StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Classification of the Applications - Assignment Example

Cite this document
Summary
The paper "Classification of the Applications" presents that K-9 is the computer program designed to provide parental control and content limitation for the definite users. Application effectively blocks the sites which are included in the filter of the application…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Classification of the Applications
Read Text Preview

Extract of sample "Classification of the Applications"

Classification of the Applications K-9 K-9 is computer program designed to provide parental control and content limitation for the definite users. Mainly it is content-filter. This application is designed by the Blue Coat Systems This application’s code is closed. This application compatible with: Microsoft windows systems, MAC OS X, Android, iOS. Application effectively blocks the sites which are included to the filter of the application. System is flexible and there are some categories of protection. With high category of protection, application blocks all incoming traffic from the listed sites and with monitor category of protection application only gathers information about the visit of the listed sites. Home user can install this application to block the access to the prohibited sites with some content which is inappropriate for children. Business user can use this application to maintain the control over the workers and block their access to the entertainment sites like social networks, browser games, etc. But workers can access the site included to the list of high category of protection. Hackers cannot use this application in some unacceptable way because even in case, of getting access to the configuration of the application hacker can only block the access to some certain sites and user of the computer can remove the application and reinstall it with the correct configurations. Prey Prey is quite effective software useful for tracking laptop, phone, tablet or other portable computer to remotely locate it and lock. User can find it even if the device is stolen. To do so, owner can log into the web-service and turn on the sounding of alarm or showing of onscreen message that will inform the thief about the search engaged for him. User can find the device even if he/she has lost it or left somewhere. To make it work user should install little software on desirable device and it will wait for the remote signal and will activate the system to track the location of the device. Moreover through the online service owner can gather all information about the device, lock it down, etc. This application has been developed by the Fork software company Code of the application is encrypted, therefore, other developers cannot download it and use for their purpose. This application supports following operating systems: Android 2+, iOS 4.3+, Mac OSX Tiger and up, Windows XP and up and Linux. Prey helps users to locate, lock down and trace the device to avoid losing of device. It is useful software for home user, because it helps to solve many issues with searching of a lost device. For business purposes managers can use Prey to lock down business phones, which are used by workers in unacceptable manner or to trace activity of the users. Moreover, with the right approach, Prey can help for logistic to track devices installed on the transports and to know their routes, to enhance logistic schemes. With enough experience, hacker can hack the main web interface and get keys and locations of the devices, to get personal information from them or just lock down them. However such scenario is almost impossible. Refor Keylogger Keylogger is software which register, store and supply information that is entered through the keyboard. Such application work implicitly and only one, who installed this application knows about its existence. This application is made by the company Refog Source code of this application is closed. This application is available for Windows XP+ and Mac OS. Home user can use this application to track activity of the children in the given computer. Application will store every information children enter or copy/paste on the computer, moreover it can capture random snapshots of the screen. Speaking about the business use of this application, manager can control the use of the corporate computers and control activity of the workers. With logging of entered messages, for instance, support chat, manager can get transcripts of the chats between support agents and the clients. Considering the usage of keylogger, it should be underlined that unauthorized running of the keylogger on the computer can get information to the hacker and this information can help to get access to the personal information bank accounts, etc. Keylogger logs every information user enters, it can contain logins and passwords, etc. And this information can be sent to the hacker. Wiggle.net Wi-Fi network scanner aimed on the searching of the available Wi-Fi maps on the map. Application’s code is closed It supports only android OS. This software created to show user the location of the available Wi-Fi networks, this information often taken from the site Wigle.net. This application can make list of the available networks through the Wi-Fi and update the information on the site with approval of the user. Home user can use this application to know the closest Wi-Fi network. It can be source of the free internet to the home user. Business usage of this application cannot be observed due to the limited functions. This application cannot be considered to be malicious due to the limited functions it can only show the Wi-Fi networks and create the list of available networks. Such activity cannot be considered as malicious. Fileverifier++ This application is file verifier based on the calculation of some algorithms. This application has open source. It supports only Microsoft Windows systems. Software is designed to check the files’ integrity through the calculation of the hashes. Fileverifier++ supports various algorithms and work with many loadable hash libraries. Home user can check the files for integrity and in case of damaged files can request files which will pass the checking. Business use is equal to the home use; however, business, related to the developing of the application can check their products for integrity before release. This software cannot be considered to be Malicious due to the limited functions, which lies only in verification of files. File recovery (Recuva) File recovery application. This application’s code is closed. This application supports only Microsoft Windows OS This application recovers the deleted, damaged, formatted files. It can recover the files from the memory cards, recycle bins, other storages of information. It works with network drives, various file systems like FAT, UDF, exFAT. Home user can use this application to recover his/her files from the deletion. Sometimes happens that user can forgot to save changes to the Microsoft Word document and Recuva can recover the file even if it has been deleted few weeks ago. Business users can use this application equally to the home users, some of the staff can delete important file and this application can help to recover it and to avoid damage to the company. Because documents can preset critical importance to the company. This application cannot be considered to be malicious because it only recovers the files cannot delete or operate with them without the permission of the user. Eraser Eraser – security tool to ensure that deleted files completely removed Application is free and its source code is opened. This application supports only Microsoft windows OS. This software capable to completely delete sensitive data from the hard drive. It overwrites the hard drive for several times and does it with selected patterns. After such deletion files cannot be recovered with the undelete utilities. Home user can use this application to completely remove some of the private information that can be retrieved with application of the undelete programs. Therefore, users can use eraser and overwrite the file to avoid unauthorized access to the deleted files. Business users can use this application to ensure that the information that should be deleted will remain deleted. Such information can be used by competitors or read by stuff. Because without overwriting users can use undelete application and get access to deleted files. Such application can serve as malicious in hands of the hacker, because such deletion of the files cannot be undone and user can lose important information; however this application should be ran on the target computer that makes the attack impossible. AXcrypt Application for encrypting files with the password. This application’s source code is opened This application supports Microsoft Windows OS Axcrypt designed to protect files from the opening and decrypting, such files can be used in the various computers, avoiding unauthorized access to the personal information. It can also archive, store and work with separate files. It uses AES-128 and SHA-1 encrypting algorithms. Home users can use this application to protect their files from the probable access and can store files without the fear that someone can open them. Instead of deletion, users can encrypt them and ensure their security. Business users can use this application like a home ones. They can secure their files with this tool and copy them to all storages they have. Other users will not be able to open files due to the password protection and encryption. This software can be considered as malicious due to the fact that it helps to encrypt other malicious software and antivirus can treat viruses as appropriate programs. However, without such intentions this application can be used just for hiding important information. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Classification of the Applications Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Classification of the Applications Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1665199-see-instructions
(Classification of the Applications Assignment Example | Topics and Well Written Essays - 1000 Words)
Classification of the Applications Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1665199-see-instructions.
“Classification of the Applications Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1665199-see-instructions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Classification of the Applications

IBM Corporation Case Update

The formula to calculate return of equity is net income divided by total equity.... The table below illustrates the return on equity of IBM for the 14… The revenue growth of the company will be analyzed based on the natural year total in order to eliminate the effect of seasonality of the results....
1 Pages (250 words) Admission/Application Essay

Labor

In this response, the employees entitled to receive the pay are referred to as non-exempt employees while those with no right to… This classification is mainly based on the employee's salary and the type of job assigned to them.... This classification is mainly based on the employee's salary and the type of job assigned to them....
1 Pages (250 words) Admission/Application Essay

Transferring for Better Opportunities

The author of the paper states that all his life he has lived an active life as his parents always encouraged him to excel not only in academics but in sports as well.... Duke University is a great school which highly regards academic excellence, however, being a sports-minded person.... hellip; I always crave for activities that would enhance my physical abilities and capabilities....
2 Pages (500 words) Admission/Application Essay

Classifying Human Variation

This classification later changed to rich, middle-class and poor.... This classification later changed to rich, middle-class and poor.... Arrival of automobiles added a new feature to this classification where the middle-class was born.... In comparison to other forms of classification, one can easily know and accept his class.... This classification has also brought competition; a factor that contributes to hard work and continued innovation....
1 Pages (250 words) Admission/Application Essay

Discussion 6

Primarily, it is worth noting that even as we present the historical evidence of witchcraft in Europe, on factor remains constant: the witches' specifications and details remain so variable that there is no one certain methodology that explains the traits and classification of witch-hunts....
1 Pages (250 words) Admission/Application Essay

The Role of Government in the US Healthcare System

Response to Matthews's PostYou define rights but do not justify your classification of healthcare as a right because you only your argument only relate health to productivity.... However, don't you think that increased private control would improve efficiency and effectiveness in the sector?...
1 Pages (250 words) Admission/Application Essay

Australia Aboriiginal Culture

The paper deeply analyses Australian aboriginal culture and discusses the lives of the aboriginals from the standpoint of art, food, values, attitudes, beliefs, and perceptions.... nbsp;More than 400 tribes of aboriginals have been classified on the basis of traditions and languages.... nbsp;… According to the paper, The culture of the Australian aboriginals is a 60,000 old culture and the Australian aboriginal culture and language are not the same in different parts of the island....
9 Pages (2250 words) Admission/Application Essay

Getting to Do Masters in Accountancy from College

To mention just a few of such areas, they include environmental accounting, valuation, and classification of intangibles, determination, and accountancy treatment if contingencies and provisions are applicable.... The author of the paper "Getting to Do Master's in Accountancy from College" states that accountancy is a subject that has always managed to grab his\her attention....
1 Pages (250 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us