• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Shareware and Its Network Security

Extracts from this document...

Introduction

Shareware and Its Network Security The creation of the concept sharewares was one of the most revolutionary innovations of the 1980's. This new idea allowed the development of an online community of program users that do not need to rely on just retailers. A Shareware is a method of software distribution that distributes softwares for free to download and use. Shareware programs usually are programs one may buy from any computer store, but comes with the advantage of being able to try it out before actually buying it. However, this software is not the full package and comes with basic limitations. Sharewares may comprise of many kinds of softwares that involves: games, software, word processing, real estate, personal finance, etc. The concept of shareware was originally started in 1982 coined as the term "freeware". It was developed by two programmers named Andrew Fluegleman and Jim Knopf who in fact invented this method from soft ware piracy. ...read more.

Middle

Shareware programs are very broad and encompass many types of programs that are useful to the casual gamer to the busiest businessman. However, with the busier traffic and ever expanding internet, the issue of security is increasing. To learn more about the security protocols and flaws of the shareware networking, one must learn about the general operation of the internet and its networking facilities. The internet is fundamentally a vast network of networks. A computer network is a connection of many computers through land or wireless means. An internet is a vast network that is hosted by many servers that host many other local networks all through wireless means. The computers are hosted through the Internet Protocol or the IP address that specifies a computer's network address to which it is accessed to by other computers or networks. Another computer may be accessed easily if handled by an experienced user or professional. This is a major security flaw in any network system as one may hack into another system without much difficulty. ...read more.

Conclusion

These can also be run into any networks like shareware networks that may be created by a criminal to steal credit card or to advertise spam. Although sharewares have been very revolutionary to the computer world as they allow quicker solutions to frequent and active users, they also come with the price of the same network security flaws as that of any unsecured networks over the internet. The hundreds of millions of people who use the internet on a regular basis are more often than not unaware of such dangers hidden. One may consider the dangers of only "the computer got hacked," but the implications are far more meaningful as faceless criminal lurk every corner of the cyber world without traces and may prey upon an innocent victim not only steal personal information, but also they may target a business and thieve millions of dollars to the unsuspecting. One must always be aware of the existence of such issues and be careful when using sharewares and especially its network, because the author or any experienced user is a potential hacker. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Internet Protocol V6

    This meant that networks containing just a few hundred hosts, that were too large for a class C addressing structure, were being allocated a class B addressing structure. This has resulted in thousands of wasted addresses, and has brought about a second major scalability problem - the premature depletion of class B address formats.

  2. Comparing documents

    Underneath that, they have got a table of all the stuff that they have ordered, the quantity and the total. Wessex Waters is similar to Coffee Controls, the receivers address is in a textbox, below the date on the left, beneath that is a table with the item, quantity, unit price, subtotal, total, VAT and total to pay.

  1. OCR GCSE Business & Communication Task 7 Report

    I also ensured my clients that information was only used for its collected purpose and would not be passed on or miss-used when in my company's possession. I will also insure client's files will be fully deleted when no longer needed therefore insuring client satisfaction.

  2. ICT Systems in Everyday Life: Your Local Community

    Their us on private property is also becoming popular, increasingly, police and local councils are placing camera systems into housing estates and red light districts. Residents Associations are independently organizing their own surveillance initiatives. Tens of thousands of cameras operate in public places, in phone booths, vending machines, buses, trains, taxis, alongside motorways and inside Automatic Taller (Cash)

  1. Free essay

    Impact of ICT in Community

    This will also improve her accuracy so if she get's use to using the Braille keyboard she will remember where a specific letter is so that would make her type the correct letter. Mary would be able to do a task as a normal person by using a Braille Keyboard.

  2. Unit 23: Investigating Communications and Networks

    features a single cable to which all workstations and peripherals are connected. In this respect, ring topology marginally resembles bus topology. The difference is that a ring network's backbone is a closed loop as shown in the diagram below. Advantages of a Ring Topology * Fast data transfer as the

  1. Presentation about computers

    I could have used the one from the newspaper advert but it would be harder to get the information onto the computer, and it is more of a middle range computer, which is not what I really wanted. I want to show people the full range of what you can buy, and hopefully help them understand the difference.

  2. Information Security.

    even if you do not believe you have valuable assets it is still worth keeping hackers out of your machine. The Need For Data Security Each major advance in information technology changes our ideas about data security. Consider the use of written messages to replace those carried in the memory of a messenger.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work