Search This Blog

Monday, June 1, 2009

How to protect your PC against Computer Worms



It seems that computer worms have been around almost as long as the web itself. Just a few years ago, users were worried about MyDoom. Before that, it was fear over SoBig, the SQL Slammer Worm, and the Blaster Worm. In 1999, it was the Melissa Worm. At the heart of the matter is the computer worms themselves. Unlike viruses, worms are programs that can make copies of themselves across any given network.


There are a number of ways that worms can become problematic. First, they can spoof your email address to make it look as if you are sending out copies of spam or virus-infected email, even though you aren’t. Moreover, they can actually enter your system and directly send email from your computer without your knowledge or permission. Once on your computer, they can erase it or change program settings. Some might even put software on your system to gain access to your personal information. More than anything, though, it can run itself, and it can even spread without the help of a host program, which is one of the many reasons you need to protect your PC against computer worms.


Stay Vigilant


One of the best first steps is to remain aware of the potential worms that could enter your system. Many companies offer email alerts when a new threat is introduced, and hundreds of websites post security bulletins about worm related problems on their website. As long as you stay abreast of current information, you’ll know the signs to look for in case your computer has the latest worm.


Update Your System on a Regular Basis


You need to update your operating system, programs, antivirus software, and antispyware solution on a regular basis. As new threats are introduced, your operating system and programs will introduce patches to counteract the problem. Ensuring that you download and install them as soon as they are available will help keep you and your computer safe.


If you haven’t already installed a three part protection system that includes antivirus software, antispyware software and a firewall, you may want to do that as well. Keep in mind that you’ll need to do a bit of research before you choose the right solution to meet your needs. Look at the available programs on the market, and be sure to review independent evaluations of each product before you make a purchase. You may want to carefully examine the features of each program you look at to decide whether it’s right for you. Most importantly, though, be sure that you’re getting reputable software. There is quite a bit of rogue security software floating around these days, and installing any of it will only lead to further problems with your computer. Look at each of the programs carefully, read security bulletin board postings, then choose the solution that is right for you. Download it, update it at least weekly, and schedule a regular scan of your computer to make certain you don’t have any of the new threats installed on your machine.


Use Caution With Email


In the past, many worms have been spread through email attachments. While that’s not always the case, it is quite helpful if understand what you should and shouldn’t do as you sort through your mail. First, be sure to promptly delete any mail if you’re not familiar with the sender. Even if you see an enticing subject line like “Remember Me?” getting rid of it is your best option. Second, never open an attachment unless you are very familiar with the sender. Even things like documents and PDF files can ensure a worm gets installed on your system, and in most cases, it’s better to be safe than sorry. Finally, set your security settings on your email as high as necessary. Setting your junk mail filter preferences and other settings at an acceptable level will prevent many problem programs from reaching you in the first place.


Be Careful While You’re Online


Many worms have spread with the help of peer to peer file sharing sites and other downloadable files, so when you’re online, be sure that you only download files of any type if you’re sure the source is safe. Moreover, it’s a good idea to only visit sites that you know are safe as well. Some antivirus and antispyware scanners come with a built-in web page check to help keep you safe while you’re online, so if you haven’t already installed that feature yet, you may want to consider it. In some cases, using another browser may help keep you safe as well. Because Internet Explorer is often the target for worms and other malware, choosing a browser like Firefox or Opera can save you quite a bit of difficulty at times.


Worms can be troublesome, but with a bit of extra work on your part, you can protect your computer.


judul:Software Life cycle – an answer to software product engineering challenges

A software life cycle is a depiction of the prominent functional phases or activities of a software project from the very beginning to the final retirement of the product. It involves the specific relationships between project phases, including transition criteria, feedback mechanisms, milestones, baselines, reviews, etc. Utilized by varied software development companies, a software lifecycle offers complete solution to structural problems.

A Software Life cycle

Let’s have a look at the different phases of the lifecycle of a software project:


* Requirement analysis phase

* Architectural or Design phase

* Detailed design phase

* Code construction

* Implementation phase

* Integration

* System Testing

* Operations Software Training and Support

* Code distribution and maintenance.


Shrinking time and cost margins, ever increasing need to constantly innovate, keep pace with market demands, exceed customer expectations, adapt to transforming technologies, evolving business models, and most importantly managing talent are the requirements needed to face today’s challenges. These can be answered only through strategic planning and innovative approach towards reconstruction of marketing techniques and extensive software solutions.

Software life cycle Models

Some of the life cycle models are:


* Iterative Processes

These software life cycles are preferred by commercial developers as they help design goals of a customer who does not know how to define what they want.

* Agile Software Development

These life cycles deploy more people-centric viewpoint on traditional approaches. These processes thrive on feedback, rather than planning.
* XP: Extreme Programming

The most comprehensive and detailed software lifecycle, it involves extremely small phases worked out extensively.
* Waterfall Processes


This type of software lifecycle involves normal software lifecycle steps.
Extremely well planned and coordinated software lifecycle accelerates the pace of any software development service and enhances their creditability in the market through top-quality and proven software products. Custom software development enabled by product engineers with deep experience and expertise in software life cycle management helps increase the quality of successful software products.


No comments:

Post a Comment