The effects of using IT
Negative effects of ICT
Overview of software copyright theft:
Software is often developed at massive costs (both financially and in terms of time) by companies and individuals.
Because software is digital, it is very easy to either download illegally from the internet or to make copies of it without the permission of the owner. (i.e. copying a CD or downloading from piratebay). This is often called 'Software Piracy'.
Laws exist to help prevent the developers of software from having their work downloaded or copied by others for free.
What do these laws cover?
1. Software should not be copied, sold or given away to other people
2. Software should not be used on a network of more users than you have paid for (e.g. 20 users instead of 10)
3. Renting out software without permission is illegal
4. Stealing code from software and then using it in your own software product is illegal
5. Using the name of copyright software on your product is illegal (Passing off your product as Microsoft Word for example)
Software Piracy Prevention
Software can be protected against piracy in a number of ways including:
Definition:"A self-copying program that has been created with the purpose of damaging a computer system "
Viruses can be designed to carry out different malicious (harmful) functions.
1. Annoying pop-up messages on the screen Causing the computer to slow down or even crash (stop responding)
2. Deleting important files or programs
3. Trying to access your personal files like passwords, bank details or credit card numbers etc
There are many ways that viruses can infect a computer. The most common include:
Downloading infected files from the internet Email attachments that contain infected files
Plugging a flash memory stick that containing infected files into your computer
Preventing Software Virus Infections
New computer viruses are being created all the time and this means that you should take steps to reduce the chance that you computer and data become infected.
The best methods are outlined in the table below:
1. Use up-to-date anti-virus software.
2. Use genuine copies of software.
3. Only open email attachments from people you trust.
4. Scan flash memory with anti-virus software before you attach it to your computer.
5. Only download software from legitimate websites.
Definition:"The process of accessing a computer system without permission"
Preventing Hacking and Hackers
User-ID's and Robust Passwords
A user-ID is usually a word or a number that identifies particular users as they log onto the computer system.
Encryption makes the files on you system unreadable if the user does not know the password to un-encrypt them.