UTSC  
CSCA01     Summer 2008
Computing Skills for Co-op
links

 
 
 

Software

Free software that may be useful for this course:

Software that current full time UofT students can purchase for discounted prices:


General Links

UTSC

U of T Resources Plagiarism

Major Software Links

Google
  • In Google, click "Advanced Search" and try in out. Note the topic-specific search engines at the bottom of the screen.
  • In the Advanced Search page, click "Advanced Search Tips" to open the Advanced Search Help Center. Click "Basics of Search" and read the explanations.
Most browsers have an advanced search feature and some guidance on how to use it. Save yourself time and get better search results by reading the instructions... and then actually following them!
Wikipedia
  • On the main Wikipedia page, click "About Wikipedia".
  • Then scroll down to the table of contents and click "Making the best use of WIkipedia"
Microsoft
For Microsoft products, you will find:
  • explanations and descriptions
  • tutorials you can follow
  • webcasts discussing the products
  • videos demonstrating how to use the products
Look for these in addition to the links provided below.
Microsoft Word Microsoft PowerPoint Microsoft Publisher & Desktop Publishing HTML Dreamweaver Corel Paint Shop Pro Microsoft Excel Microsoft Visual Basic for Applications (VBA) Microsoft Access Microsoft Office

Minor Software Links

General

FTP UNIX MS-DOS PDF and Ghostscript Video Audio Play DVDs Windows Speedup Compress Files (Zip) Burn CD/DVDs Malware (all links from Wikipedia)
  • Malware -- software that infiltrates a system without the owner's informed consent.
  • Computer Virus -- program that can copy itself and infect a computer.
  • Computer Worm -- program that is self-replicating. Uses network to send copies of itself.
  • Trojan Horse -- program that installs malicious software while under the guise of doing something else.
    • Backdoor -- program which allow unauthorized remote access to a computer.
    • Rootkit -- programs intended to conceal running processes, files, or system data from the OS.
  • Malicious Internet Bots -- bots are software robots that automatically run programs.
    • Denial-of-service attack -- an attempt to make a computer resource unavailable to its intended users. One common method is by saturating a host on a network with external communications requests.
    • Zombie computer -- a computer on the Internet that has been compromised. It is usually one of several computers in a botnet, which is used to perform malicious tasks under remote direction.
    • Spam (electronic) -- unsolicited bulk e-mail.
  • Social engineering -- collection of techniques used to manipulate people into performing actions or divulging confidential information.
    • Identity Theft -- computers can be used to collect personal info which may be used to steal a person's identiy (e.g., spoofing, phishing, pharming, vishing).
    • Spoofing -- program successfully masquerades as another by falsifying data and thereby gaining advantage.
    • Phishing -- fake e-mail messages and fradulent web sites are designed to fool recipients into divulging personal info.
    • Pharming -- an attack that redirects a web site's traffice to another, bogus web site.
    • Vishing -- Voice over IP (VoIP) used to gain access to private personal and financial info from the public for the purpose of financial reward.
  • Spy Software
    • Spyware -- software that intercepts or takes partial control over the user's interaction with the computer.
    • Packet sniffer -- software/hardware that can intercept and log traffic passing over a digital network.
    • Keystroke logging -- software used to capture user's keystrokes. Used by private parties to spy on user's computer usage.
    • Adware -- softwre which automatically plays, displays, or downloads advertising material to a computer.

Microsoft Office Integration

Microsoft Office 2007