UTILITY SOFTWARE


Utility Software: Enhancing Efficiency and Functionality 👈

Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-to-day chores associated with personal computing and to keep your system running at peak performance.

Some of utility programs are discussed below:

Anti Software Evolution -virus software-

Computer viruses are software programs that are deliberately designed to interfere with computer operation; record, corrupt, or delete data; or spread themselves to other computers and throughout the Internet. Virus Scanning Software are utility programs designed to protect your computer from computer viruses, worms and trojan horses.

To help prevent the most current viruses, you must update your antivirus software regularly. You can set up most types of antivirus software to update automatically.

Most anti-virus programs use one of the following techniques to identify viruses:

1. Signature based detection: This is the most common method. It compares the contents of the infected file to a known pattern of data. Because viruses can embed themselves in existing files, the entire file is searched.  

2. Heuristic-based detection: This method is primarily used to identify unknown viruses by looking for malicious code or variations of such code. 

3. File emulation: This is another heuristic approach in which the infected program is run in a virtual environment and the actions it performs are recorded. The actions are analyzed to check for any malicious actions and carry out disinfection actions accordingly. 
 
No matter how useful antivirus software can be, these can sometimes have some drawbacks.

  • Antivirus software can impair a computer's performance. Active anti-virus programs can cause conflicts with other programs.
  • A "false positive" is when antivirus software identifies a non-malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete infected files, a false positive in a essential file can render the operating system or some applications unusable.
  • Most popular anti-virus programs are not very effective against new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the market 
  • Some apparent antivirus programs are actually malware being sold as legitimate software, such as Win Fixer and MS Antivirus.
  • Some commercial antivirus software agreements include a clause that the subscription will be automatically renewed. For example, McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription. Norton Antivirus also renews subscriptions automatically by default. 
  • Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.
Despite the drawbacks, anti-virus software have become a necessity these days. A number of popular anti-virus programs include those by Kaspersky, Symantec, McAfee, and Norton. The cost of the program increases with the increase in the number of virus detection and removal features and ease they offer.

Backup utilities 

Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. All types of data could be backed up like pictures, word documents, files, executables or an entire database.

The main purpose is to recover data in the event of data loss or data getting corrupt. Other purpose could be to recover historical data. 

A number of Backup software are available that assist you in taking backup of your important data on the computer. Selecting between various back-up software is not only a based on the cost but also on the software that meeting the requirements. 

A backup software could allow automated scheduling of backup in addition to just creating copy of files. The software should be easy to install and maintain. It should be intuitive and easy to use. The restoring from the back-up should be simple. Accessing restored data should be automatic, and the backup should preserve original data files and paths. A backup software that can compress data helps in storing data in lesser space. Certain software also allows securing the backed-up data with passwords and encryption. Good documentation and technical support goes a long way in ensuring help is available when needed. 

Backup could be taken on variety of media including hard drive, CDs, DVDs, floppy disks etc. It could also be taken on FTP locations, tape or online servers. A number of free and proprietary back-up software are available including those from Microsoft, Symantec, Apple, IBM, and Norton. 

It is important to take backup of important data regularly and also verify that it can be restored successfully.

Diagnose program 

A diagnostic program is a program written for the purpose of locating problems with the software, hardware, or both, or a network of systems. A diagnostic program provides solutions to the user to solve issues.

In practical experience, these tools do not usually identify the exact cause of the system problem, but they often provide some information about what is in the system and how it is working. Some of these are free or are included with common operating systems at no additional charge, while others are commercial products that range from affordable to rather pricey.

Here are some common software diagnostic tools.
  • Power-On Self Test (POST) : This isn't a separate diagnostic utility; it is in fact built into your system BIOS and it runs every time you start up your PC automatically. It is often the best indicator of system problems. Don't disable its error-reporting functions unless you really need to. 
  • MEM.EXE : This simple utility, built into Windows operating system that provides you with details about your memory configuration, as well as what is currently using your memory.
  • Microsoft Diagnostics : Better known as "MSD.EXE", this is a small DOS utility that takes a brief inventory of the contents of your PC and shows them to you in a text-based format. This is very useful for seeing what disks are in the system, how much memory is installed, and also for checking system resource usage. It will show you what type of BIOS you are using.
  • The Windows Device Manager : This is the most useful tool for identifying system configuration and resource usage information. 
  • Norton System Information : This utility is similar to the Microsoft Diagnostics, only more detailed in its later versions. SI shows a great deal of information about what is in the PC, going well beyond what MSD gives you, but really is still an information utility as opposed to a true diagnostic. This program is part of Symantec's Norton Utilities.
  • Microsoft ScanDisk and Norton Disk Doctor : These programs are used to check for hard disk problems. This includes file system corruption and hard disk read errors. They should be used when hard disk problems are suspected.
  • Scandisk is a utility provided with Windows computers. Scandisk scans your disks to see if there are any potential problems on the disk, such as bad disk areas. Since disks are magnetic media, all disks, including your hard drive can be corrupted
  • Microsoft Disk Defragmenter software assists you in keep reorganizing your disk drives. After files are saved, deleted and resaved again, the disk can become fragmented --- available space is in small blocks located throughout the disk. Disk defragmenters gather those free spots and put them together to enable you to continue to save your data in the most efficient manner.
  • Norton Diagnostics : This utility is meant to go beyond the System Information program and actually perform tests on the hardware to identify problems. It includes tests of the processor and motherboard and system memory, and will identify some types of resource conflicts. In reality, it is still quite limited in terms of the numbers of problems it will find. 
  • QAPlus : QAPlus from DiagSoft is a more advanced diagnostic suite that comes in several flavours, depending on what you need to do and how you want to do it. This is a more expensive package but can give you much more detailed information about your system and help identify problem situations as well.

File view programs 

File view utilities let you see the contents of a wide variety of documents even when you don't have the application on your system.

A file viewer is limited-functionality software it does not have a capability to create a file, or modify the content of an existing one. Instead, it is used only to display or print the content. File viewers do not edit files, but they are able to save data in a different file format.

All the fundamental types of file viewers are filters which translate binary files into plain text (one example antiword). Another common type of file viewer is a picture viewer that can display picture files of various formats. Common features here are thumbnail preview and creation, and image zooming.

The primary reason behind limited functionality is marketing and control. For example, a popular software program, Adobe Acrobat, can be used to create content for most computer platforms, under various operating systems. To ensure that people can access the documents created with Adobe Acrobat, the software publisher created a viewer program, the Acrobat Reader, and made it available for free. This viewer application allows the content created by the proprietary authoring software to be readable on all supported operating-system platforms, free of charge, thus making it a more attractive solution.

There are many products which can qualify as a file viewer: Microsoft Word viewer or Microsoft PowerPoint viewer, and the Open Office equivalents are examples. In a sense, a web browser is a type of file viewer, which translates, or renders, the HTML markups into a human-friendly presentation. Although HTML is plain text, viewing an HTML file in a browser and in a text editor produces significantly different results

Google Docs is another very good example of online file viewer. Google Docs Viewer supports 12 new file types in, including all remaining Microsoft Office file types, Apple's Pages format, and Adobe's Photoshop and Illustrator files.

Computer performance enhancement utilities

A number of utilities are available to improve the overall performance of the computer system by letting you speed up your system or increase storage space. These utilities range from those that come packaged with the operating system or can be purchased separately.

Disk defragmenter utility reorganizes non contiguous files into contiguous files and optimizes their placement on the hard drive for increased reliability and performance.

There are many hardware and software accelerators available to enhance performance in a particular area. For example, download accelerators are software tools to increase the download speed, while graphic accelerators are coprocessors that assist in drawing graphics. 

The Windows registry can quickly become crowded and hence slower to search when you remove unused programs that do not uninstall properly. There are utilities like Registry Mechanic or Registry Clean Expert that can help clean Windows registry to improve performance. 

1.6 PERVERSE SOFTWARE

Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data without the user's intention or even sabotaging the operational system.

Perverse Software is also known as Malicious software or malware. It is a type of software that is designed to secretly access a computer system, without the owner‘s consent, and damage the system. The impact can be as damaging as shutting down a business, pulling down computer network or significantly impacting regular use of individual computer systems etc. The damage done can vary from something as little as changing the author's name in a document to full control of one‘s machine without the ability to easily find out.

Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system. 

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user‘s web browsing, and pushes related advertisements. 

Typical types of malicious software are - Computer virus, Computer Worm, Trojan horse, Rootkits, Spyware etc. 

Here is brief information about the various types of malware:

Computer Virus

Computer virus is a small software program that is designed to enter a computer without users‘ permission or knowledge, to interfere with computer operation and to spread from one computer to another. A computer virus needs to attach itself to a document or program to infect other computers or programs.

Some viruses do little but replicate while others can cause severe harm or adversely effect program and performance of the system. They can destroy files, software, program applications, and cause the loss of data.

There are various types of computer virus that can be classified by their origins, techniques of attack, modes of spreading, forms of infections, hiding locations and the kind of damage caused. Examples of computer viruses are: Randex, Melissa.A and Trj.Reboot

Computer Worm 

Computer Worm is a program that is very similar to a virus. It has ability to self replicate. It actively spreads itself over the network, copies itself from one disk drive to another or copies using email. It does not need user action to start it unlike virus. Examples of worms include: PSWBugbear.B,  Lovgate.F,  Trile.C,  Sobig.D,  Mapson.

Trojan Horse 

When a program is disguised as something interesting and desirable, users are tempted to download and install it on their machine, without knowing what it does. This is when it does the damages by deleting files from the system or by further installing unwanted software. This is the typical technique of Trojan horse. For example, a file called "saxophone.wav file" on the computer of user who's interested in collecting sound samples may actually be a Trojan Horse. Trojan Horses unlike viruses do not reproduce by infecting other files, nor do they selfreplicate like worms, but they are extremely dangerous to users computer's security and personal privacy. They make a computer susceptible to malicious intruders by allowing them to access and read files.

Rootkits 

This is a technique using which the malware remains concealed in the system, and continues to do the damage in a concealed manner. Rootkits can prevent a malicious process from being visible (ex Task Bar in Windows operating system) in the list of running applications. Rootkits normally attempt to allow someone to gain control of a computer system. These programs are usually installed by trojans and are generally disguised as operating system files.

Trap doors 

This is a way of bypassing normal authentication procedure (windows/ operating system user name and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.

Logic Bombs/ Time Bombs 

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th

Spyware

While so far we have discussed the malware‘s intent to damage the computer system, spyware is designed for commercial gain. These programs gather information about the user in a concealed manner, show pop-up advertisements, redirects the search engine results to paid advertisements etc.

Keystroke loggers 

This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Card number while shopping online. This can be used for Credit Card fraud.

Data-stealing  

This is a web threat that results in stealing of personal and proprietary information to be used for commercial gains either directly or via underground distribution. Some popular examples of recent data-stealing cases are – steal and sell large number of credit card numbers from businesses such as TJX, OfficeMax, Sports Authority etc.

1.6.1 Ways to Counter Perverse Software

Some common ways of countering Malware are as following:
  • Ensure that the operating system and any program one uses are up to date with patches/updates.
  • Block unwanted email viruses by installing a spam filter and spam blocker.
  • When browsing the internet, always watch what one clicks and installs. Do not simply click OK to dismiss pop-up windows.
  • Install anti-virus software; scan and update regularly. It can, in most cases, remove and prevent viruses, worms, trojans, and (depending on the software) some spyware. 
  • Install anti-spyware/anti-adware; scan and update regularly. It will remove and (depending on the software) prevent future adware and spyware.

Post a Comment

0Comments
Post a Comment (0)