activity 3.3

Activity 3.3



Manufacturer
Kern LTD
http://www.kern.co.uk/

Inform


Tells you what the company is about as you can see this company is mailing and packaging.

Communicate a specific message

That they are a mailing company and that they can do all the hard work for you.

Attractive

It has an overview of the place and programs of what the company uses.

Entertain

It has moving images showing some workers and the way that the company works.

Educate

It tells you what is used in the company.

Networks







Newnet
Memo
To: John Mobley
From: Liam Cole (IT Services)
CC:
Date: September 16, 2009
Re: Technical Systems.
Dear Mr. Mobley

I am writing to inform you about the low security of the server house

1. fire serpresent system not in place

2. security of the building needs to be improved

3. security cards need to be handed out.
These are just some things that need to be inproved.

Cheers Liam Cole.

activity 5.9

Activity 5.9

1.
.Locks
.Auto locks
.Deadlocks

2. with a hammer
3. firewalls block unwanted stuff if set up right and anti virus scans for viruses

Activity 5.8

Activity 5.8

1. Advantages Access control systems are designed to permit the free flow of authorized movement into any site, whilst denying entry to unwanted visitors.

Disadvantages if there is a power cut it can let no one in or every one in.

2. Key card doors are more secure than normal lock because they are harder to open than standard doors



3. to keep a system going 24/7 you need to keep back ups in case of power failure, good anti virus system and firewall, good physical system to stop people getting in.

Activity 5.7

The Klez Computer Worm (the virus that won’t die).

The Klez computer worm Is now in it’s seventh month of being on the web Antivirus software makers Symantec and McAfee both report more than 2000 new infections daily.

Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.

How It Works
Klez is an example of a blended threat: software that distributes itself like a virus but sometimes behaves like a worm and at other times like a Trojan horse. Klez usually arrives in the in-boxes of unsuspecting victims as a file attachment. It uses various subject lines, including "Klez removal tool". Some variants also draw subject lines from random words in files on a victim's hard drive.


Sources where from….
Pc World.
Wikipedia.

The Klez Worm Compared To NetSky

Netsky is a prolific family of computer worms. The first variant appeared on Monday, February 16, 2004. The "B" variant was the first family member to find its way into mass distribution. It appeared on Wednesday, February 18, 2004.

18-year-old Sven Jaschan of Germany confessed to having written these, and other worms, such as Sasser.

Although individual functions vary widely from virus to virus, the Netsky family perhaps is most famous for comments contained within the code of its variants insulting the authors of the Bagle and Mydoom worm families and, in some cases, routines that removed versions of these viruses. The "war" as it was referred to in the media caused a steady increase in the number of variant viruses produced in these families.

As of June 2004, Bagle had approximately 28, Netsky approximately 29, and MyDoom approximately 10.

Other symptoms of Netsky included beeping sounds on specified dates, usually in the morning hours.

The worm was sent out as an e-mail, enticing recipients to open an attachment. Once opened, the attached program would scan the computer for e-mail addresses and e-mail itself to all addresses found.

Until October 2006, the P variant of this virus remained the most prevalent virus being sent in e-mail throughout the world, despite being over two and a half years old. It was surpassed by a variant from the Station malware family in November 2006.


Virus Checking Software Comparison.

Shield Deluxe 2009
$19.99
Go To
Read
Free


Webroot 6.0
$39.95
Go To
Read
Free


BitDefender
$29.95
Go To
Read
Free


CA 2009
$49.99
Go To
Read
Free


McAfee 2009
$39.99
Go To
Read



Norton 2009
$39.99
Go To
Read



ESET NOD 32 3.0
$39.99
Go To
Read
Free

Activity 5.3

Activity 5.3

1. Business relative technology has a defined purpose such as, networking several computers together so folders on there hard drive can be shared.

2. An estate agency can gain an advantage by using networking to share files between each other if they are working together on a job.

3. ADSL is a type of DSL because it uses Digital subscriber line just in a different form but ADSL uses only 25% sending and 75% receiving where as DSL uses 50/50.

Isp Providers Activity 5.2.2

1. Newnet
2.Virgin Media
3.BT
4.Orange
5.Demon
6.O2

Activity 5.2.1


Activity 5.1

1. Components in a network.
.Switch or Hub
.PC
.Network Card (NIC)
.Modem
.Ethernet Cable

2.The Roles of the Components.
.Switch Or Hub – Connects network segments together.
.PC – Is your Personal Computer that you work at.
.Network Card (NIC) – Is The card that does all the talking to the switch .
.Modem - a modem or a modulator-demodulator converts analog To Digital or A2DC .
.Ethernet Cable – is the cable you use to connect to the switch or modem to connect to the internet.

3.Witch Is Better A Switch Or A Hub?

A Switch is better because it is More Intelligent Then a Hub so It Can take information straight to the location requested But A Hub has to ask every computer on the network “Do Want This” all in one go so it takes more time to do it .