cookie purpose is.
Examples and Image:
How it works:
The way the cookies work is that it tells a server that you returned to that Web page. it helps the users by saving time for example when a user register or signs up to an product or service next type you go back on the page you might find you can see you email address or password.
Remarks:
I think that cookies are not as good as they are small text file which hardly means much and can't affect your computer in any form but they are easily delete
Anti-spyware
Detail Description:
Antispyware helps protect you the users computer against pop-ups, slow performance, and security threats caused by spyware and other people that may try to access your files. To keep up with the latest forms of spyware, you must keep your antispyware updated.
Examples and Image:
How it works:
Anti Spyware software scans the computer hard-drive for any spyware files that have been picked up through internet browsing by the users. Once founded by the software it sends a message into the system to match its database lists. Users are then given the choice of deleting or quarantining the file. It works on the same mechanism of antivirus systems; however
Scanning Hard disk: Anti spyware software performs hard disk scanning
Scanning Memory Files: The anti spyware program checks for spyware files in memory that is currently running.
Scanning Registry Files: These programs search for changes on operating system configuration files by any of the spyware.
URL monitoring: If you allow the anti spyware to run continuously, it will detect threat from any malicious programs, and tests them against the spyware database.
Remarks:
Anti-spyware in my opinion is a good software with all the pop ups and stuff that appear this program keep them out and its easy to set as it only requires an "on" or "off" settings
Defragmentation
Detail Description:
Defragmenting is what you need to do when your files on your computer are "fragmented". What Fragmented simply means is when the files are broken up into pieces (or fragments), so The program puts together related bits of information and files that may have gotten separated which done correctly can make your computer run faster.
Examples and Image:
How it works:
What the defragmenting process does is that it sorts through all of the scattered data on the disk. The defragmentation program reads each sector of the drive and marks them as movable, unmovable or unwritable, once every sector of the drive has been marked; the program goes through the files again to defragment them. During this process, the program finds the other pieces of each file and moves them as close together as possible.
Remarks:
I'm not so keen on this program because its time consuming eventhough at the end of it, your computer has a better performance, it take too to long
Internet histories
Detail Description:
Examples and Image:
How it works:
When you visit a website on the Internet the software which operates your computer, will automatically create a log of the websites that you have visited or clicked on. This log is referred to as the Internet History and is designed to make it easier for you the user to revisit those sites at a future date without having to retype the full web address again. For example you may type the name of the website you wish to look at the address box automatically fills in the name or at least gives the closest name to it.
Remarks:
I think this a good program because its quick and simple saves times instead of typing the whole thing out again you can just go to the internet history and find the day you visited the website and find the site
Drive formatting
Detail Description:
Examples and Image:
How it works:
Remarks: