Sunday, August 10, 2014

Review of Basic Information and Communication Technology Concepts: Software (Part 2)

Software refers to the set of instructions that allow the human user to enter data or another instruction (command) to the computer. If we use the human as an analogy to the computing system, the hardware refers to the physical body while the software refers to its consciousness.

Software can be generally classified into two types: Application and Utility.

Application Software

Shortened to applications or "app," this is the type which you are most familiar with and you use consciously. This software type is created to perform specific tasks for end users. An example is the Microsoft Word, Adobe Premiere Pro, or GIMP (graphical image manipulation program). For mobile operating systems like iOS and Android, you have GMail app, Twitter app, or Mozilla Firefox app.

System Software

This type handles instructions specific to technology management and coordinates the interaction of all technology devices. This can be further subdivided into:

  • Operating System – Provides an environment for all applications as well as acts as the primary interpreter between the hardware devices and the applications. It also manages the hardware and other resources of the computing system. There are three main families of operating systems in the market today for desktop and server computers: Microsoft Windows (eg, 2000, XP, Vista, Windows 7), Macintosh (eg 10.4 Tiger and 10.5 Snow Leopard) and Linux (eg, Debian, Ubuntu, Red Hat Linux). For mobile (including tablets), we currently have iOS, Android (which is a Linux derivative), Firefox OS (also Linux-based), and Windows Phone OS. 
  • Utility Software – Provides additional functionality related to management of the computing system. Antivirus software, repair utility software and defragmentation tools are examples of utility software.

Programming Languages

This refers to a special set of software which creates other software. Examples here are C, C++, Visual BASIC, COBOL (Common Business Oriented Language), FORTRAN, BASIC, and others.

Programming languages mimic human (high level) language. Once the source code (the human-readable text of computer instructions), the programming language compiles them to become the set of instructions which the computer could understand.

Malicious Software

Shortened to "malware," this encompasses a broad range of software that are basically designed to harm your system, secretly gather data, or assist in a nasty plan. Computer viruses, Trojan horses, worms, spyware, adware, among others, fall within this category.

  • Computer virus - A program that requires a command to execute (but of course, the command need not be an obvious command saying that the application is a virus) to replicate itself among the files or boot sector of a computer. Sometimes, it just replicates itself, which consumes storage space and slows down your computer, but others destroy data, or access private data, or use your email to send messages without you knowing it. It is distinctly called a "virus" because it attaches itself to a program or file. That is, if that particular file is removed (and it has not infected others), then the virus itself is removed.
  • Computer worm - A program like a virus, with most of the same bad characteristics, but this is a standalone program. It also has a distinct characteristic of infecting applications or data beyond a computer unit, but can replicate itself in a computer network. One of the common uses of a worm is to allow the worm's creator to take control of a computer that the worm has infected. 
  • Trojan horse - Named after its namesake from Greek mythology, a Trojan horse acts like a real software which you can install, however, once installed, it will do something else. Usually, Trojan horses create "backdoor," or security holes in an otherwise fairly secure system.
  • Spyware - Usually downloaded from websites, spyware, well, spies. Their primary function is to gather data from a host machine, without the system owner's consent. As Wikipedia detailed, "Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, unauthorized changes in browser settings, or changes to software settings."
  • Adware - More of nuisance than evil, adware basically allows its creator to send your computer advertisements. Of course, when you are working, you don't really like ads disturbing you, so it is still bad. 
  • Scareware - This is rather something new for me (like one or two years known to me). What scareware does it is it scares you to do something. The most common form of scareware that you may have seen is an ad in a website saying that your computer is infected by a virus, or your mobile phone is low on storage, and then the website offers you a solution. Commonly, the "solution" is an adware, a spyware, or maybe a valid software that will solve a problem, but the problem is that you did not have that problem in the first place. You were just tricked. 
Obviously, I focused more on the malware. This is to help you be aware of these threats to your system. So before you click something, make sure you know what it is, how it will affect your system, and that your system is adequately protected.

Rather than post something myself, I recommend that you read this fairly easy to understand post on how to stay safe when browsing from the US Computer Emergency Readiness Team (CERT).

No comments:

Post a Comment