• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Shareware and Its Network Security

Extracts from this document...

Introduction

Shareware and Its Network Security The creation of the concept sharewares was one of the most revolutionary innovations of the 1980's. This new idea allowed the development of an online community of program users that do not need to rely on just retailers. A Shareware is a method of software distribution that distributes softwares for free to download and use. Shareware programs usually are programs one may buy from any computer store, but comes with the advantage of being able to try it out before actually buying it. However, this software is not the full package and comes with basic limitations. Sharewares may comprise of many kinds of softwares that involves: games, software, word processing, real estate, personal finance, etc. The concept of shareware was originally started in 1982 coined as the term "freeware". It was developed by two programmers named Andrew Fluegleman and Jim Knopf who in fact invented this method from soft ware piracy. ...read more.

Middle

Shareware programs are very broad and encompass many types of programs that are useful to the casual gamer to the busiest businessman. However, with the busier traffic and ever expanding internet, the issue of security is increasing. To learn more about the security protocols and flaws of the shareware networking, one must learn about the general operation of the internet and its networking facilities. The internet is fundamentally a vast network of networks. A computer network is a connection of many computers through land or wireless means. An internet is a vast network that is hosted by many servers that host many other local networks all through wireless means. The computers are hosted through the Internet Protocol or the IP address that specifies a computer's network address to which it is accessed to by other computers or networks. Another computer may be accessed easily if handled by an experienced user or professional. This is a major security flaw in any network system as one may hack into another system without much difficulty. ...read more.

Conclusion

These can also be run into any networks like shareware networks that may be created by a criminal to steal credit card or to advertise spam. Although sharewares have been very revolutionary to the computer world as they allow quicker solutions to frequent and active users, they also come with the price of the same network security flaws as that of any unsecured networks over the internet. The hundreds of millions of people who use the internet on a regular basis are more often than not unaware of such dangers hidden. One may consider the dangers of only "the computer got hacked," but the implications are far more meaningful as faceless criminal lurk every corner of the cyber world without traces and may prey upon an innocent victim not only steal personal information, but also they may target a business and thieve millions of dollars to the unsuspecting. One must always be aware of the existence of such issues and be careful when using sharewares and especially its network, because the author or any experienced user is a potential hacker. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    This can then help to establish a strong connection between the company and my clients to ensure they are remaining morally pleased and can assume the company interacts effectively and sufficiently to leave them feeling pleased. This system of communication however can also waste paper, maximising costs and providing a low economic solution.

  2. ICT Systems in Everyday Life: Your Local Community

    The concept of CCTV is simple enough to understand. It is the application of such technology that still holds many undiscovered gems. Such a simple concept can be tapped for its limitless potential. And for the end user, it can serve as a great tool to accomplish many different things.

  1. Free essay

    Impact of ICT in Community

    If the batteries do run out while you are out with the Ultra Cane, you can simply use it as an ordinary white cane until you are able to replace or recharge The straight Digital Ultra canes function much better than their folding or telescoping counterparts; they aren't as wobbly and as heavy.

  2. Unit 23: Investigating Communications and Networks

    features a single cable to which all workstations and peripherals are connected. In this respect, ring topology marginally resembles bus topology. The difference is that a ring network's backbone is a closed loop as shown in the diagram below. Advantages of a Ring Topology * Fast data transfer as the

  1. Presentation about computers

    Designing my pages I will need a page or more at the beginning explaining the parts of a PC - processor, memory, input devices, output devices and backing storage. Then I will have a page or two for each PC I found - the top of the range laptop, the

  2. Information Security.

    even if you do not believe you have valuable assets it is still worth keeping hackers out of your machine. The Need For Data Security Each major advance in information technology changes our ideas about data security. Consider the use of written messages to replace those carried in the memory of a messenger.

  1. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    * Data rates increases as soon as the speed goes down. * It supplements today's Circuit Switched Data and Short Message Service. * GPRS utilizes packet switching technology where information is transmitted in short bursts of data over an IP-based network.

  2. Discuss the factors determining network specification for a small business.

    The pairs are twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs. Twisting the wires enhances the cancellation effect. This occurs when two wires are close together in a circuit a circular magnetic field is created.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work