• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Shareware and Its Network Security

Extracts from this document...

Introduction

Shareware and Its Network Security The creation of the concept sharewares was one of the most revolutionary innovations of the 1980's. This new idea allowed the development of an online community of program users that do not need to rely on just retailers. A Shareware is a method of software distribution that distributes softwares for free to download and use. Shareware programs usually are programs one may buy from any computer store, but comes with the advantage of being able to try it out before actually buying it. However, this software is not the full package and comes with basic limitations. Sharewares may comprise of many kinds of softwares that involves: games, software, word processing, real estate, personal finance, etc. The concept of shareware was originally started in 1982 coined as the term "freeware". It was developed by two programmers named Andrew Fluegleman and Jim Knopf who in fact invented this method from soft ware piracy. ...read more.

Middle

Shareware programs are very broad and encompass many types of programs that are useful to the casual gamer to the busiest businessman. However, with the busier traffic and ever expanding internet, the issue of security is increasing. To learn more about the security protocols and flaws of the shareware networking, one must learn about the general operation of the internet and its networking facilities. The internet is fundamentally a vast network of networks. A computer network is a connection of many computers through land or wireless means. An internet is a vast network that is hosted by many servers that host many other local networks all through wireless means. The computers are hosted through the Internet Protocol or the IP address that specifies a computer's network address to which it is accessed to by other computers or networks. Another computer may be accessed easily if handled by an experienced user or professional. This is a major security flaw in any network system as one may hack into another system without much difficulty. ...read more.

Conclusion

These can also be run into any networks like shareware networks that may be created by a criminal to steal credit card or to advertise spam. Although sharewares have been very revolutionary to the computer world as they allow quicker solutions to frequent and active users, they also come with the price of the same network security flaws as that of any unsecured networks over the internet. The hundreds of millions of people who use the internet on a regular basis are more often than not unaware of such dangers hidden. One may consider the dangers of only "the computer got hacked," but the implications are far more meaningful as faceless criminal lurk every corner of the cyber world without traces and may prey upon an innocent victim not only steal personal information, but also they may target a business and thieve millions of dollars to the unsuspecting. One must always be aware of the existence of such issues and be careful when using sharewares and especially its network, because the author or any experienced user is a potential hacker. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    Also, by using letters to communicate with clients I am able to introduce a unforgettable message which will remain noticeable towards the client, instead of communicating verbally. This can also help to reiterate the letters importance, what's on the letter, and the logo, colours and fonts used in the letter to help promote my company's image.

  2. Internet Protocol V6

    22 23 24 25 26 27 28 29 30 31 32 Version Traffic class Flow Label Payload Length Next header Hop limit Source IP address Destination IP address Payload <= 65 5356 bytes The only similarities between the Ipv4 and Ipv6 headers are the version number field, and the source/destination fields.

  1. ICT Systems in Everyday Life: Your Local Community

    The most basic CCTV system will consist of cameras and a television monitor; but most will also include a recording device, typically a video recorder but increasingly a more versatile digital disk recorder. A basic CCTV system may act as a general deterrent to crime; but unless it is being

  2. Free essay

    Impact of ICT in Community

    How does it meet Mary needs? You never know what kind of construction they're going to do or what part of the bus tunnel they're going to close down or whatever the case. It's good to have a technology like the Digital Ultra Cane it meets Mary needs as

  1. Unit 23: Investigating Communications and Networks

    * Terminators are required at both ends of the backbone cable. * Difficult to identify the problem if the entire network shuts down. * Not meant to be used as a stand-alone solution in a large building. * More users mean that the network is slower Ring - This topology

  2. Presentation about computers

    Designing my pages I will need a page or more at the beginning explaining the parts of a PC - processor, memory, input devices, output devices and backing storage. Then I will have a page or two for each PC I found - the top of the range laptop, the

  1. Information Security.

    even if you do not believe you have valuable assets it is still worth keeping hackers out of your machine. The Need For Data Security Each major advance in information technology changes our ideas about data security. Consider the use of written messages to replace those carried in the memory of a messenger.

  2. Discuss the factors determining network specification for a small business.

    The pairs are twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs. Twisting the wires enhances the cancellation effect. This occurs when two wires are close together in a circuit a circular magnetic field is created.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work