• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Shareware and Its Network Security

Extracts from this document...

Introduction

Shareware and Its Network Security The creation of the concept sharewares was one of the most revolutionary innovations of the 1980's. This new idea allowed the development of an online community of program users that do not need to rely on just retailers. A Shareware is a method of software distribution that distributes softwares for free to download and use. Shareware programs usually are programs one may buy from any computer store, but comes with the advantage of being able to try it out before actually buying it. However, this software is not the full package and comes with basic limitations. Sharewares may comprise of many kinds of softwares that involves: games, software, word processing, real estate, personal finance, etc. The concept of shareware was originally started in 1982 coined as the term "freeware". It was developed by two programmers named Andrew Fluegleman and Jim Knopf who in fact invented this method from soft ware piracy. ...read more.

Middle

Shareware programs are very broad and encompass many types of programs that are useful to the casual gamer to the busiest businessman. However, with the busier traffic and ever expanding internet, the issue of security is increasing. To learn more about the security protocols and flaws of the shareware networking, one must learn about the general operation of the internet and its networking facilities. The internet is fundamentally a vast network of networks. A computer network is a connection of many computers through land or wireless means. An internet is a vast network that is hosted by many servers that host many other local networks all through wireless means. The computers are hosted through the Internet Protocol or the IP address that specifies a computer's network address to which it is accessed to by other computers or networks. Another computer may be accessed easily if handled by an experienced user or professional. This is a major security flaw in any network system as one may hack into another system without much difficulty. ...read more.

Conclusion

These can also be run into any networks like shareware networks that may be created by a criminal to steal credit card or to advertise spam. Although sharewares have been very revolutionary to the computer world as they allow quicker solutions to frequent and active users, they also come with the price of the same network security flaws as that of any unsecured networks over the internet. The hundreds of millions of people who use the internet on a regular basis are more often than not unaware of such dangers hidden. One may consider the dangers of only "the computer got hacked," but the implications are far more meaningful as faceless criminal lurk every corner of the cyber world without traces and may prey upon an innocent victim not only steal personal information, but also they may target a business and thieve millions of dollars to the unsuspecting. One must always be aware of the existence of such issues and be careful when using sharewares and especially its network, because the author or any experienced user is a potential hacker. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    This means I can spend valuable time on more important or interesting issues such as adding more detail into the letter to ensure it is up to the highest standard. By communicating through sent letters, I am issuing costs to my business by having to pay for postage for my clients.

  2. ICT Systems in Everyday Life: Your Local Community

    It was affordable and could be set up with a minimum of difficulty. The next bi step in the technology was allowing for four cameras to be connected to the monitor simultaneously. The view could be programmed to cycle through the available cameras of go to a particular camera chosen by the user.

  1. Free essay

    Impact of ICT in Community

    Mary also use it up and down she uses at all time. So if you're using it left and right and up and down, you're still going to get to something with your cane before you move it back down.

  2. Unit 23: Investigating Communications and Networks

    features a single cable to which all workstations and peripherals are connected. In this respect, ring topology marginally resembles bus topology. The difference is that a ring network's backbone is a closed loop as shown in the diagram below. Advantages of a Ring Topology * Fast data transfer as the

  1. Presentation about computers

    If I have time I will add extra pages at the end looking at different sorts of printers, and input devices, e.g. cameras and scanners. I want all the pages to have the same sort of look, so I will use the same background idea but different colours.

  2. Information Security.

    even if you do not believe you have valuable assets it is still worth keeping hackers out of your machine. The Need For Data Security Each major advance in information technology changes our ideas about data security. Consider the use of written messages to replace those carried in the memory of a messenger.

  1. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    Introduction to GPRS - 2.1 General Packet Radio Service * GPRS is the abbreviation of General Packet Radio Service. * It's an impressive growth of mobile communication industry. * It is a new non-voice value added service that allows information to be sent and received across a mobile telephone network.

  2. Discuss the factors determining network specification for a small business.

    The pairs are twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs. Twisting the wires enhances the cancellation effect. This occurs when two wires are close together in a circuit a circular magnetic field is created.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work