• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Shareware and Its Network Security

Extracts from this document...

Introduction

Shareware and Its Network Security The creation of the concept sharewares was one of the most revolutionary innovations of the 1980's. This new idea allowed the development of an online community of program users that do not need to rely on just retailers. A Shareware is a method of software distribution that distributes softwares for free to download and use. Shareware programs usually are programs one may buy from any computer store, but comes with the advantage of being able to try it out before actually buying it. However, this software is not the full package and comes with basic limitations. Sharewares may comprise of many kinds of softwares that involves: games, software, word processing, real estate, personal finance, etc. The concept of shareware was originally started in 1982 coined as the term "freeware". It was developed by two programmers named Andrew Fluegleman and Jim Knopf who in fact invented this method from soft ware piracy. ...read more.

Middle

Shareware programs are very broad and encompass many types of programs that are useful to the casual gamer to the busiest businessman. However, with the busier traffic and ever expanding internet, the issue of security is increasing. To learn more about the security protocols and flaws of the shareware networking, one must learn about the general operation of the internet and its networking facilities. The internet is fundamentally a vast network of networks. A computer network is a connection of many computers through land or wireless means. An internet is a vast network that is hosted by many servers that host many other local networks all through wireless means. The computers are hosted through the Internet Protocol or the IP address that specifies a computer's network address to which it is accessed to by other computers or networks. Another computer may be accessed easily if handled by an experienced user or professional. This is a major security flaw in any network system as one may hack into another system without much difficulty. ...read more.

Conclusion

These can also be run into any networks like shareware networks that may be created by a criminal to steal credit card or to advertise spam. Although sharewares have been very revolutionary to the computer world as they allow quicker solutions to frequent and active users, they also come with the price of the same network security flaws as that of any unsecured networks over the internet. The hundreds of millions of people who use the internet on a regular basis are more often than not unaware of such dangers hidden. One may consider the dangers of only "the computer got hacked," but the implications are far more meaningful as faceless criminal lurk every corner of the cyber world without traces and may prey upon an innocent victim not only steal personal information, but also they may target a business and thieve millions of dollars to the unsuspecting. One must always be aware of the existence of such issues and be careful when using sharewares and especially its network, because the author or any experienced user is a potential hacker. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    This can be done by removing the copy tool when a viewer would right click on the report. I must also ensure my report has been fully approved and notified of by Amanda Barfoot before being published onto the internet.

  2. ICT Systems in Everyday Life: Your Local Community

    Nonetheless, it is because of the concern for quality that the definition has taken the form that it has. With our well-founded definition as a starting point, let's explore other issues behind digital cinema. Our definition of digital cinema allows us to split the universe of theatrical presentation into digital cinema and everything else.

  1. Free essay

    Impact of ICT in Community

    Why Mary Cox does use Chrome Talking Watch? > Tells time in pleasant male and female voice > Speaks time and date > Talking alarm with 20 second beep sound > Talking stopwatch timer with elapsed time announcement > Talking count down timer that announces remaining time > Talking

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Each time customers login on to SK-II site, their username and password will immediately connect customers to their personalized profile which includes favorite products, skincare advice, beauty profile, new promotions, discount coupons and all relevant account information such as delivery address, credit card details and order history.

  1. Unit 23: Investigating Communications and Networks

    data travels in one direction * Ring networks can be easier to establish * Ring networks represent low initial overhead (that is, no need to purchase a hub, and each wire only has to connect to the next workstation instead of having all wires come back to the hub).

  2. Presentation about computers

    I want my pages to be interesting to people my own age, so they must be colourful and easy to read. I have designed the basic layout of the first four pages. The other computers will be the same basic layout as page 4, but different colours.

  1. Information Security.

    even if you do not believe you have valuable assets it is still worth keeping hackers out of your machine. The Need For Data Security Each major advance in information technology changes our ideas about data security. Consider the use of written messages to replace those carried in the memory of a messenger.

  2. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    * Data rates increases as soon as the speed goes down. * It supplements today's Circuit Switched Data and Short Message Service. * GPRS utilizes packet switching technology where information is transmitted in short bursts of data over an IP-based network.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work